Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3328526.3329633acmconferencesArticle/Chapter ViewAbstractPublication PagesecConference Proceedingsconference-collections
research-article

Adversarial Contract Design for Private Data Commercialization

Published: 17 June 2019 Publication History

Abstract

The proliferation of data collection and machine learning techniques has created an opportunity for commercialization of private data by data aggregators. In this paper, we study this data monetization problem as a mechanism design problem, specifically using a contract-theoretic approach. Our proposed adversarial contract design framework provides a fundamental extension to the classic contract theory set-up in order to account for the heterogeneity in honest buyers' demands for data, as well as the presence of adversarial buyers who may purchase data to compromise its privacy. We propose the notion of Price of Adversary $(PoAdv)$ to quantify the effects of adversarial users on the data seller's revenue, and provide bounds on the $PoAdv$ for various classes of adversary utility. We also provide a fast approximate technique to compute contracts in the presence of adversaries.

Supplementary Material

MP4 File (p681-naghizadeh.mp4)

References

[1]
Acxiom. 2018. Acxiom. https://www.acxiom.com/how-we-can-help/data-stewardship/. Accessed: 2018--12--15.
[2]
Nabil R Adam and John C Worthmann. 1989. Security-control methods for statistical databases: a comparative study. ACM Computing Surveys (CSUR), Vol. 21, 4 (1989), 515--556.
[3]
Moshe Babaioff and Eyal Winter. 2014. Contract complexity. In Proceedings of the 15th ACM Conference on Economics and Computation.
[4]
Sridhar Balasubramanian, Shantanu Bhattacharya, and Vish V Krishnan. 2015. Pricing information goods: A strategic analysis of the selling and pay-per-use mechanisms. Marketing Science, Vol. 34, 2 (2015), 218--234.
[5]
Prabal Banerjee and Sushmita Ruj. 2018. Blockchain Enabled Data Marketplace - Design and Challenges. CoRR, Vol. abs/1811.11462 (2018). arxiv: 1811.11462 http://arxiv.org/abs/1811.11462
[6]
Felix Brandt, Tuomas Sandholm, and Yoav Shoham. 2007. Spiteful Bidding in Sealed-Bid Auctions. In IJCAI, Vol. 7. 1207--1214.
[7]
Anil Kumar Chorppath and Tansu Alpcan. 2011. Adversarial behavior in network mechanism design. In Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools. ICST, 506--514.
[8]
Irit Dinur and Kobbi Nissim. 2003. Revealing information while preserving privacy. In Proceedings of the 22nd ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems. ACM, 202--210.
[9]
Cynthia Dwork. 2008. Differential privacy: A survey of results. In International Conference on Theory and Applications of Models of Computation. Springer, 1--19.
[10]
Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating noise to sensitivity in private data analysis. In Theory of cryptography conference . Springer, 265--284.
[11]
Arpita Ghosh, Katrina Ligett, Aaron Roth, and Grant Schoenebeck. 2014. Buying private data without verification. In Proceedings of the fifteenth ACM conference on Economics and computation. ACM, 931--948.
[12]
Arpita Ghosh and Aaron Roth. 2011. Selling Privacy at Auction. In Proceedings of the 12th ACM Conference on Electronic Commerce (EC '11). 199--208.
[13]
Vasilis Gkatzelis, Christina Aperjis, and Bernardo A Huberman. 2015. Pricing private data. Electronic Markets, Vol. 25, 2 (2015), 109--123.
[14]
Kevin Granville. 2018. Facebook and Cambridge Analytica: What You Need to Know as Fallout Widens . https://www.nytimes.com/2018/03/19/technology/facebook-cambridge-analytica-explained.html .
[15]
Chien-Ju Ho, Aleksandrs Slivkins, and Jennifer Wortman Vaughan. 2016. Adaptive contract design for crowdsourcing markets: Bandit algorithms for repeated principal-agent problems. Journal of Artificial Intelligence Research, Vol. 55 (2016), 317--359.
[16]
Justin Hsu, Marco Gaboardi, Andreas Haeberlen, Sanjeev Khanna, Arjun Narayan, Benjamin C Pierce, and Aaron Roth. 2014. Differential privacy: An economic method for choosing epsilon. In Computer Security Foundations Symposium (CSF), 2014 IEEE 27th. IEEE, 398--410.
[17]
Jon Kleinberg, Christos Papadimitriou, and Prabhakar Raghavan. 2003. Auditing boolean attributes. J. Comput. System Sci., Vol. 66, 1 (2003), 244--253.
[18]
Pantelis Koutroumpis and Aija Leiponen. 2013. Understanding the value of (big) data. In The 2013 IEEE International Conference on Big Data. IEEE, 38--42.
[19]
Chao Li, Daniel Yang Li, Gerome Miklau, and Dan Suciu. 2014. A theory of pricing private data. ACM Transactions on Database Systems (TODS), Vol. 39, 4 (2014), 34.
[20]
Andreu Mas-Colell, Michael Dennis Whinston, Jerry R Green, et almbox. 1995. Microeconomic theory . Vol. 1. Oxford university press New York.
[21]
Eric Maskin and John Riley. 1984. Monopoly with incomplete information. The RAND Journal of Economics, Vol. 15, 2 (1984), 171--196.
[22]
Reshef Meir, Hongyao Ma, and Valentin Robu. 2017. Contract design for energy demand response. In Proceedings of the 26th International Joint Conference on Artificial Intelligence. AAAI Press, 1202--1208.
[23]
S. Micali and P. Valiant. 2008. Revenue in Truly Combinatorial Auctions and Adversarial Mechanism Design . Technical Report MIT-CSAIL-TR-2008-039. MIT.
[24]
Carlos Molina-Jimenez, Ioannis Sfyrakis, Ellis Solaiman, Irene Ng, Meng Weng Wong, Alexis Chun, and Jon Crowcroft. 2018. Implementation of Smart Contracts Using Hybrid Architectures with On and Off--Blockchain Components. In 2018 IEEE 8th International Symposium on Cloud and Service Computing (SC2). IEEE, 83--90.
[25]
Thomas Moscibroda, Stefan Schmid, and Rogert Wattenhofer. 2006. When selfish meets evil: Byzantine players in a virus inoculation game. In Proceedings of the 25th annual ACM symposium on Principles of distributed computing . 35--44.
[26]
Kobbi Nissim, Claudio Orlandi, and Rann Smorodinsky. 2012. Privacy-aware mechanism design. In Proceedings of the 13th ACM Conference on Electronic Commerce. ACM, 774--789.
[27]
Dusit Niyato, Mohammad Abu Alsheikh, Ping Wang, Dong In Kim, and Zhu Han. 2016. Market model and optimal pricing scheme of big data and Internet of things (IoT). In The 2016 IEEE International Conference on Communications .
[28]
Eduardo Porter. 2018. Your Data Is Crucial to a Robotic Age. Shouldn't You Be Paid for It? https://www.nytimes.com/2018/03/06/business/economy/user-data-pay.html . Accessed: 2018--12--15.
[29]
salesforce.com, inc. 2018. Salesforce DMP Security, Privacy and Architecture . https://help.salesforce.com/servlet/servlet.FileDownload?file=0150M0000041PNOQA2 . Accessed: 2018--12--15.
[30]
Sarah Spiekermann, Rainer Böhme, Alessandro Acquisti, and Kai-Lung Hui. 2015. Personal data markets. Electronic Markets, Vol. 25, 2 (2015), 91--93.
[31]
Hamidreza Tavafoghi and Demosthenis Teneketzis. 2014. Optimal contract design for energy procurement. In Communication, Control, and Computing (Allerton), 2014 52nd Annual Allerton Conference on. IEEE, 62--69.
[32]
L. D. W. Thomas and A. Leiponen. 2016. Big data commercialization. IEEE Engineering Management Review, Vol. 44, 2 (Second 2016), 74--90.

Cited By

View all
  • (2023)A Game-Theoretic Federated Learning Framework for Data Quality ImprovementIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2022.323095935:11(10952-10966)Online publication date: 1-Nov-2023
  • (2023)A Survey of Data Pricing for Data MarketplacesIEEE Transactions on Big Data10.1109/TBDATA.2023.32541529:4(1038-1056)Online publication date: 1-Aug-2023
  • (2022)Protecting Data Markets from Strategic BuyersProceedings of the 2022 International Conference on Management of Data10.1145/3514221.3517855(1755-1769)Online publication date: 10-Jun-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
EC '19: Proceedings of the 2019 ACM Conference on Economics and Computation
June 2019
947 pages
ISBN:9781450367929
DOI:10.1145/3328526
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 June 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. contract theory
  2. data commercialization
  3. pricing private data

Qualifiers

  • Research-article

Funding Sources

  • US Army Research Office

Conference

EC '19
Sponsor:
EC '19: ACM Conference on Economics and Computation
June 24 - 28, 2019
AZ, Phoenix, USA

Acceptance Rates

EC '19 Paper Acceptance Rate 106 of 382 submissions, 28%;
Overall Acceptance Rate 664 of 2,389 submissions, 28%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)21
  • Downloads (Last 6 weeks)4
Reflects downloads up to 14 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2023)A Game-Theoretic Federated Learning Framework for Data Quality ImprovementIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2022.323095935:11(10952-10966)Online publication date: 1-Nov-2023
  • (2023)A Survey of Data Pricing for Data MarketplacesIEEE Transactions on Big Data10.1109/TBDATA.2023.32541529:4(1038-1056)Online publication date: 1-Aug-2023
  • (2022)Protecting Data Markets from Strategic BuyersProceedings of the 2022 International Conference on Management of Data10.1145/3514221.3517855(1755-1769)Online publication date: 10-Jun-2022
  • (2022)A Survey on Data Pricing: From Economics to Data ScienceIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2020.304592734:10(4586-4608)Online publication date: 1-Oct-2022
  • (2022)Data monetization: insights from a technology-enabled literature review and research agendaManagement Review Quarterly10.1007/s11301-022-00309-174:2(521-565)Online publication date: 29-Nov-2022
  • (2021)A measure based pricing framework for data productsWeb Intelligence10.3233/WEB-21044618:4(249-260)Online publication date: 14-May-2021
  • (2021)More than PrivacyACM Computing Surveys10.1145/346077154:7(1-37)Online publication date: 18-Jul-2021
  • (undefined)A Survey of Data Pricing MethodsSSRN Electronic Journal10.2139/ssrn.3609120

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media