A Secure Incentive Mechanism for Competitive Organization Data Sharing: A Contract Theoretic Approach

With the development of information technology, various data-driven intelligent services have changed our daily life greatly. As the data fuels the development of these services, data sharing is desirable for data availability issues. Many mechanisms and technologies have been proposed to support data sharing. However, some organizations, especially with potential competitive relationships are still reluctant to share their data. On one hand, no data holder wish to see the competitiveness improvement of competitors by data sharing. On the other hand, data sharing suffers from huge privacy security risks. To encourage data sharing, in this paper, a competitiveness-driven and secure incentive mechanism is proposed. By introducing the concept of data competitiveness as incentive motivation, competitiveness worry of data holders is eliminated. Privacy is protected by adopting differential privacy. As the privacy protection levels of data holders are unknown to the data demander, a contract theoretic approach is proposed to formulate the incentive mechanism. With the design of optimal contracts, the data demander can make the best decisions to pay data holders and data holders can optimize their utilities by choosing proper contracts. The numerical results demonstrate the effectiveness of the proposed incentive scheme.

[1]  Krzysztof J. Gorgolewski,et al.  Making big data open: data sharing in neuroimaging , 2014, Nature Neuroscience.

[2]  Florian Skopik,et al.  A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing , 2016, Comput. Secur..

[3]  Peter Groves,et al.  The 'big data' revolution in healthcare: Accelerating value and innovation , 2016 .

[4]  Randy H. Katz,et al.  A Berkeley View of Systems Challenges for AI , 2017, ArXiv.

[5]  Athanasios V. Vasilakos,et al.  SeDaSC: Secure Data Sharing in Clouds , 2017, IEEE Systems Journal.

[6]  Jie Tian,et al.  An Incentive Mechanism for Cross-Organization Data Sharing Based on Data Competitiveness , 2018, IEEE Access.

[7]  Úlfar Erlingsson,et al.  RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response , 2014, CCS.

[8]  Tian Zhang,et al.  Data Offloading in Mobile Edge Computing: A Coalition and Pricing Based Approach , 2018, IEEE Access.

[9]  Md Zahidul Islam,et al.  Ieee Transactions on Knowledge and Data Engineering 1 Differentially Private Random Decision Forests Using Smooth Sensitivity , 2022 .

[10]  Kunal Talwar,et al.  Mechanism Design via Differential Privacy , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).

[11]  Jiafu Wan,et al.  A multimedia healthcare data sharing approach through cloud-based body area network , 2017, Future Gener. Comput. Syst..

[12]  Lin Gao,et al.  A contract-based incentive mechanism for crowdsourced wireless community networks , 2016, 2016 14th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt).

[13]  Victor C. M. Leung,et al.  Energy-Efficient Topology Control With Selective Diversity in Cooperative Wireless Ad Hoc Networks: A Game-Theoretic Approach , 2014, IEEE Transactions on Wireless Communications.

[14]  Jun Tang,et al.  Privacy Loss in Apple's Implementation of Differential Privacy on MacOS 10.12 , 2017, ArXiv.

[15]  V. Balu,et al.  Effective Incentive Compatible Model for Privacy Preservation of Information in Secure Data Sharing and Publishing , 2014 .

[16]  Shaojie Tang,et al.  A Budget Feasible Incentive Mechanism for Weighted Coverage Maximization in Mobile Crowdsensing , 2017, IEEE Transactions on Mobile Computing.

[17]  J. Laffont,et al.  The Theory of Incentives: The Principal-Agent Model , 2001 .

[18]  Baik Hoh,et al.  Sell your experiences: a market mechanism based incentive for participatory sensing , 2010, 2010 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[19]  Liviu Iftode,et al.  Seeing Is Believing: Sharing Real-Time Visual Traffic Information via Vehicular Clouds , 2016, IEEE Access.

[20]  K. J. Ray Liu,et al.  Privacy or Utility in Data Collection? A Contract Theoretic Approach , 2015, IEEE Journal of Selected Topics in Signal Processing.

[21]  Wei Song,et al.  Auction Mechanisms Toward Efficient Resource Sharing for Cloudlets in Mobile Cloud Computing , 2016, IEEE Transactions on Services Computing.

[22]  Kaiying Feng,et al.  Improving availability and confidentiality of shared data under the multi-cloud environment , 2017, 2017 IEEE 2nd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA).

[23]  Stephen R. Rannels,et al.  A Distributed Publisher-Driven Secure Data Sharing Scheme for Information-Centric IoT , 2018 .

[24]  Jie Tian,et al.  QoS-Constrained Medium Access Probability Optimization in Wireless Interference-Limited Networks , 2018, IEEE Transactions on Communications.

[25]  Kin K. Leung,et al.  A Survey of Incentive Mechanisms for Participatory Sensing , 2015, IEEE Communications Surveys & Tutorials.

[26]  Xiaodong Lin,et al.  A Privacy-Preserving Data-Sharing Framework for Smart Grid , 2017, IEEE Internet of Things Journal.

[27]  Jie Tian,et al.  A Competitiveness-driven and Secure Incentive Mechanism for Competitive Organizations Data Sharing: A Contract Theoretic Approach , 2018, 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN).

[28]  H. Bauchner,et al.  A picture is worth a thousand words , 2002, BMJ : British Medical Journal.

[29]  William S. Levine,et al.  Optimal control theory: An introduction , 1972 .

[30]  V. N. Venu Gopal,et al.  Cost-Effective Authentic and Anonymous Data Sharing With Forward Security , 2016 .

[31]  Benjamin Fabian,et al.  Collaborative and secure sharing of healthcare data in multi-clouds , 2015, Inf. Syst..

[32]  Ryan K. L. Ko,et al.  Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography , 2017, 2017 IEEE Trustcom/BigDataSE/ICESS.

[33]  Cynthia Dwork,et al.  Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.

[34]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[35]  Jean C. Walrand,et al.  Motivating Smartphone Collaboration in Data Acquisition and Distributed Computing , 2014, IEEE Transactions on Mobile Computing.