Skip to main content

Establishing the Price of Privacy in Federated Data Trading

  • Chapter
  • First Online:
Protocols, Strands, and Logic

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 13066))

Abstract

Personal data is becoming one of the most essential resources in today’s information-based society. Accordingly, there is a growing interest in data markets, which operate data trading services between data providers and data consumers. One issue the data markets have to address is that of the potential threats to privacy. Usually some kind of protection must be provided, which generally comes to the detriment of utility. A correct pricing mechanism for private data should therefore depend on the level of privacy. In this paper, we propose a model of data federation in which data providers, who are, generally, less influential on the market than data consumers, form a coalition for trading their data, simultaneously shielding against privacy threats by means of differential privacy. Additionally, we propose a technique to price private data, and an revenue-distribution mechanism to distribute the revenue fairly in such federation data trading environments. Our model also motivates the data providers to cooperate with their respective federations, facilitating a fair and swift private data trading process. We validate our result through various experiments, showing that the proposed methods provide benefits to both data providers and consumers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Here, v(.) is the characteristic function of \(\psi (.)\), depending on \(\epsilon _p^T\).

References

  1. Datacoup - reclaim your personal data. https://datacoup.com/, Accessed 26 May 2021

  2. Domingo-Ferrer, J., Soria-Comas, J.: From t-closeness to differential privacy and vice versa in data anonymization. Knowl.-Based Syst. 74, 151–158 (2015)

    Article  Google Scholar 

  3. Dwork, C., Roth, A., et al.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3–4), 211–407 (2014)

    MathSciNet  MATH  Google Scholar 

  4. Elsalamouny, E., Palamidessi, C.: resconstruction of sensitive distributions under free-will privacy, draft paper

    Google Scholar 

  5. Erlingsson, Ú., Pihur, V., Korolova, A.: Rappor: randomized aggregatable privacy-preserving ordinal response. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1054–1067 (2014)

    Google Scholar 

  6. Fleischer, L.K., Lyu, Y.H.: Approximately optimal auctions for selling privacy when costs are correlated with data. In: Proceedings of the 13th ACM Conference on Electronic Commerce, pp. 568–585 (2012)

    Google Scholar 

  7. Ghosh, A., Roth, A.: Selling privacy at auction. In: Proceedings of the 12th ACM Conference on Electronic Commerce, pp. 199–208 (2011)

    Google Scholar 

  8. Hinds, J., Williams, E.J., Joinson, A.N.: “it wouldn’t happen to me’’: privacy concerns and perspectives following the Cambridge analytica scandal. Int. J. Hum.-Comput. Stud. 143, 102498 (2020)

    Article  Google Scholar 

  9. Holohan, N., Antonatos, S., Braghin, S., Mac Aonghusa, P.: (\( k, \epsilon \))-anonymity: \(k\) -anonymity with \(\epsilon \)-differential privacy (2017). arXiv preprint arXiv:1710.01615

  10. Hsu, J., et al.: Differential privacy: an economic method for choosing epsilon. In: 2014 IEEE 27th Computer Security Foundations Symposium, pp. 398–410. IEEE (2014)

    Google Scholar 

  11. Jung, K., Park, S.: Privacy bargaining with fairness: privacy-price negotiation system for applying differential privacy in data market environments. In: 2019 IEEE International Conference on Big Data (Big Data), pp. 1389–1394. IEEE (2019)

    Google Scholar 

  12. Kairouz, P., Bonawitz, K., Ramage, D.: Discrete distribution estimation under local privacy. In: International Conference on Machine Learning, pp. 2436–2444. PMLR (2016)

    Google Scholar 

  13. Lee, J., Clifton, C.: How much is enough? choosing \(\varepsilon \) for differential privacy. In: Lai, X., Zhou, J., Li, H. (eds.) ISC 2011. LNCS, vol. 7001, pp. 325–340. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-24861-0_22

    Chapter  Google Scholar 

  14. Li, C., Li, D.Y., Miklau, G., Suciu, D.: A theory of pricing private data. ACM Trans. Database Syst. (TODS) 39(4), 1–28 (2014)

    Article  MathSciNet  Google Scholar 

  15. Liveen - blockchain-based social network platform that provides fair rewards for the users’ contents. https://www.liveen.com/, Accessed 26 May 2021

  16. Nget, R., Cao, Y., Yoshikawa, M.: How to balance privacy and money through pricing mechanism in personal data market (2017). arXiv preprint arXiv:1705.02982

  17. Roth, A.: Buying private data at auction: the sensitive surveyor’s problem. ACM SIGecom Exchang. 11(1), 1–8 (2012)

    Article  Google Scholar 

  18. Roth, A.E.: The Shapley Value: Essays in Honor of Lloyd S. Cambridge University Press, Shapley (1988)

    Book  Google Scholar 

  19. Tang, J., Korolova, A., Bai, X., Wang, X., Wang, X.: Privacy loss in Apple’s implementation of differential privacy on MacOS 10.12 (2017). arXiv preprint arXiv:1709.02753

  20. Winter, E.: The shapley value. Handb. Game Theory Econ. Appl 3, 2025–2054 (2002)

    Google Scholar 

  21. Zhang, T., Zhu, Q.: On the differential private data market: endogenous evolution, dynamic pricing, and incentive compatibility (2021). arXiv preprint arXiv:2101.04357

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Kangsoo Jung , Sayan Biswas or Catuscia Palamidessi .

Editor information

Editors and Affiliations

Appendix A Proofs

Appendix A Proofs

Theorem 1

If the privacy valuation function used by the data consumer, D, is \(f(m)=K_1(e^{K_2m}-1)\), in order to impose the penalty scheme to any member \(p\in F\) of a federation F, the Shapley valuation function, \(\psi (.)\), chosen by F, must satisfy \(\frac{\ln (\frac{\epsilon ^T_p}{K_1}+1)}{K_2} < \psi \left( \epsilon ^T_p, \frac{\ln (\frac{w^*\epsilon ^T_p}{K_1}+K)}{K_2}\right) \), where \(K=\frac{\sum _{p'\ne p \in F}d_{p'}\epsilon ^T_{p'}}{K_1}+1\), \(d_{\pi }\) is the number of data points reported by any \(\pi \in F\), and \(w^*\) is the suggested scaling parameter computed by D to propose a realistic deal, as described in Sect. 4.1.

Proof

Using the privacy valuation function \(f(m)=K_1(e^{K_2m}-1)\), we have \(f^{-1}(\epsilon )=\frac{\ln (\frac{\epsilon }{K_1}+1)}{K_2}\). Let p be an arbitrary member of F with a maximum privacy threshold \(\epsilon ^T_p\). Therefore, in order to impose a penalty scheme on p, it needs to be ensured that

$$\begin{aligned} \frac{\ln (\frac{\epsilon ^T_p}{K_1}+1)}{K_2}< \psi (v, M) \nonumber&\\\nonumber&\\\nonumber \implies \frac{\ln (\frac{\epsilon ^T_p}{K_1}+1)}{K_2}< \psi (v, f^{-1}(\epsilon ^P_F))&\\\nonumber \nonumber&\\\nonumber [w^*\in [0,1]\text { is the scaling parameter chosen by }D \text { and } \epsilon ^P_F=w^*\epsilon ^T_F]&\\\nonumber \nonumber&\\\nonumber \implies \frac{\ln (\frac{\epsilon ^T_p}{K_1}+1)}{K_2}< \psi \left( v, \frac{\ln (\frac{\epsilon ^P_F}{K_1}+1)}{K_2}\right)&\\\nonumber&\\\nonumber \implies \frac{\ln (\frac{\epsilon ^T_p}{K_1}+1)}{K_2}< \psi \left( v, \frac{\ln (\frac{C_0+w^*\epsilon ^T_p}{K_1}+1)}{K_2}\right)&\\\nonumber&\\ \nonumber [\text { where }C_0=\sum _{p'\ne p \in F}d_p'\epsilon ^T_{p'}\text { is a constant}]&\\\nonumber \nonumber&\\ \nonumber \implies \frac{\ln (\frac{\epsilon ^T_p}{K_1}+1)}{K_2}< \psi \left( v, \frac{\ln (\frac{C_0+w^*\epsilon ^T_p}{K_1}+1)}{K_2}\right)&\\\nonumber&\\ \nonumber \frac{\ln (\frac{\epsilon ^T_p}{K_1}+1)}{K_2} < \psi \left( v, \frac{\ln (\frac{w^*\epsilon ^T_p}{K_1}+K)}{K_2}\right)&\\&\\ \nonumber [\text {for the constant }K=\frac{C_0}{K_1}+1.] \end{aligned}$$
(1)

   \(\Box \)

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Jung, K., Biswas, S., Palamidessi, C. (2021). Establishing the Price of Privacy in Federated Data Trading. In: Dougherty, D., Meseguer, J., Mödersheim, S.A., Rowe, P. (eds) Protocols, Strands, and Logic. Lecture Notes in Computer Science(), vol 13066. Springer, Cham. https://doi.org/10.1007/978-3-030-91631-2_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-91631-2_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-91630-5

  • Online ISBN: 978-3-030-91631-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics