Privacy-Preserving Auction for Big Data Trading Using Homomorphic Encryption

Cyber-Physical Systems (smart grid, smart transportation, smart cities, etc.), driven by advances in Internet of Things (IoT) technologies, will provide the infrastructure and integration of smart applications to accelerate the generation and collection of big data to an unprecedented scale. As a fundamental commodity in our current information age, big data is a crucial key to competitiveness in modern commerce. In this paper, we address the issue of privacy preservation for data auction in CPS by leveraging the concept of homomorphic cryptography and secure network protocol design. Specifically, we propose a generic Privacy-Preserving Auction Scheme (PPAS), in which the two independent entities of Auctioneer and Intermediate Platform comprise an untrusted third-party trading platform. Via the implementation of homomorphic encryption and one-time pad, a winner in the auction process can be determined and all bidding information is disguised. Yet, to further improve the security of the privacy-preserving auction, we additionally propose an Enhanced Privacy-Preserving Auction Scheme (EPPAS) that leverages an additional signature verification mechanism. The feasibilities of both schemes are validated through detailed theoretical analyses and extensive performance evaluations, including assessment of the resilience to attacks. In addition, we discuss some open issues and extensions relevant to our scheme.

[1]  Makoto Yokoo,et al.  Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions , 2002, AAMAS '02.

[2]  Yang Zhang,et al.  Towards truthful auction for big data trading , 2017, 2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC).

[3]  Xinwen Fu,et al.  A Survey on Big Data Market: Pricing, Trading and Protection , 2018, IEEE Access.

[4]  Siti Zaiton Mohd Hashim,et al.  A robust video watermarking technique for the tamper detection of surveillance systems , 2015, Multimedia Tools and Applications.

[5]  K. J. Ray Liu,et al.  Data Trading With Multiple Owners, Collectors, and Users: An Iterative Auction Mechanism , 2017, IEEE Transactions on Signal and Information Processing over Networks.

[6]  Fan Wu,et al.  SPRING: A Strategy-proof and Privacy preserving spectrum auction mechanism , 2013, 2013 Proceedings IEEE INFOCOM.

[7]  Xinyu Yang,et al.  A strategy-proof privacy-preserving double auction mechanism for electrical vehicles demand response in microgrids , 2017, 2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC).

[8]  Guihai Chen,et al.  A General Privacy-Preserving Auction Mechanism for Secondary Spectrum Markets , 2016, IEEE/ACM Transactions on Networking.

[9]  Xiang-Yang Li,et al.  Enabling privacy-preserving auctions in big data , 2013, 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[10]  Xuan Zhou,et al.  Buying on Margin and Short Selling in an Artificial Double Auction Market , 2019 .

[11]  Ling Li,et al.  A Bid Evaluation Method for Multi-attribute Online Reverse Auction , 2017 .

[12]  Tianqi Zhou,et al.  TPAHS: A Truthful and Profit Maximizing Double Auction for Heterogeneous Spectrums , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.

[13]  Sancheng Peng,et al.  An Immunization Framework for Social Networks Through Big Data Based Influence Modeling , 2019, IEEE Transactions on Dependable and Secure Computing.

[14]  Kim-Kwang Raymond Choo,et al.  An adversary model to evaluate DRM protection of video contents on iOS devices , 2016, Comput. Secur..

[15]  Ed Dawson,et al.  Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction , 2002, ICICS.

[16]  Kirti Jain,et al.  A Digital Video Watermarking Algorithm Based on LSB and DCT , 2016 .

[17]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[18]  Kunal Talwar,et al.  Mechanism Design via Differential Privacy , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).

[19]  Andrea Roncoroni Commodity Price Models , 2010 .

[20]  Xinyu Yang,et al.  On stochastic optimal bidding strategy for microgrids , 2015, 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC).

[21]  Mohsen Guizani,et al.  Deep Learning for IoT Big Data and Streaming Analytics: A Survey , 2017, IEEE Communications Surveys & Tutorials.

[22]  Xinwen Fu,et al.  DSSS-Based Flow Marking Technique for Invisible Traceback , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[23]  Miao Pan,et al.  Using homomorphic encryption to secure the combinatorial spectrum auction without the trustworthy auctioneer , 2012, Wirel. Networks.

[24]  XiaoYang,et al.  Privacy preservation for V2G networks in smart grid , 2016 .

[25]  Guihai Chen,et al.  Towards Privacy Preservation in Strategy-Proof Spectrum Auction Mechanisms for Noncooperative Wireless Networks , 2015, IEEE/ACM Transactions on Networking.

[26]  Xinyu Yang,et al.  A Real-Time En-Route Route Guidance Decision Scheme for Transportation-Based Cyberphysical Systems , 2017, IEEE Transactions on Vehicular Technology.

[27]  Liusheng Huang,et al.  On Privacy-Preserving Cloud Auction , 2016, 2016 IEEE 35th Symposium on Reliable Distributed Systems (SRDS).

[28]  H. Vincent Poor,et al.  Mobile data trading: A behavioral economics perspective , 2015, 2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt).

[29]  Xinyu Yang,et al.  SODA: Strategy-Proof Online Double Auction Scheme for Multimicrogrids Bidding , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[30]  Zhu Han,et al.  Market model and optimal pricing scheme of big data and Internet of Things (IoT) , 2016, 2016 IEEE International Conference on Communications (ICC).

[31]  Guihai Chen,et al.  Trading Data in Good Faith: Integrating Truthfulness and Privacy Preservation in Data Markets , 2017, 2017 IEEE 33rd International Conference on Data Engineering (ICDE).

[32]  Xiao Lu,et al.  Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing with Differential Privacy , 2018, IEEE Transactions on Dependable and Secure Computing.

[33]  Athanasios V. Vasilakos,et al.  TRAC: Truthful auction for location-aware collaborative sensing in mobile crowdsourcing , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[34]  Weijia Jia,et al.  A new cell counter based attack against tor , 2009, CCS.

[35]  Moni Naor,et al.  Privacy preserving auctions and mechanism design , 1999, EC '99.

[36]  Chunxiao Jiang,et al.  Information Security in Big Data: Privacy and Data Mining , 2014, IEEE Access.

[37]  John A. Stankovic,et al.  Research Directions for the Internet of Things , 2014, IEEE Internet of Things Journal.

[38]  Xuliang Duan,et al.  A Pricing Model for Big Personal Data , 2016 .

[39]  Makoto Yokoo,et al.  Secure Combinatorial Auctions by Dynamic Programming with Polynomial Secret Sharing , 2002, Financial Cryptography.

[40]  Weijia Jia,et al.  Novel Packet Size-Based Covert Channel Attacks against Anonymizer , 2013, IEEE Transactions on Computers.

[41]  Xinyu Yang,et al.  A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.

[42]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2002, Journal of Cryptology.

[43]  Florian Stahl,et al.  Pricing Approaches for Data Markets , 2012, BIRTE.

[44]  Jun Cai,et al.  Two-Stage Spectrum Sharing With Combinatorial Auction and Stackelberg Game in Recall-Based Cognitive Radio Networks , 2014, IEEE Transactions on Communications.

[45]  Rakesh Agrawal,et al.  Privacy-preserving data mining , 2000, SIGMOD 2000.

[46]  Pierangela Samarati,et al.  Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .

[47]  Shui Yu,et al.  Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data , 2016, IEEE Access.

[48]  MengChu Zhou,et al.  VCG Auction-Based Dynamic Pricing for Multigranularity Service Composition , 2018, IEEE Transactions on Automation Science and Engineering.

[49]  Wei Yu,et al.  A Survey of Deep Learning: Platforms, Applications and Emerging Research Trends , 2018, IEEE Access.

[50]  E. Fama,et al.  Commodity futures prices: some evidence on forecast power , 1987 .

[51]  Anmin Fu,et al.  NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users , 2017, IEEE Transactions on Big Data.

[52]  Sanming Zhou,et al.  Networking for Big Data: A Survey , 2017, IEEE Communications Surveys & Tutorials.

[53]  Dusit Niyato,et al.  Profit Maximization Auction and Data Management in Big Data Markets , 2017, 2017 IEEE Wireless Communications and Networking Conference (WCNC).

[54]  Koutroumpis Pantelis,et al.  Understanding the value of (big) data , 2013, 2013 IEEE International Conference on Big Data.

[55]  Beatriz Lorenzo,et al.  A matching game for data trading in operator-supervised user-provided networks , 2016, 2016 IEEE International Conference on Communications (ICC).

[56]  Rajiv Ranjan,et al.  End-to-End Privacy for Open Big Data Markets , 2015, IEEE Cloud Computing.

[57]  Xinyu Yang,et al.  On Optimal PMU Placement-Based Defense Against Data Integrity Attacks in Smart Grid , 2017, IEEE Transactions on Information Forensics and Security.

[58]  Pramod K. Varshney,et al.  Optimal Spectrum Auction Design With 2-D Truthful Revelations Under Uncertain Spectrum Availability , 2017, IEEE/ACM Transactions on Networking.

[59]  Oliver Kirchkamp,et al.  Outside options: Another reason to choose the first-price auction , 2009 .

[60]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[61]  Teng Wang,et al.  Survey on Improving Data Utility in Differentially Private Sequential Data Publishing , 2017, IEEE Transactions on Big Data.