Journal on Communications ›› 2022, Vol. 43 ›› Issue (5): 1-13.doi: 10.11959/j.issn.1000-436x.2022082
• Papers • Next Articles
Yong ZHANG, Dandan LI, Lu HAN, Xiaohong HUANG
Revised:
2022-03-02
Online:
2022-05-25
Published:
2022-05-01
Supported by:
CLC Number:
Yong ZHANG, Dandan LI, Lu HAN, Xiaohong HUANG. Privacy-protected crowd-sensed data trading algorithm[J]. Journal on Communications, 2022, 43(5): 1-13.
[1] | DAI W Q , DAI C K , CHOO K K R ,et al. SDTE:a secure blockchain-based data trading ecosystem[J]. IEEE Transactions on Information Forensics and Security, 2020,15: 725-737. |
[2] | HUANG Y D , ZENG Y M , YE F ,et al. Fair and protected profit sharing for data trading in pervasive edge computing environments[C]// Proceedings of IEEE Conference on Computer Communications. Piscataway:IEEE Press, 2020: 1718-1727. |
[3] | WANG X D , YING C H , LUO Y . Privacy-friendly decentralized data aggregation for mobile crowdsensing[C]// Proceedings of 2020 IEEE Global Communications Conference. Piscataway:IEEE Press, 2020: 1-6. |
[4] | YU J L , CHEUNG M H , HUANG J W ,et al. Mobile data trading:behavioral economics analysis and algorithm design[J]. IEEE Journal on Selected Areas in Communications, 2017,35(4): 994-1005. |
[5] | YANG G , HE S B , SHI Z G ,et al. Promoting cooperation by the social incentive mechanism in mobile crowdsensing[J]. IEEE Communications Magazine, 2017,55(3): 86-92. |
[6] | 杜小勇, 陈峻, 陈跃国 . 大数据探索式搜索研究[J]. 通信学报, 2015,36(12): 77-88. |
DU X Y , CHEN J , CHEN Y G . Exploratory search on big data[J]. Journal on Communications, 2015,36(12): 77-88. | |
[7] | AN B Y , XIAO M J , LIU A ,et al. Truthful crowdsensed data trading based on reverse auction and blockchain[C]// Database Systems for Advanced Applications,Berlin:Springer, 2019: 292-309. |
[8] | ZHENG Z Z , PENG Y Q , WU F ,et al. Trading data in the crowd:profit-driven data acquisition for mobile crowdsensing[J]. IEEE Journal on Selected Areas in Communications, 2017,35(2): 486-501. |
[9] | JIANG C K , GAO L , DUAN L J ,et al. Scalable mobile crowdsensing via peer-to-peer data sharing[J]. IEEE Transactions on Mobile Computing, 2018,17(4): 898-912. |
[10] | ZHENG Y F , DUAN H Y , YUAN X L ,et al. Privacy-aware and efficient mobile crowdsensing with truth discovery[J]. IEEE Transactions on Dependable and Secure Computing, 2020,17(1): 121-133. |
[11] | ZHANG L , LI Y N , XIAO X ,et al. CrowdBuy:privacy-friendly image dataset purchasing via crowdsourcing[C]// Proceedings of IEEE Conference on Computer Communications. Piscataway:IEEE Press, 2018: 2735-2743. |
[12] | GAO W C , YU W , LIANG F ,et al. Privacy-preserving auction for big data trading using homomorphic encryption[J]. IEEE Transactions on Network Science and Engineering, 2020,7(2): 776-791. |
[13] | NIU C Y , ZHENG Z Z , WU F ,et al. Achieving data truthfulness and privacy preservation in data markets[J]. IEEE Transactions on Knowledge and Data Engineering, 2019,31(1): 105-119. |
[14] | ZHAO Y Q , YU Y , LI Y N ,et al. Machine learning based privacy-preserving fair data trading in big data market[J]. Information Sciences, 2019,478: 449-460. |
[15] | WANG J , WANG Y L , ZHAO G S ,et al. Location protection method for mobile crowd sensing based on local differential privacy preference[J]. Peer-to-Peer Networking and Applications, 2019,12(5): 1097-1109. |
[16] | XUE Q , ZHU Y W , WANG J . Mean estimation over numeric data with personalized local differential privacy[J]. Frontiers of Computer Science, 2021,16(3): 1-10. |
[17] | 付钰, 俞艺涵, 吴晓平 . 大数据环境下差分隐私保护技术及应用[J]. 通信学报, 2019,40(10): 157-168. |
FU Y , YU Y H , WU X P . Differential privacy protection technology and its application in big data environment[J]. Journal on Communications, 2019,40(10): 157-168. | |
[18] | 郭艺, 叶剑, 张鹏 . 基于偏差约减的大数据交易模型分析与修复方法[J]. 电子学报, 2018,46(7): 1754-1761. |
GUO Y , YE J , ZHANG P . Analysis and repair of big data transaction model based on deviation reduction[J]. Acta Electronica Sinica, 2018,46(7): 1754-1761. | |
[19] | YU H F , ZHANG M X . Data pricing strategy based on data quality[J]. Computers & Industrial Engineering, 2017,112: 1-10. |
[20] | JIAO Y T , WANG P , NIYATO D ,et al. Profit maximization auction and data management in big data markets[C]// Proceedings of 2017 IEEE Wireless Communications and Networking Conference. Piscataway:IEEE Press, 2017: 1-6. |
[21] | 黄小红, 张勇, 闪德胜 ,等. 基于多目标效用优化的分布式数据交易算法[J]. 通信学报, 2021,42(2): 52-63. |
HUANG X H , ZHANG Y , SHAN D S ,et al. Distributed data trading algorithm based on multi-objective utility optimization[J]. Journal on Communications, 2021,42(2): 52-63. | |
[22] | ZHANG J X , SUN J C , ZHANG R ,et al. Privacy-preserving social media data outsourcing[C]// Proceedings of IEEE Conference on Computer Communications. Piscataway:IEEE Press, 2018: 1106-1114. |
[23] | CAI H , YE F , YANG Y Y ,et al. Towards privacy-preserving data trading for web browsing history[C]// Proceedings of the International Symposium on Quality of Service. Piscataway:IEEE Press, 2019: 1-10. |
[24] | YANG L , ZHANG M Y , HE S B ,et al. Crowd-empowered privacy-preserving data aggregation for mobile crowdsensing[C]// Proceedings of the Eighteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing. New York:ACM Press, 2018: 151-160. |
[25] | DWORK C , . Differential privacy[C]// Automata,Languages and Programming. Berlin:Springer, 2006: 1-12. |
[26] | KEMP F . The Laplace distribution and generalizations:a revisit with applications to communications,economics,engineering,and finance[J]. Journal of the Royal Statistical Society:Series D (the Statistician), 2003,52(4): 698-699. |
[27] | DANDEKAR P , FAWAZ N , IOANNIDIS S . Privacy auctions for recommender systems[C]// Internet and Network Economics. Berlin:Springer, 2012: 309-322. |
[28] | JIN H M , SU L , XIAO H P ,et al. INCEPTION:incentivizing privacy-preserving data aggregation for mobile crowd sensing systems[C]// Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing. New York:ACM Press, 2016: 341-350. |
[29] | MENG C S , JIANG W J , LI Y L ,et al. Truth discovery on crowd sensing of correlated entities[C]// Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems. New York:ACM Press, 2015: 169-182. |
[30] | KAZAI G , KAMPS J , MILIC-FRAYLING N , . An analysis of human factors and label accuracy in crowdsourcing relevance judgments[J]. Information Retrieval, 2013,16(2): 138-178. |
[31] | STRUBELL E , GANESH A , MCCALLUM A . Energy and policy considerations for modern deep learning research[J]. Proceedings of the AAAI Conference on Artificial Intelligence, 2020,34(9): 13693-13696. |
[32] | WANG L Y , ZHANG D Q , YAN Z X ,et al. effSense:a novel mobile crowd-sensing framework for energy-efficient and cost-effective data uploading[J]. IEEE Transactions on Systems,Man,and Cybernetics:Systems, 2015,45(12): 1549-1563. |
[33] | 汪民乐 . 遗传算法的收敛性研究[J]. 计算技术与自动化, 2015,34(1): 58-62. |
WANG M L . Research on convergence of genetic algorithm[J]. Computing Technology and Automation, 2015,34(1): 58-62. | |
[34] | GAO G J , XIAO M J , WU J ,et al. DPDT:a differentially private crowd-sensed data trading mechanism[J]. IEEE Internet of Things Journal, 2020,7(1): 751-762. |
[35] | CAI H , ZHU Y M , LI J ,et al. A profit-maximizing mechanism for query-based data trading with personalized differential privacy[J]. The Computer Journal, 2020,64(2): 264-280. |
[36] | ZHENG S Y , CAO Y , YOSHIKAWA M . Trading data with personalized differential privacy and partial arbitrage freeness[J]. arXiv Preprint,arXiv:2105.01651, 2021. |
[1] | Tao FENG, Liqiu CHEN, Junli FANG, Jianming SHI. Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption [J]. Journal on Communications, 2023, 44(5): 224-233. |
[2] | Shengxing YU, Zekai CHEN, Zhong CHEN, Ximeng LIU. DAGUARD: distributed backdoor attack defense scheme under federated learning [J]. Journal on Communications, 2023, 44(5): 110-122. |
[3] | Shufen ZHANG, Yanling DONG, Jingcheng XU, Haoshi WANG. AdaBoost algorithm based on target perturbation [J]. Journal on Communications, 2023, 44(2): 198-209. |
[4] | Lingtao TANG, Di WANG, Shengyun LIU. Data augmentation scheme for federated learning with non-IID data [J]. Journal on Communications, 2023, 44(1): 164-176. |
[5] | Chengsheng YUAN, Qiang GUO, Zhangjie FU. Copyright protection algorithm based on differential privacy deep fake fingerprint detection model [J]. Journal on Communications, 2022, 43(9): 181-193. |
[6] | Hanyi WANG, Xiaoguang LI, Wenqing BI, Yahong CHEN, Fenghua LI, Ben NIU. Multi-level local differential privacy algorithm recommendation framework [J]. Journal on Communications, 2022, 43(8): 52-64. |
[7] | Haiyan KANG, Yuanrui JI. Research on federated learning approach based on local differential privacy [J]. Journal on Communications, 2022, 43(10): 94-105. |
[8] | Yan YAN, Yiming CONG, Mahmood Adnan, Quanzheng SHENG. Statistics release and privacy protection method of location big data based on deep learning [J]. Journal on Communications, 2022, 43(1): 203-216. |
[9] | Si CHEN, Anmin FU, Mang SU, Huaijiang SUN. Trajectory privacy protection scheme based on differential privacy [J]. Journal on Communications, 2021, 42(9): 54-64. |
[10] | Hongtao LI, Xiaoyu REN, Jie WANG, Jianfeng MA. Continuous location privacy protection mechanism based on differential privacy [J]. Journal on Communications, 2021, 42(8): 164-175. |
[11] | Jianping CAI, Ximeng LIU, Jinbo XIONG, Zuobin YING, Yingjie WU. Approximation method of multiple consistency constraint under differential privacy [J]. Journal on Communications, 2021, 42(6): 107-117. |
[12] | Xiaohong HUANG, Yong ZHANG, Desheng SHAN, Yekui QIAN, Lu HAN, Dandan LI, Qun CONG. Distributed data trading algorithm based on multi-objective utility optimization [J]. Journal on Communications, 2021, 42(2): 52-63. |
[13] | Suxia ZHU, Shulun LIU, Guanglu SUN. Shape similarity differential privacy trajectory protection mechanism based on relative entropy and K-means [J]. Journal on Communications, 2021, 42(2): 113-123. |
[14] | Yang LIU, Jun LI, Wenyun CHEN, Mugen PENG. Research on endogenous security data sharing mechanism of F-RAN for 6G [J]. Journal on Communications, 2021, 42(1): 67-78. |
[15] | Yingxu LAI,Zunxu BO,Jing LIU. Research on sybil attack in defense blockchain based on improved PBFT algorithm [J]. Journal on Communications, 2020, 41(9): 104-117. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|