• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Zhang, M. (Zhang, M..) [1] | Li, X. (Li, X..) [2] | Ren, Y. (Ren, Y..) [3] | Luo, B. (Luo, B..) [4] | Miao, Y. (Miao, Y..) [5] | Liu, X. (Liu, X..) [6] (Scholars:刘西蒙) | Deng, R.H. (Deng, R.H..) [7]

Indexed by:

Scopus

Abstract:

To motivate data owner (DO) to trade data, the existing data trading allows DO to sell the disturbed data to the data consumer (DC), where the disturbance parameter and the data price are negotiated by them, and DO independently adds the disturbance noise to data (usually continuous type) following the negotiation result. However, DOs may violate the negotiated parameter and add more noise to data while obtaining the negotiated price, which damages DC's disturbed data availability. This deficiency is rooted in the absence of supervision and verifiability on DOs' independent disturbances. Aiming at the above problem, we devise a privacy-preserved data trading via verifiable data disturbance. Specifically, the honest-but-curious disturbance server (DS) is introduced to generate encrypted verifiable disturbance noises, and secretly distribute noises to DOs referring to the method of private information retrieval. Using homomorphic encryption, DOs finish data disturbance without knowing noises' specific sizes. Subsequently, DC selects DOs to verify with our proposed anti-forgery verification, where the anti-forgery on both disturbance noise and original data guarantees verification correctness. Theoretical analysis proves that DOs' original data is preserved in data trading. Extensive experiments using the real-world dataset demonstrate that our scheme can detect more than 80% of malicious DOs and decrease their utilities to punish malicious disturbance compared with existing works. IEEE

Keyword:

availability requirement data trading Differential privacy Games Nash equilibrium Pricing Privacy privacy preserved private information retrieval Public key Servers

Community:

  • [ 1 ] [Zhang M.]State Key Laboratory of Integrated Services Networks, and the School of Cyber Engineering, Xidian University, Xi'an, China
  • [ 2 ] [Li X.]State Key Laboratory of Integrated Services Networks, and the School of Cyber Engineering, Xidian University, Xi'an, China
  • [ 3 ] [Ren Y.]State Key Laboratory of Integrated Services Networks, and the School of Cyber Engineering, Xidian University, Xi'an, China
  • [ 4 ] [Luo B.]State Key Laboratory of Integrated Services Networks, and the School of Cyber Engineering, Xidian University, Xi'an, China
  • [ 5 ] [Miao Y.]State Key Laboratory of Integrated Services Networks, and the School of Cyber Engineering, Xidian University, Xi'an, China
  • [ 6 ] [Liu X.]College of Mathematics and Computer Science, Fuzhou University, Fujian, China
  • [ 7 ] [Deng R.H.]Department of Information Systems, Singapore Management University, 80 Stamford Road, Singapore

Reprint 's Address:

Email:

Show more details

Related Keywords:

Source :

IEEE Transactions on Dependable and Secure Computing

ISSN: 1545-5971

Year: 2023

Issue: 4

Volume: 21

Page: 1-14

7 . 0

JCR@2023

7 . 0 0 0

JCR@2023

JCR Journal Grade:1

CAS Journal Grade:1

Cited Count:

WoS CC Cited Count: 0

SCOPUS Cited Count: 1

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 0

Online/Total:104/10273112
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1