DPDT: A Differentially Private Crowd-Sensed Data Trading Mechanism

作者: Guoju Gao , Mingjun Xiao , Jie Wu , Sheng Zhang , Liusheng Huang

DOI: 10.1109/JIOT.2019.2944107

关键词:

摘要: Along with the generation of Internet Things (IoT), values tremendous volumes sensing data will be slowly unlocked. Thus, crowd-sensed trading as a new business paradigm has recently attracted increasing attention. A typical system contains platform, consumers, and crowd workers. The platform recruits workers to collect then sells consumers. In this article, we design differentially private mechanism, called DPDT, preserve identity privacy consumers task against during collection process, simultaneously. DPDT consists auction-based pricing algorithm algorithm. achieves good approximation maximum revenue. Meanwhile, it guarantees $(e^{2}-1)\epsilon $ -truthfulness $2\epsilon -differential privacy, where $\epsilon >0$ is small constant. able effectively protect We prove that $\delta -approximate constant, meanwhile tight bound expected ratio. At last, extensive simulations are conducted verify significant performance DPDT.

参考文章(41)
Yueming Wei, Yanmin Zhu, Hongzi Zhu, Qian Zhang, Guangtao Xue, Truthful online double auctions for dynamic mobile crowdsourcing 2015 IEEE Conference on Computer Communications (INFOCOM). pp. 2074- 2082 ,(2015) , 10.1109/INFOCOM.2015.7218592
Frank McSherry, Kunal Talwar, Mechanism Design via Differential Privacy foundations of computer science. pp. 94- 103 ,(2007) , 10.1109/FOCS.2007.41
Dejun Yang, Xi Fang, Guoliang Xue, Truthful incentive mechanisms for k-anonymity location privacy 2013 Proceedings IEEE INFOCOM. pp. 2994- 3002 ,(2013) , 10.1109/INFCOM.2013.6567111
Wahbeh Qardaji, Ninghui Li, Recursive partitioning and summarization: a practical framework for differentially private data publishing computer and communications security. pp. 38- 39 ,(2012) , 10.1145/2414456.2414477
Zhiyi Huang, Sampath Kannan, The Exponential Mechanism for Social Welfare: Private, Truthful, and Nearly Optimal 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science. pp. 140- 149 ,(2012) , 10.1109/FOCS.2012.36
Zheng Qin, Fei Chen, Qiang Wang, Alex X. Liu, Zhiguang Qin, Towards high performance security policy evaluation The Journal of Supercomputing. ,vol. 59, pp. 1577- 1595 ,(2012) , 10.1007/S11227-011-0569-5
Qinghua Li, Guohong Cao, Providing Efficient Privacy-Aware Incentives for Mobile Sensing international conference on distributed computing systems. pp. 208- 217 ,(2014) , 10.1109/ICDCS.2014.29
Cynthia Dwork, Differential privacy: a survey of results theory and applications of models of computation. ,vol. 4978, pp. 1- 19 ,(2008) , 10.1007/978-3-540-79228-4_1
M-F Balcan, Avrim Blum, Jason D Hartline, Yishay Mansour, Mechanism design via machine learning foundations of computer science. pp. 605- 614 ,(2005) , 10.1109/SFCS.2005.50
Frank McSherry, Aaron Roth, Katrina Ligett, Kunal Talwar, Anupam Gupta, Differentially private combinatorial optimization symposium on discrete algorithms. pp. 1106- 1125 ,(2010) , 10.5555/1873601.1873691