Skip to main content

Valuation of Differential Privacy Budget in Data Trade: A Conjoint Analysis

  • Conference paper
  • First Online:
Privacy and Identity Management (Privacy and Identity 2022)

Abstract

Differential privacy has been proposed as a rigorous privacy guarantee for computation mechanisms. However, it is still unclear how data collectors can correctly and intuitively configure the value of the privacy budget parameter \(\varepsilon \) for differential privacy, such that the privacy of involved individuals is protected. In this work, we seek to investigate the trade-offs between differential privacy valuation, scenario properties, and preferred differential privacy level of individuals in a data trade. Using a choice-based conjoint analysis (\(N = 139)\), we mimic the decision-making process of individuals under different data-sharing scenarios. We found that, as hypothesized, individuals required lower payments from a data collector for sharing their data, as more substantial perturbation was applied as part of a differentially private data analysis. Furthermore, respondents selected scenarios with lower \(\varepsilon \) values (requiring more privacy) for indefinitely-retained data for profit generation than for temporarily-retained data with a non-commercial purpose. Our findings may help data processors better tune the differential privacy budget for their data analysis based on individual privacy valuation and contextual properties.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 79.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Full survey protocol and evaluation code are available at https://github.com/iWitLab/valuating_differential_privacy_budget.

References

  1. Acquisti, A.: The economics of personal data and the economics of privacy (2010)

    Google Scholar 

  2. Acquisti, A., John, L.K., Loewenstein, G.: What is privacy worth? J. Leg. Stud. 42(2), 249–274 (2013). https://doi.org/10.1086/671754

    Article  Google Scholar 

  3. Adam, N.R., Worthmann, J.C.: Security-control methods for statistical databases: a comparative study. ACM Comput. Surv. (CSUR) 21(4), 515–556 (1989). https://doi.org/10.1145/76894.76895

    Article  Google Scholar 

  4. Agrawal, N., Binns, R., Van Kleek, M., Laine, K., Shadbolt, N.: Exploring design and governance challenges in the development of privacy-preserving computation. In: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, pp. 1–13 (2021). https://doi.org/10.1145/3411764.3445677

  5. Barth, S., De Jong, M.D.: The privacy paradox-investigating discrepancies between expressed privacy concerns and actual online behavior-a systematic literature review. Telematics Inform. 34(7), 1038–1058 (2017). https://doi.org/10.1016/j.tele.2017.04.013

    Article  Google Scholar 

  6. Birnhack, M., Toch, E., Hadar, I.: Privacy mindset, technological mindset. Jurimetrics 55, 55 (2014). https://doi.org/10.2139/ssrn.2471415

    Article  Google Scholar 

  7. Bureau, U.C.: The modernization of statistical disclosure limitation at the U.S. census bureau (2021). https://www2.census.gov/cac/sac/meetings/2017-09/statistical-disclosure-limitation.pdf

  8. Cattin, P., Wittink, D.R.: Commercial use of conjoint analysis: a survey. J. Mark. 46(3), 44–53 (1982). https://doi.org/10.1177/002224298204600308

    Article  Google Scholar 

  9. Coopamootoo, K.P., Groß, T.: Why privacy is all but forgotten. Proc. Priv. Enhancing Technol. 2017(4), 97–118 (2017). https://doi.org/10.1515/popets-2017-0040

    Article  Google Scholar 

  10. Culnan, M.J., Armstrong, P.K.: Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organ. Sci. 10(1), 104–115 (1999). https://doi.org/10.1287/orsc.10.1.104

    Article  Google Scholar 

  11. Cummings, R., Kaptchuk, G., Redmiles, E.M.: I need a better description: an investigation into user expectations for differential privacy. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 3037–3052 (2021). https://doi.org/10.1145/3460120.3485252

  12. Dankar, F.K., El Emam, K.: Practicing differential privacy in health care: a review. Trans. Data Priv. 6(1), 35–67 (2013)

    MathSciNet  Google Scholar 

  13. Dwork, Cynthia: Differential privacy. In: Bugliesi, Michele, Preneel, Bart, Sassone, Vladimiro, Wegener, Ingo (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006). https://doi.org/10.1007/11787006_1

    Chapter  Google Scholar 

  14. Dwork, C., Kohli, N., Mulligan, D.: Differential privacy in practice: expose your epsilons! J. Priv. Confident. 9(2), 689 (2019). https://doi.org/10.29012/jpc.689

  15. Dwork, C., Roth, A., et al.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3–4), 211–407 (2014). https://doi.org/10.1561/9781601988195

    Article  MathSciNet  MATH  Google Scholar 

  16. Garfinkel, S.L., Abowd, J.M., Powazek, S.: Issues encountered deploying differential privacy. In: Proceedings of the 2018 Workshop on Privacy in the Electronic Society, pp. 133–137 (2018). https://doi.org/10.1145/3267323.3268949

  17. Jorgensen, Z., Yu, T., Cormode, G.: Conservative or liberal? personalized differential privacy. In: 2015 IEEE 31St International Conference on Data Engineering, pp. 1023–1034. IEEE (2015). https://doi.org/10.1109/ICDE.2015.7113353

  18. Jung, K., Park, S.: Privacy bargaining with fairness: privacy-price negotiation system for applying differential privacy in data market environments. In: 2019 IEEE International Conference on Big Data (Big Data), pp. 1389–1394. IEEE (2019). https://doi.org/10.1109/BigData47090.2019.9006101

  19. Kohli, N., Laskowski, P.: Epsilon voting: Mechanism design for parameter selection in differential privacy. In: 2018 IEEE Symposium on Privacy-Aware Computing (PAC), pp. 19–30. IEEE (2018). https://doi.org/10.1109/PAC.2018.00009

  20. Koops, B.: Directive 95/46/EC general data protection regulation. Tech. rep., European parliament and council (2016). https://ec.europa.eu/info/law/law-topic/data-protection_en

  21. Kumaraguru, P., Cranor, L.F.: Privacy indexes: a survey of Westin’s studies. Carnegie Mellon University, School of Computer Science, Institute for Software Research International (2005)

    Google Scholar 

  22. Li, C., Li, D.Y., Miklau, G., Suciu, D.: A theory of pricing private data. ACM Trans. Database Syst. (TODS) 39(4), 1–28 (2014). https://doi.org/10.1145/2691190.2691191

    Article  MathSciNet  MATH  Google Scholar 

  23. Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data (TKDD) 1(1), 3 (2007). https://doi.org/10.1145/1217299.1217302

    Article  Google Scholar 

  24. McSherry, F., Talwar, K.: Mechanism design via differential privacy. In: 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS2007), pp. 94–103. IEEE (2007). https://doi.org/10.1109/FOCS.2007.66

  25. Nget, R., Cao, Y., Yoshikawa, M.: How to balance privacy and money through pricing mechanism in personal data market. arXiv preprint arXiv:1705.02982. https://arxiv.org/abs/1705.02982

  26. Poikela, M., Toch, E.: Understanding the valuation of location privacy: a crowdsourcing-based approach. In: Proceedings of the 50th Hawaii International Conference on System Sciences (2017). https://doi.org/10.24251/hicss.2017.241

  27. Riederer, C., Erramilli, V., Chaintreau, A., Krishnamurthy, B., Rodriguez, P.: For sale: your data: by: you. In: Proceedings of the 10th ACM Workshop on Hot Topics in Networks, pp. 1–6 (2011). https://doi.org/10.1145/2070562.2070575

  28. Staiano, J., Oliver, N., Lepri, B., de Oliveira, R., Caraviello, M., Sebe, N.: Money walks: a human-centric study on the economics of personal mobile data. In: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pp. 583–594 (2014). https://doi.org/10.1145/2632048.2632074

  29. Tang, J., Korolova, A., Bai, X., Wang, X., Wang, X.: Privacy loss in apple’s implementation of differential privacy on MacOS 10.12. arXiv preprint arXiv:1709.02753 (2017). https://arxiv.org/abs/1709.02753

  30. Valdez, A.C., Ziefle, M.: The users’ perspective on the privacy-utility trade-offs in health recommender systems. Int. J. Hum Comput. Stud. 121, 108–121 (2019). https://doi.org/10.1016/j.ijhcs.2018.04.003

    Article  Google Scholar 

  31. Xiong, A., Wang, T., Li, N., Jha, S.: Towards effective differential privacy communication for users’ data sharing decision and comprehension. In: 2020 IEEE Symposium on Security and Privacy (SP), pp. 392–410. IEEE (2020). https://doi.org/10.1109/SP40000.2020.00088

Download references

Acknowledgments

This work was partially supported by a grant from the Tel Aviv University Center for AI and Data Science (TAD).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michael Khavkin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Khavkin, M., Toch, E. (2023). Valuation of Differential Privacy Budget in Data Trade: A Conjoint Analysis. In: Bieker, F., Meyer, J., Pape, S., Schiering, I., Weich, A. (eds) Privacy and Identity Management. Privacy and Identity 2022. IFIP Advances in Information and Communication Technology, vol 671. Springer, Cham. https://doi.org/10.1007/978-3-031-31971-6_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-31971-6_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-31970-9

  • Online ISBN: 978-3-031-31971-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics