Solving Data Trading Dilemma with Asymmetric Incomplete Information Using Zero-Determinant Strategy
Trading data between user and service provider is a promising and efficient method to promote information exchange, service quality improvement, and development of emerging applications, benefiting individual and society. Meanwhile, data resale (i.e., data secondary use) is one of the most critical...
        Saved in:
      
    
          | Published in | Wireless Algorithms, Systems, and Applications Vol. 10874; pp. 425 - 437 | 
|---|---|
| Main Authors | , , , , , | 
| Format | Book Chapter | 
| Language | English | 
| Published | 
        Switzerland
          Springer International Publishing AG
    
        01.01.2018
     Springer International Publishing  | 
| Series | Lecture Notes in Computer Science | 
| Online Access | Get full text | 
| ISBN | 3319942670 9783319942674  | 
| ISSN | 0302-9743 1611-3349  | 
| DOI | 10.1007/978-3-319-94268-1_35 | 
Cover
| Abstract | Trading data between user and service provider is a promising and efficient method to promote information exchange, service quality improvement, and development of emerging applications, benefiting individual and society. Meanwhile, data resale (i.e., data secondary use) is one of the most critical privacy issues hindering the ongoing process of data trading, which, unfortunately, is ignored in many of the existing privacy-preserving schemes. In this paper, we tackle the issue of data resale from a special angle, i.e., promoting cooperation between user and service provider to prevent data secondary use. For this purpose, we design a novel game-theoretical algorithm, in which user can unilaterally persuade service provider to cooperate in data trading, achieving a “win-win” situation. Besides, we validate our proposed algorithm performance through in-depth theoretical analysis and comprehensive simulations. | 
    
|---|---|
| AbstractList | Trading data between user and service provider is a promising and efficient method to promote information exchange, service quality improvement, and development of emerging applications, benefiting individual and society. Meanwhile, data resale (i.e., data secondary use) is one of the most critical privacy issues hindering the ongoing process of data trading, which, unfortunately, is ignored in many of the existing privacy-preserving schemes. In this paper, we tackle the issue of data resale from a special angle, i.e., promoting cooperation between user and service provider to prevent data secondary use. For this purpose, we design a novel game-theoretical algorithm, in which user can unilaterally persuade service provider to cooperate in data trading, achieving a “win-win” situation. Besides, we validate our proposed algorithm performance through in-depth theoretical analysis and comprehensive simulations. | 
    
| Author | Li, Wei Wang, Shengling Alrawais, Arwa Mei, Bo Yu, Jiguo Sooksatra, Korn  | 
    
| Author_xml | – sequence: 1 givenname: Korn surname: Sooksatra fullname: Sooksatra, Korn email: ksooksatra1@student.gsu.edu organization: Georgia State University, Atlanta, USA – sequence: 2 givenname: Wei surname: Li fullname: Li, Wei email: wli28@gsu.edu organization: Georgia State University, Atlanta, USA – sequence: 3 givenname: Bo surname: Mei fullname: Mei, Bo email: b.mei@tcu.edu organization: Texas Christian University, Fort Worth, USA – sequence: 4 givenname: Arwa surname: Alrawais fullname: Alrawais, Arwa email: alrawais@gwmail.gwu.edu organization: The George Washington University, Washington, DC, USA – sequence: 5 givenname: Shengling surname: Wang fullname: Wang, Shengling email: wangshengling@bnu.edu.cn organization: Beijing Normal University, Beijing, China – sequence: 6 givenname: Jiguo surname: Yu fullname: Yu, Jiguo email: jiguoyu@sina.com organization: Qufu Normal University, Qufu, China  | 
    
| BookMark | eNpFkM9OHDEMxkOhVXdh36CHeYG0zp_JJMcVUEBC4rDLhUuUnXGWoTOTbRKoePtmlko92f7sz7J_S3I2hQkJ-cbgOwNofphGU0EFM9RIrjRlVtQnZCmKchTMJ7JgijEqhDSn_xsNnJEFCODUNFJ8IUsGEhRTSpqvZJXSCwBwEIYLvSDtJgxv_bSvrlx21Ta67lj0A46jq_70-blap_dxxBz7trqb2jAeBsxYUh_i6HIfpuoxzaYnjIFelV4c-8lNudrk6DLu3y_IZ--GhKt_8Zw8_rzeXt7S-4ebu8v1Pd1zwzLtvHfSgwJ0Ne9qBTvpUTXGIaLWWrTQNOA72aFTznEpO93s5knPdOvBi3PCP_amQywHYbS7EH4ly8DOQG0BaoUtlOyRn52BFpP8MB1i-P2KKVucXS1O5fqhfXaH8lCyipsapLQ1aCulEH8B2WJ4kA | 
    
| ContentType | Book Chapter | 
    
| Copyright | Springer International Publishing AG, part of Springer Nature 2018 | 
    
| Copyright_xml | – notice: Springer International Publishing AG, part of Springer Nature 2018 | 
    
| DBID | FFUUA | 
    
| DEWEY | 621.382 | 
    
| DOI | 10.1007/978-3-319-94268-1_35 | 
    
| DatabaseName | ProQuest Ebook Central - Book Chapters - Demo use only | 
    
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Engineering Computer Science  | 
    
| EISBN | 3319942689 9783319942681  | 
    
| EISSN | 1611-3349 | 
    
| Editor | Li, Wei Chellappan, Sriram Cheng, Wei  | 
    
| Editor_xml | – sequence: 1 fullname: Cheng, Wei – sequence: 2 fullname: Li, Wei – sequence: 3 fullname: Chellappan, Sriram  | 
    
| EndPage | 437 | 
    
| ExternalDocumentID | EBC6295044_508_443 | 
    
| GroupedDBID | 0D6 0DA 38. AABBV ACOUV AEDXK AEJLV AEKFX AEZAY ALMA_UNASSIGNED_HOLDINGS ANXHU BBABE BICGV BJAWL BUBNW CVGDX CZZ EDOXC FFUUA FOYMO I4C IEZ NQNQZ OEBZI SBO TPJZQ TSXQS Z81 Z83 Z88 -DT -~X 29L 2HA 2HV ACGFS ADCXD EJD F5P LAS LDH P2P RSU ~02  | 
    
| ID | FETCH-LOGICAL-g291t-dffa4f060ea52d560b4fe679aeee8883c0770fd4dea6aa244d87b52d5f18cf0f3 | 
    
| ISBN | 3319942670 9783319942674  | 
    
| ISSN | 0302-9743 | 
    
| IngestDate | Tue Jul 29 20:11:12 EDT 2025 Thu May 29 17:59:27 EDT 2025  | 
    
| IsPeerReviewed | true | 
    
| IsScholarly | true | 
    
| LCCallNum | QA76.9.A43 | 
    
| Language | English | 
    
| LinkModel | OpenURL | 
    
| MergedId | FETCHMERGED-LOGICAL-g291t-dffa4f060ea52d560b4fe679aeee8883c0770fd4dea6aa244d87b52d5f18cf0f3 | 
    
| OCLC | 1040616649 | 
    
| PQID | EBC6295044_508_443 | 
    
| PageCount | 13 | 
    
| ParticipantIDs | springer_books_10_1007_978_3_319_94268_1_35 proquest_ebookcentralchapters_6295044_508_443  | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 2018-01-01 | 
    
| PublicationDateYYYYMMDD | 2018-01-01 | 
    
| PublicationDate_xml | – month: 01 year: 2018 text: 2018-01-01 day: 01  | 
    
| PublicationDecade | 2010 | 
    
| PublicationPlace | Switzerland | 
    
| PublicationPlace_xml | – name: Switzerland – name: Cham  | 
    
| PublicationSeriesSubtitle | Theoretical Computer Science and General Issues | 
    
| PublicationSeriesTitle | Lecture Notes in Computer Science | 
    
| PublicationSeriesTitleAlternate | Lect.Notes Computer | 
    
| PublicationSubtitle | 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings | 
    
| PublicationTitle | Wireless Algorithms, Systems, and Applications | 
    
| PublicationYear | 2018 | 
    
| Publisher | Springer International Publishing AG Springer International Publishing  | 
    
| Publisher_xml | – name: Springer International Publishing AG – name: Springer International Publishing  | 
    
| RelatedPersons | Kleinberg, Jon M. Mattern, Friedemann Naor, Moni Mitchell, John C. Terzopoulos, Demetri Steffen, Bernhard Pandu Rangan, C. Kanade, Takeo Kittler, Josef Weikum, Gerhard Hutchison, David Tygar, Doug  | 
    
| RelatedPersons_xml | – sequence: 1 givenname: David surname: Hutchison fullname: Hutchison, David organization: Lancaster University, Lancaster, United Kingdom – sequence: 2 givenname: Takeo surname: Kanade fullname: Kanade, Takeo organization: Carnegie Mellon University, Pittsburgh, USA – sequence: 3 givenname: Josef surname: Kittler fullname: Kittler, Josef organization: University of Surrey, Guildford, United Kingdom – sequence: 4 givenname: Jon M. surname: Kleinberg fullname: Kleinberg, Jon M. organization: Cornell University, Ithaca, USA – sequence: 5 givenname: Friedemann surname: Mattern fullname: Mattern, Friedemann organization: ETH Zurich, Zurich, Switzerland – sequence: 6 givenname: John C. surname: Mitchell fullname: Mitchell, John C. organization: Stanford University, Stanford, USA – sequence: 7 givenname: Moni surname: Naor fullname: Naor, Moni organization: Dept Applied Math & Computer Science, Weizmann Institute of Science, Rehovot, Israel – sequence: 8 givenname: C. surname: Pandu Rangan fullname: Pandu Rangan, C. organization: Indian Institute of Technology Madras, Chennai, India – sequence: 9 givenname: Bernhard surname: Steffen fullname: Steffen, Bernhard organization: TU Dortmund University, Dortmund, Germany – sequence: 10 givenname: Demetri surname: Terzopoulos fullname: Terzopoulos, Demetri organization: University of California, Los Angeles, USA – sequence: 11 givenname: Doug surname: Tygar fullname: Tygar, Doug organization: University of California, Berkeley, USA – sequence: 12 givenname: Gerhard surname: Weikum fullname: Weikum, Gerhard organization: Max Planck Institute for Informatics, Saarbrücken, Germany  | 
    
| SSID | ssj0002039238 ssj0002792  | 
    
| Score | 2.1429229 | 
    
| Snippet | Trading data between user and service provider is a promising and efficient method to promote information exchange, service quality improvement, and... | 
    
| SourceID | springer proquest  | 
    
| SourceType | Publisher | 
    
| StartPage | 425 | 
    
| Title | Solving Data Trading Dilemma with Asymmetric Incomplete Information Using Zero-Determinant Strategy | 
    
| URI | http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=6295044&ppg=443 http://link.springer.com/10.1007/978-3-319-94268-1_35  | 
    
| Volume | 10874 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Bb9MwFLZYucAOwAAxGMgHbpVR6riJfczWjmlCXNjQxMVyYnsgrS2s2WH8-r0XO00adhmXqLGcyPXnPD0_v-97hHz03FoweZbB1-aYQBKXqqYpM4obuJETVzZqn1-zk3NxejG96MqlNuySuvxU_b2XV_I_qEIb4Ios2Qcgu3kpNMBvwBeugDBcB87vdpg1iG7_wnonYKeKq8sVbPF_hqBJlCBvszKL3gF1f3l8W101oYSZqQ0qnDfclhmYiMXChOBssb5dLLDeVoVGBDPPwb8eR_pSs2pCusEPd71isy6rZhwFb2_7AYWJHAQU2oDiICTZi4oVn7c2oWmK-sI8C9V2NlY1kaHhHxvdT8tAChU-CztZHWRLtiWxRdBwGkhizw-PMq6miRAa_EuNnX7_YVhJDE_cY1mVHbIDYxuRx8X89Mv3TdyNJ-ARphJpPu24o_RX9z96FMv7hrm1GRmcnzduydlzsotUFYocEhj4C_LILffIs7ZQB412e4887alOviRVxJ4i9jRiTyP2FLGnHfa0w572sKcN9nSIPW2xf0XOj-dnRycs1tpgl1xNama9N8InWeLMlFtwg0vhXZYr45yTUqZVkueJt8I6kxkDPqGVeYk9_URWPvHpazJarpbuDaFKGG7BT_RKeGFzp1SZmIznJsNK5xnfJ6ydPt1kBMQ05CpM1loPsN0n43aONXZf61ZqG8DRqQZwdAOORnDePvDt78iT7iM4IKP6-sa9Bz-zLj_EpXMHrkx92g | 
    
| linkProvider | Library Specific Holdings | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Wireless+Algorithms%2C+Systems%2C+and+Applications&rft.atitle=Solving+Data+Trading+Dilemma+with+Asymmetric+Incomplete+Information+Using+Zero-Determinant+Strategy&rft.date=2018-01-01&rft.pub=Springer+International+Publishing+AG&rft.isbn=9783319942674&rft.volume=10874&rft_id=info:doi/10.1007%2F978-3-319-94268-1_35&rft.externalDBID=443&rft.externalDocID=EBC6295044_508_443 | 
    
| thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F6295044-l.jpg |