Abstract
Personal data is becoming one of the most essential resources in today’s information-based society. Accordingly, there is a growing interest in data markets, which operate data trading services between data providers and data consumers. One issue the data markets have to address is that of the potential threats to privacy. Usually some kind of protection must be provided, which generally comes to the detriment of utility. A correct pricing mechanism for private data should therefore depend on the level of privacy. In this paper, we propose a model of data federation in which data providers, who are, generally, less influential on the market than data consumers, form a coalition for trading their data, simultaneously shielding against privacy threats by means of differential privacy. Additionally, we propose a technique to price private data, and an revenue-distribution mechanism to distribute the revenue fairly in such federation data trading environments. Our model also motivates the data providers to cooperate with their respective federations, facilitating a fair and swift private data trading process. We validate our result through various experiments, showing that the proposed methods provide benefits to both data providers and consumers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Here, v(.) is the characteristic function of \(\psi (.)\), depending on \(\epsilon _p^T\).
References
Datacoup - reclaim your personal data. https://datacoup.com/, Accessed 26 May 2021
Domingo-Ferrer, J., Soria-Comas, J.: From t-closeness to differential privacy and vice versa in data anonymization. Knowl.-Based Syst. 74, 151–158 (2015)
Dwork, C., Roth, A., et al.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3–4), 211–407 (2014)
Elsalamouny, E., Palamidessi, C.: resconstruction of sensitive distributions under free-will privacy, draft paper
Erlingsson, Ú., Pihur, V., Korolova, A.: Rappor: randomized aggregatable privacy-preserving ordinal response. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1054–1067 (2014)
Fleischer, L.K., Lyu, Y.H.: Approximately optimal auctions for selling privacy when costs are correlated with data. In: Proceedings of the 13th ACM Conference on Electronic Commerce, pp. 568–585 (2012)
Ghosh, A., Roth, A.: Selling privacy at auction. In: Proceedings of the 12th ACM Conference on Electronic Commerce, pp. 199–208 (2011)
Hinds, J., Williams, E.J., Joinson, A.N.: “it wouldn’t happen to me’’: privacy concerns and perspectives following the Cambridge analytica scandal. Int. J. Hum.-Comput. Stud. 143, 102498 (2020)
Holohan, N., Antonatos, S., Braghin, S., Mac Aonghusa, P.: (\( k, \epsilon \))-anonymity: \(k\) -anonymity with \(\epsilon \)-differential privacy (2017). arXiv preprint arXiv:1710.01615
Hsu, J., et al.: Differential privacy: an economic method for choosing epsilon. In: 2014 IEEE 27th Computer Security Foundations Symposium, pp. 398–410. IEEE (2014)
Jung, K., Park, S.: Privacy bargaining with fairness: privacy-price negotiation system for applying differential privacy in data market environments. In: 2019 IEEE International Conference on Big Data (Big Data), pp. 1389–1394. IEEE (2019)
Kairouz, P., Bonawitz, K., Ramage, D.: Discrete distribution estimation under local privacy. In: International Conference on Machine Learning, pp. 2436–2444. PMLR (2016)
Lee, J., Clifton, C.: How much is enough? choosing \(\varepsilon \) for differential privacy. In: Lai, X., Zhou, J., Li, H. (eds.) ISC 2011. LNCS, vol. 7001, pp. 325–340. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-24861-0_22
Li, C., Li, D.Y., Miklau, G., Suciu, D.: A theory of pricing private data. ACM Trans. Database Syst. (TODS) 39(4), 1–28 (2014)
Liveen - blockchain-based social network platform that provides fair rewards for the users’ contents. https://www.liveen.com/, Accessed 26 May 2021
Nget, R., Cao, Y., Yoshikawa, M.: How to balance privacy and money through pricing mechanism in personal data market (2017). arXiv preprint arXiv:1705.02982
Roth, A.: Buying private data at auction: the sensitive surveyor’s problem. ACM SIGecom Exchang. 11(1), 1–8 (2012)
Roth, A.E.: The Shapley Value: Essays in Honor of Lloyd S. Cambridge University Press, Shapley (1988)
Tang, J., Korolova, A., Bai, X., Wang, X., Wang, X.: Privacy loss in Apple’s implementation of differential privacy on MacOS 10.12 (2017). arXiv preprint arXiv:1709.02753
Winter, E.: The shapley value. Handb. Game Theory Econ. Appl 3, 2025–2054 (2002)
Zhang, T., Zhu, Q.: On the differential private data market: endogenous evolution, dynamic pricing, and incentive compatibility (2021). arXiv preprint arXiv:2101.04357
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Appendix A Proofs
Appendix A Proofs
Theorem 1
If the privacy valuation function used by the data consumer, D, is \(f(m)=K_1(e^{K_2m}-1)\), in order to impose the penalty scheme to any member \(p\in F\) of a federation F, the Shapley valuation function, \(\psi (.)\), chosen by F, must satisfy \(\frac{\ln (\frac{\epsilon ^T_p}{K_1}+1)}{K_2} < \psi \left( \epsilon ^T_p, \frac{\ln (\frac{w^*\epsilon ^T_p}{K_1}+K)}{K_2}\right) \), where \(K=\frac{\sum _{p'\ne p \in F}d_{p'}\epsilon ^T_{p'}}{K_1}+1\), \(d_{\pi }\) is the number of data points reported by any \(\pi \in F\), and \(w^*\) is the suggested scaling parameter computed by D to propose a realistic deal, as described in Sect. 4.1.
Proof
Using the privacy valuation function \(f(m)=K_1(e^{K_2m}-1)\), we have \(f^{-1}(\epsilon )=\frac{\ln (\frac{\epsilon }{K_1}+1)}{K_2}\). Let p be an arbitrary member of F with a maximum privacy threshold \(\epsilon ^T_p\). Therefore, in order to impose a penalty scheme on p, it needs to be ensured that
\(\Box \)
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Jung, K., Biswas, S., Palamidessi, C. (2021). Establishing the Price of Privacy in Federated Data Trading. In: Dougherty, D., Meseguer, J., Mödersheim, S.A., Rowe, P. (eds) Protocols, Strands, and Logic. Lecture Notes in Computer Science(), vol 13066. Springer, Cham. https://doi.org/10.1007/978-3-030-91631-2_13
Download citation
DOI: https://doi.org/10.1007/978-3-030-91631-2_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-91630-5
Online ISBN: 978-3-030-91631-2
eBook Packages: Computer ScienceComputer Science (R0)