Skip to main content
Erschienen in:

01.04.2025

An efficient and private economic evaluation scheme in data markets

verfasst von: Bing Han, Yong Yuan, Xuhao Ren, Zihang Yin, Cheng Chi, Chuan Zhang

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 2/2025

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Der Artikel stellt ein innovatives wirtschaftliches Bewertungsschema vor, das darauf ausgelegt ist, die Bedenken hinsichtlich der Privatsphäre und die Rechenschwäche traditioneller Methoden auf den Datenmärkten zu berücksichtigen. Durch den Einsatz der Incremental Distributed Point Function (IDPF) und eines Zwei-Server-Modells stellt das vorgeschlagene System sicher, dass Händler ihre Umsatzdaten sicher übermitteln können, ohne sensible finanzielle Details preiszugeben. Dieser Ansatz verringert den Rechen- und Kommunikationsaufwand erheblich und macht ihn für große Datenmärkte praktikabel. Das System wird durch den Einsatz des PCDD-Verschlüsselungssystems zum Schutz der Privatsphäre von Abfragen weiter verbessert, wodurch ein umfassender und sicherer wirtschaftlicher Bewertungsprozess gewährleistet ist. Der Aufsatz präsentiert eine detaillierte Analyse der Richtigkeit und Sicherheit des Programms sowie experimentelle Ergebnisse, die seine Effizienz und Praktikabilität belegen. Diese Arbeit ist insbesondere für Fachleute relevant, die fortschrittliche Lösungen für die sichere Datenaggregation und wirtschaftliche Bewertung suchen.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ke TT, Sudhir K (2023) Privacy rights and data security: Gdpr and personal data markets. Manage Sci 69(8):4389–4412CrossRef Ke TT, Sudhir K (2023) Privacy rights and data security: Gdpr and personal data markets. Manage Sci 69(8):4389–4412CrossRef
2.
Zurück zum Zitat Johnson GA, Shriver SK, Goldberg SG (2023) Privacy and market concentration: intended and unintended consequences of the gdpr. Manage Sci 69(10):5695–5721CrossRef Johnson GA, Shriver SK, Goldberg SG (2023) Privacy and market concentration: intended and unintended consequences of the gdpr. Manage Sci 69(10):5695–5721CrossRef
3.
Zurück zum Zitat Hou J, Liu D, Huang C, Zhuang W, Shen X, Sun R, Ying B (2023) Data protection: privacy-preserving data collection with validation. IEEE Trans Dependable Secure Comput Hou J, Liu D, Huang C, Zhuang W, Shen X, Sun R, Ying B (2023) Data protection: privacy-preserving data collection with validation. IEEE Trans Dependable Secure Comput
4.
Zurück zum Zitat Zhang C, Luo X, Liang J, Liu X, Zhu L, Guo S (2024) Pota: privacy-preserving online multi-task assignment with path planning. IEEE Trans Mob Comput 23(5):5999–6011 Zhang C, Luo X, Liang J, Liu X, Zhu L, Guo S (2024) Pota: privacy-preserving online multi-task assignment with path planning. IEEE Trans Mob Comput 23(5):5999–6011
5.
Zurück zum Zitat Hu C, Zhang C, Lei D, Wu T, Liu X, Zhu L (2023) Achieving privacy-preserving and verifiable support vector machine training in the cloud. IEEE Trans Inf Forensics Secur 18:3476–4291CrossRef Hu C, Zhang C, Lei D, Wu T, Liu X, Zhu L (2023) Achieving privacy-preserving and verifiable support vector machine training in the cloud. IEEE Trans Inf Forensics Secur 18:3476–4291CrossRef
6.
Zurück zum Zitat Klaine PV, Xu H, Zhang L, Imran M, Zhu Z (2023) A privacy-preserving blockchain platform for a data marketplace. Distributed Ledger Technol: Res Pract 2(1):1–16CrossRef Klaine PV, Xu H, Zhang L, Imran M, Zhu Z (2023) A privacy-preserving blockchain platform for a data marketplace. Distributed Ledger Technol: Res Pract 2(1):1–16CrossRef
7.
Zurück zum Zitat Li D, Zhao Y, Wang Y, An D, Yang Q (2024) The privacy preserving auction mechanisms in iot-based trading market: A survey. Internet Things 26:101178CrossRef Li D, Zhao Y, Wang Y, An D, Yang Q (2024) The privacy preserving auction mechanisms in iot-based trading market: A survey. Internet Things 26:101178CrossRef
8.
Zurück zum Zitat Zhang C, Hu C, Wu T, Zhu L, Liu X (2023) Achieving efficient and privacy-preserving neural network training and prediction in cloud environments. IEEE Trans Dependable Secure Comput 20(5):4245–4257CrossRef Zhang C, Hu C, Wu T, Zhu L, Liu X (2023) Achieving efficient and privacy-preserving neural network training and prediction in cloud environments. IEEE Trans Dependable Secure Comput 20(5):4245–4257CrossRef
9.
Zurück zum Zitat Xue L, Liu D, Huang C, Shen X, Zhuang W, Sun R, Ying B (2022) Blockchain-based data sharing with key update for future networks. IEEE J Sel Areas Commun 40(12):3437–3451CrossRef Xue L, Liu D, Huang C, Shen X, Zhuang W, Sun R, Ying B (2022) Blockchain-based data sharing with key update for future networks. IEEE J Sel Areas Commun 40(12):3437–3451CrossRef
10.
Zurück zum Zitat Zhang C, Zhao M, Liang J, Fan Q, Zhu L, Guo S (2024) Nano: Cryptographic enforcement of readability and editability governance in blockchain databases. IEEE Trans Dependable Secure Comput 21(4):3439–3452CrossRef Zhang C, Zhao M, Liang J, Fan Q, Zhu L, Guo S (2024) Nano: Cryptographic enforcement of readability and editability governance in blockchain databases. IEEE Trans Dependable Secure Comput 21(4):3439–3452CrossRef
11.
Zurück zum Zitat Cui J, Jiang H, Xu Z (2023) Digital marketing program design based on abnormal consumer behavior data classification and improved homomorphic encryption algorithm. PeerJ Comput Sci 9:1690CrossRef Cui J, Jiang H, Xu Z (2023) Digital marketing program design based on abnormal consumer behavior data classification and improved homomorphic encryption algorithm. PeerJ Comput Sci 9:1690CrossRef
12.
Zurück zum Zitat Foti M (2023) Privacy-preserving market-driven transactive energy system using homomorphic encryption. In: 2023 19th International Conference on the European Energy Market (EEM), IEEE, pp 1–8 Foti M (2023) Privacy-preserving market-driven transactive energy system using homomorphic encryption. In: 2023 19th International Conference on the European Energy Market (EEM), IEEE, pp 1–8
13.
Zurück zum Zitat Lu T, Zhang B, Ren K (2023) Privdata network: a privacy-preserving on-chain data factory and trading market. IEEE Trans Dependable Secure Comput 21(3):1424–1436CrossRef Lu T, Zhang B, Ren K (2023) Privdata network: a privacy-preserving on-chain data factory and trading market. IEEE Trans Dependable Secure Comput 21(3):1424–1436CrossRef
14.
Zurück zum Zitat Bernabé-Rodríguez J, Garreta A, Lage O (2024) A decentralized private data marketplace using blockchain and secure multi-party computation. ACM Trans Privacy Secur 27(2):1–29CrossRef Bernabé-Rodríguez J, Garreta A, Lage O (2024) A decentralized private data marketplace using blockchain and secure multi-party computation. ACM Trans Privacy Secur 27(2):1–29CrossRef
15.
Zurück zum Zitat Huang C, Liu D, Yang A, Lu R, Shen X (2024) Pprp: preserving location privacy for range-based positioning in mobile networks. IEEE Trans Mobile Comput Huang C, Liu D, Yang A, Lu R, Shen X (2024) Pprp: preserving location privacy for range-based positioning in mobile networks. IEEE Trans Mobile Comput
16.
Zurück zum Zitat Li C, He A, Wen Y, Liu G, Chronopoulos AT (2023) Optimal trading mechanism based on differential privacy protection and stackelberg game in big data market. IEEE Trans Serv Comput 16(5):3550–3563CrossRef Li C, He A, Wen Y, Liu G, Chronopoulos AT (2023) Optimal trading mechanism based on differential privacy protection and stackelberg game in big data market. IEEE Trans Serv Comput 16(5):3550–3563CrossRef
17.
Zurück zum Zitat Bajari P, Chernozhukov V, Hortaçsu A, Suzuki J (2019) The impact of big data on firm performance: An empirical investigation. In: AEA Papers and Proceedings, vol 109, pp 33–37. American Economic Association 2014 Broadway, Suite 305, Nashville, TN 37203 Bajari P, Chernozhukov V, Hortaçsu A, Suzuki J (2019) The impact of big data on firm performance: An empirical investigation. In: AEA Papers and Proceedings, vol 109, pp 33–37. American Economic Association 2014 Broadway, Suite 305, Nashville, TN 37203
18.
Zurück zum Zitat Farboodi M, Mihet R, Philippon T, Veldkamp L (2019) Big data and firm dynamics. In: AEA Papers and Proceedings, vol 109, pp 38–42. American Economic Association 2014 Broadway, Suite 305, Nashville, TN 37203 Farboodi M, Mihet R, Philippon T, Veldkamp L (2019) Big data and firm dynamics. In: AEA Papers and Proceedings, vol 109, pp 38–42. American Economic Association 2014 Broadway, Suite 305, Nashville, TN 37203
19.
Zurück zum Zitat Keshk M, Turnbull B, Moustafa N, Vatsalan D, Choo K-KR (2019) A privacy-preserving-framework-based blockchain and deep learning for protecting smart power networks. IEEE Trans Industr Inf 16(8):5110–5118CrossRef Keshk M, Turnbull B, Moustafa N, Vatsalan D, Choo K-KR (2019) A privacy-preserving-framework-based blockchain and deep learning for protecting smart power networks. IEEE Trans Industr Inf 16(8):5110–5118CrossRef
20.
Zurück zum Zitat Chen D, Bovornkeeratiroj P, Irwin D, Shenoy P (2018) Private memoirs of iot devices: Safeguarding user privacy in the iot era. In: 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), pp 1327–1336 Chen D, Bovornkeeratiroj P, Irwin D, Shenoy P (2018) Private memoirs of iot devices: Safeguarding user privacy in the iot era. In: 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), pp 1327–1336
21.
Zurück zum Zitat Cohen R, Doerner J, Kondi Y, Shelat A (2024) Secure multiparty computation with identifiable abort via vindicating release. In: Annual International Cryptology Conference, Springer, pp 36–73 Cohen R, Doerner J, Kondi Y, Shelat A (2024) Secure multiparty computation with identifiable abort via vindicating release. In: Annual International Cryptology Conference, Springer, pp 36–73
22.
Zurück zum Zitat Ahammed MF, Labu MR (2024) Privacy-preserving data sharing in healthcare: advances in secure multiparty computation. J Med Health Studies 5(2):37–47 Ahammed MF, Labu MR (2024) Privacy-preserving data sharing in healthcare: advances in secure multiparty computation. J Med Health Studies 5(2):37–47
23.
Zurück zum Zitat Ren X, Yu C-M, Yu W, Yang S, Yang X, McCann JA, Philip SY (2018) Lopub: high-dimensional crowdsourced data publication with local differential privacy. IEEE Trans Inf Forensics Secur 13(9):2151–2166CrossRef Ren X, Yu C-M, Yu W, Yang S, Yang X, McCann JA, Philip SY (2018) Lopub: high-dimensional crowdsourced data publication with local differential privacy. IEEE Trans Inf Forensics Secur 13(9):2151–2166CrossRef
24.
Zurück zum Zitat Wang T, Blocki J, Li N, Jha S (2017) Locally differentially private protocols for frequency estimation. In: 26th USENIX Security Symposium (USENIX Security 17), pp 729–745 Wang T, Blocki J, Li N, Jha S (2017) Locally differentially private protocols for frequency estimation. In: 26th USENIX Security Symposium (USENIX Security 17), pp 729–745
26.
Zurück zum Zitat Boyle E, Gilboa N, Ishai Y (2015) Function secret sharing. In: Annual international conference on the theory and applications of cryptographic techniques, Springer, pp 337–367 Boyle E, Gilboa N, Ishai Y (2015) Function secret sharing. In: Annual international conference on the theory and applications of cryptographic techniques, Springer, pp 337–367
27.
Zurück zum Zitat Jawalkar N, Gupta K, Basu A, Chandran N, Gupta D, Sharma R (2023) Orca: Fss-based secure training and inference with gpus. In: 2024 IEEE Symposium on Security and Privacy (SP), IEEE Computer Society, pp 63–63 Jawalkar N, Gupta K, Basu A, Chandran N, Gupta D, Sharma R (2023) Orca: Fss-based secure training and inference with gpus. In: 2024 IEEE Symposium on Security and Privacy (SP), IEEE Computer Society, pp 63–63
28.
Zurück zum Zitat Boyle E, Gilboa N, Ishai Y (2016) Function secret sharing: Improvements and extensions. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pp 1292–1303 Boyle E, Gilboa N, Ishai Y (2016) Function secret sharing: Improvements and extensions. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pp 1292–1303
29.
Zurück zum Zitat Dauterman E, Rathee M, Popa RA, Stoica I (2022) Waldo: a private time-series database from function secret sharing. In: 2022 IEEE Symposium on Security and Privacy (SP), IEEE, pp 2450–2468 Dauterman E, Rathee M, Popa RA, Stoica I (2022) Waldo: a private time-series database from function secret sharing. In: 2022 IEEE Symposium on Security and Privacy (SP), IEEE, pp 2450–2468
30.
Zurück zum Zitat Kohlweiss M, Lysyanskaya A, Nguyen A (2023) Privacy-preserving blueprints. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, pp 594–625 Kohlweiss M, Lysyanskaya A, Nguyen A (2023) Privacy-preserving blueprints. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, pp 594–625
31.
Zurück zum Zitat Huang C, Liu D, Yang A, Lu R, Shen X (2024) Multi-client secure and efficient dpf-based keyword search for cloud storage. IEEE Trans Dependable Secure Comput 21(1):353–371 Huang C, Liu D, Yang A, Lu R, Shen X (2024) Multi-client secure and efficient dpf-based keyword search for cloud storage. IEEE Trans Dependable Secure Comput 21(1):353–371
32.
Zurück zum Zitat Liu X, Qin B, Deng RH, Lu R, Ma J (2016) A privacy-preserving outsourced functional computation framework across large-scale multiple encrypted domains. IEEE Trans Comput 65(12):3567–3579 Liu X, Qin B, Deng RH, Lu R, Ma J (2016) A privacy-preserving outsourced functional computation framework across large-scale multiple encrypted domains. IEEE Trans Comput 65(12):3567–3579
33.
Zurück zum Zitat Guo X, Li J, Liu Z, Wei Y, Zhang X, Dong C (2022) Labrador: towards fair and auditable data sharing in cloud computing with long-term privacy. Sci China Inf Sci 65(5):1–14MathSciNetCrossRef Guo X, Li J, Liu Z, Wei Y, Zhang X, Dong C (2022) Labrador: towards fair and auditable data sharing in cloud computing with long-term privacy. Sci China Inf Sci 65(5):1–14MathSciNetCrossRef
34.
Zurück zum Zitat Boneh D, Boyle E, Corrigan-Gibbs H, Gilboa N, Ishai Y (2021) Lightweight techniques for private heavy hitters. In: 2021 IEEE Symposium on Security and Privacy (SP), IEEE, pp 762–776 Boneh D, Boyle E, Corrigan-Gibbs H, Gilboa N, Ishai Y (2021) Lightweight techniques for private heavy hitters. In: 2021 IEEE Symposium on Security and Privacy (SP), IEEE, pp 762–776
35.
Zurück zum Zitat Chatterjee U, Ray S, Adhikari S, Khan MK, Dasgupta M (2023) Efficient and secure e-voting scheme using elliptic curve cryptography. Secur Privacy 6(3):283CrossRef Chatterjee U, Ray S, Adhikari S, Khan MK, Dasgupta M (2023) Efficient and secure e-voting scheme using elliptic curve cryptography. Secur Privacy 6(3):283CrossRef
Metadaten
Titel
An efficient and private economic evaluation scheme in data markets
verfasst von
Bing Han
Yong Yuan
Xuhao Ren
Zihang Yin
Cheng Chi
Chuan Zhang
Publikationsdatum
01.04.2025
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 2/2025
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-024-01820-w