Solving Data Trading Dilemma with Asymmetric Incomplete Information Using Zero-Determinant Strategy

Trading data between user and service provider is a promising and efficient method to promote information exchange, service quality improvement, and development of emerging applications, benefiting individual and society. Meanwhile, data resale (i.e., data secondary use) is one of the most critical privacy issues hindering the ongoing process of data trading, which, unfortunately, is ignored in many of the existing privacy-preserving schemes. In this paper, we tackle the issue of data resale from a special angle, i.e., promoting cooperation between user and service provider to prevent data secondary use. For this purpose, we design a novel game-theoretical algorithm, in which user can unilaterally persuade service provider to cooperate in data trading, achieving a “win-win” situation. Besides, we validate our proposed algorithm performance through in-depth theoretical analysis and comprehensive simulations.

[1]  Niki Pissinou,et al.  Game theoretic modeling of security and trust relationship in cyberspace , 2016, Int. J. Commun. Syst..

[2]  Qian Zhang,et al.  A stochastic game for privacy preserving context sensing on mobile phone , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[3]  Richeng Jin,et al.  On the Tradeoff between Privacy and Utility in Collaborative Intrusion Detection Systems-A Game Theoretical Approach , 2017, HotSoS.

[4]  W. Press,et al.  Iterated Prisoner’s Dilemma contains strategies that dominate any evolutionary opponent , 2012, Proceedings of the National Academy of Sciences.

[5]  Yingshu Li,et al.  Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks , 2018, IEEE Transactions on Dependable and Secure Computing.

[6]  O. Günther,et al.  Privacy concerns and identity in online social networks , 2009 .

[7]  Lei Li,et al.  Cognitive Approach for Location Privacy Protection , 2018, IEEE Access.

[8]  Jiguo Yu,et al.  Efficient privacy-preserving schemes for dot-product computation in mobile computing , 2016, PAMCO '16.

[9]  Yi Liang,et al.  Deep Learning Based Inference of Private Information Using Embedded Sensors in Smart Devices , 2018, IEEE Network.

[10]  Stephen Armstrong,et al.  What happens to data gathered by health and wellness apps? , 2016, British Medical Journal.

[11]  Xiaolei Wang,et al.  DroidContext: Identifying Malicious Mobile Privacy Leak Using Context , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.

[12]  Lei Ying,et al.  A game-theoretic approach to quality control for collecting privacy-preserving data , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[13]  Carmela Troncoso,et al.  Privacy Games Along Location Traces , 2016, ACM Trans. Priv. Secur..

[14]  Chunqiang Hu,et al.  Secure multi-unit sealed first-price auction mechanisms , 2016, Secur. Commun. Networks.

[15]  Jiguo Yu,et al.  A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds , 2018, IEEE Transactions on Big Data.

[16]  Jörgen W. Weibull,et al.  Evolutionary Game Theory , 1996 .

[17]  Zhipeng Cai,et al.  A Private and Efficient Mechanism for Data Uploading in Smart Cyber-Physical Systems , 2020, IEEE Transactions on Network Science and Engineering.

[18]  Jianzhong Li,et al.  Location-privacy-aware review publication mechanism for local business service systems , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.