Security, Privacy and a Trusted Information Intermediary: A Compensation Model and Markets for Private Information
نویسندگان
چکیده
Technological advances in the collection, storage, and analysis of data have increased the ease that businesses can turn mounds of personal data into useful information. Economic value is being created through the analysis of personal data. Meanwhile, individuals are increasingly becoming aware of the value of their personal information. Privacy concerns further lead some individuals to guard their personal information from disclosure. This paper explores a market for personal information. This economic system requires a flexible approach to data protection because subjects are compensated based on the amount of disclosure of personal information. Compensation is linked through a data protection model based on Confidentiality via Camouflage (CVC) presented in Gopal et al. (2002). A trusted information intermediary (TII) ensures that security and other desired market conditions exist allowing for a selfregulated market. A working model and example flexible security and compensation is presented and analyzed using simulation.
منابع مشابه
Differentially Private Local Electricity Markets
Privacy-preserving electricity markets have a key role in steering customers towards participation in local electricity markets by guarantying to protect their sensitive information. Moreover, these markets make it possible to statically release and share the market outputs for social good. This paper aims to design a market for local energy communities by implementing Differential Privacy (DP)...
متن کاملPrivate Key based query on encrypted data
Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...
متن کاملAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملAnalyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks
The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...
متن کاملProvably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کامل