2023
DOI: 10.1016/j.comnet.2023.109637
|View full text |Cite
|
Sign up to set email alerts
|

Towards personalized privacy preference aware data trading: A contract theory based approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 42 publications
0
2
0
Order By: Relevance
“…In anonymity-based approaches, less accurate data are released through generalization and steganography techniques, thus reducing privacy leakage [19], [20]. In addition, due to the differences in data owners' individualized requirements for privacy protection, some scholars have also proposed a personalized privacy-aware data trading approach based on contract theory to satisfy budget feasibility, incentive compatibility, and individual rationality requirements [21].…”
Section: Literature Reviewmentioning
confidence: 99%
“…In anonymity-based approaches, less accurate data are released through generalization and steganography techniques, thus reducing privacy leakage [19], [20]. In addition, due to the differences in data owners' individualized requirements for privacy protection, some scholars have also proposed a personalized privacy-aware data trading approach based on contract theory to satisfy budget feasibility, incentive compatibility, and individual rationality requirements [21].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Chen et al [36] propose a contract-based edge-assisted federated learning model-sharing incentive mechanism, which maximize the EFL model consumers' proft and ensure the quality of training services. Feng et al [37] incorporate local diferential privacy into contract theory-based private data trading to support personalized privacy preferences. However, most of these incentive mechanisms consider worker contribution based on the data quantity without focusing on data updates in FL.…”
Section: Related Workmentioning
confidence: 99%
“…Some scholars usually compensates the privacy of data providers by quantifying their privacy exposure [ [50] , [51] , [52] ]. Some academics create a framework for data transactions based on safeguarding the privacy of data sources using cutting-edge computer techniques like smart contracts and GAN generators [ 53 , 54 ]. Query-based pricing is also considered from a privacy perspective [ 55 ].…”
Section: Literature Reviewmentioning
confidence: 99%