Proceedings of the Fifteenth ACM Conference on Economics and Computation 2014
DOI: 10.1145/2600057.2602902
|View full text |Cite
|
Sign up to set email alerts
|

Buying private data without verification

Abstract: We consider the problem of designing a survey to aggregate non-verifiable information from a privacy-sensitive population: an analyst wants to compute some aggregate statistic from the private bits held by each member of a population, but cannot verify the correctness of the bits reported by participants in his survey. Individuals in the population are strategic agents with a cost for privacy, i.e., they not only account for the payments they expect to receive from the mechanism, but also their privacy costs f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
41
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 57 publications
(44 citation statements)
references
References 25 publications
1
41
0
Order By: Relevance
“…(ii) As we show, in this model it is possible to quantify the B's trade-off between an -change in the belief and the cost that B pays A. In that aspect, this model gives a clear quantifiable trade-off that explains what each additional unit of -differential privacy buys B. Interestingly, proper scoring rules were recently applied in the context of differential privacy [12] (yet in a very different capacity).…”
Section: The Coupon Game With Scoring Rules Paymentsmentioning
confidence: 95%
“…(ii) As we show, in this model it is possible to quantify the B's trade-off between an -change in the belief and the cost that B pays A. In that aspect, this model gives a clear quantifiable trade-off that explains what each additional unit of -differential privacy buys B. Interestingly, proper scoring rules were recently applied in the context of differential privacy [12] (yet in a very different capacity).…”
Section: The Coupon Game With Scoring Rules Paymentsmentioning
confidence: 95%
“…Another line of research examines data acquisition using differential privacy [Ghosh and Roth, 2011, Fleischer and Lyu, 2012, Ghosh et al, 2014, Nissim et al, 2014, Cummings et al, 2015. Agents care about their privacy and hence may be reluctant to reveal their data.…”
Section: Other Related Workmentioning
confidence: 99%
“…A is monotone non-increasing (12) We can now establish the following continuous variant of Theorem 1, which describes the optimal survey mechanism for continuous cost distributions.…”
Section: Continuous Costs For Moment Estimationmentioning
confidence: 99%