AccountTrade: Accountability Against Dishonest Big Data Buyers and Sellers

In this paper, a set of accountable protocols denoted as AccountTrade is proposed for big data trading among dishonest consumers. For achieving a secure big data trading environment, AccountTrade achieves book-keeping ability and accountability against dishonest consumers throughout the trading (i.e., buying and selling) of datasets. We investigate the consumers’ responsibilities in the dataset trading, then we design AccountTrade to achieve accountability against dishonest consumers that are likely to deviate from the responsibilities. Specifically, a uniqueness index is defined and proposed, which is a new rigorous measurement of the data uniqueness for this purpose. Furthermore, several accountable trading protocols are presented to enable data brokers to blame the misbehaving entities when misbehavior is detected. The accountability of AccountTrade is formally defined, proved, and evaluated by an automatic verification tool as well as extensive simulation with real-world datasets. Our evaluation shows that AccountTrade incurs at most 10-kB storage overhead per file, and it is capable of 8–1000 concurrent data upload requests per server.

[1]  Xiang-Yang Li,et al.  Graph-based privacy-preserving data publication , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[2]  M. B. Chandak,et al.  KEY FRAME EXTRACTION METHODOLOGY FOR VIDEO ANNOTATION , 2013 .

[3]  Pierre Baldi,et al.  Mathematical Correction for Fingerprint Similarity Measures to Improve Chemical Retrieval , 2007, J. Chem. Inf. Model..

[4]  Li Fan,et al.  Summary cache: a scalable wide-area web cache sharing protocol , 2000, TNET.

[5]  Yunhao Liu,et al.  PIC: Enable Large-Scale Privacy Preserving Content-Based Image Search on Cloud , 2015, IEEE Transactions on Parallel and Distributed Systems.

[6]  Jens Lehmann,et al.  Quality assessment for Linked Data: A Survey , 2015, Semantic Web.

[7]  Jianzhong Li,et al.  Efficient Subgraph Matching on Billion Node Graphs , 2012, Proc. VLDB Endow..

[8]  V. Akhil SALIENT REGION DETECTION via HIGH-DIMENSIONAL COLOR TRANSFORM AND LOCAL SPATIAL SUPPORT , 2018 .

[9]  Geoffrey Zweig,et al.  Syntactic Clustering of the Web , 1997, Comput. Networks.

[10]  Yang Xiao Flow-net methodology for accountability in wireless networks , 2009, IEEE Network.

[11]  Yunhao Liu,et al.  POP: Privacy-Preserving Outsourced Photo Sharing and Searching for Mobile Devices , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.

[12]  Xiang-Yang Li,et al.  Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel , 2015, IEEE Transactions on Dependable and Secure Computing.

[13]  Richard Chbeir,et al.  An overview on XML similarity: Background, current trends and future directions , 2009, Comput. Sci. Rev..

[14]  Xiang-Yang Li,et al.  PDA: Semantically Secure Time-Series Data Analytics with Dynamic User Groups , 2013, IEEE Transactions on Dependable and Secure Computing.

[15]  Siani Pearson,et al.  Accountability for Data Governance in Cloud Ecosystems , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.

[16]  Siu-Ming Yiu,et al.  An efficient and scalable algorithm for clustering XML documents by structure , 2004, IEEE Transactions on Knowledge and Data Engineering.

[17]  Xiang-Yang Li,et al.  AccountTrade: Accountable protocols for big data trading against dishonest consumers , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[18]  Heejo Lee,et al.  OMAP: One-Way Memory Attestation Protocol for Smart Meters , 2011, 2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications Workshops.

[19]  Jure Leskovec,et al.  {SNAP Datasets}: {Stanford} Large Network Dataset Collection , 2014 .

[20]  Andreas Haeberlen,et al.  Accountable Virtual Machines , 2010, OSDI.

[21]  Yi Liu,et al.  Large-scale image annotation using visual synset , 2011, 2011 International Conference on Computer Vision.

[22]  Hector Garcia-Molina,et al.  Copy detection mechanisms for digital documents , 1995, SIGMOD '95.

[23]  Michael Isard,et al.  General Theory , 1969 .

[24]  Andrei Z. Broder,et al.  On the resemblance and containment of documents , 1997, Proceedings. Compression and Complexity of SEQUENCES 1997 (Cat. No.97TB100171).

[25]  Ralf Küsters,et al.  Accountability: definition and relationship to verifiability , 2010, CCS '10.

[26]  Andreas Haeberlen,et al.  PeerReview: practical accountability for distributed systems , 2007, SOSP.

[27]  Michael Isard,et al.  Partition Min-Hash for Partial Duplicate Image Discovery , 2010, ECCV.

[28]  Stephen A. Cook,et al.  The complexity of theorem-proving procedures , 1971, STOC.

[29]  George A. Miller,et al.  WordNet: A Lexical Database for English , 1995, HLT.

[30]  Rajkumar Buyya,et al.  Application-aware end-to-end delay and message loss estimation in Internet of Things (IoT) - MQTT-SN protocols , 2018, Future Gener. Comput. Syst..

[31]  Cordelia Schmid,et al.  An Image-Based Approach to Video Copy Detection With Spatio-Temporal Post-Filtering , 2010, IEEE Transactions on Multimedia.

[32]  Bruno Blanchet,et al.  Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerif , 2013, FOSAD.

[33]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[34]  Moses Charikar,et al.  Similarity estimation techniques from rounding algorithms , 2002, STOC '02.

[35]  Thomas Brox,et al.  A Unified Video Segmentation Benchmark: Annotation, Metrics and Analysis , 2013, 2013 IEEE International Conference on Computer Vision.

[36]  James Heather,et al.  The Append-Only Web Bulletin Board , 2008, Formal Aspects in Security and Trust.

[37]  Peter Steenkiste,et al.  Balancing accountability and privacy in the network , 2014, SIGCOMM.

[38]  K. J. Ray Liu,et al.  An iterative auction mechanism for data trading , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[39]  Tao Liu,et al.  Effective and scalable video copy detection , 2010, MIR '10.

[40]  Jacques Traoré,et al.  A practical and secure coercion-resistant scheme for remote elections , 2007, Frontiers of Electronic Voting.