Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3600046.3600047acmotherconferencesArticle/Chapter ViewAbstractPublication PagesconextConference Proceedingsconference-collections
research-article
Open access

A Decentralized Information Marketplace Preserving Input and Output Privacy

Published: 07 September 2023 Publication History
  • Get Citation Alerts
  • Abstract

    Data-driven applications are engines of economic growth and essential for progress in many domains. The data involved is often of a personal nature. We propose a decentralized information marketplace where data held by data providers, such as individual users can be made available for computation to data consumers, such as government agencies, research institutes, or companies who want to derive actionable insights or train machine learning models with the data while (1) protecting input privacy, (2) protecting output privacy, and (3) compensating data providers for making their sensitive information available for secure computation. We enable this privacy-preserving data exchange through a novel and carefully designed combination of a blockchain that supports smart contracts and two privacy-enhancing technologies: (1) secure multi-party computations, and (2) robust differential privacy guarantees.

    References

    [1]
    Aydin Abadi and Steven J Murdoch. 2023. Earn While You Reveal: Private Set Intersection that Rewards Participants. arXiv preprint arXiv:2301.03889 (2023).
    [2]
    Meshari Aljohani, Ravi Mukkamala, and Stephan Olariu. 2023. A Framework for a Blockchain-Based Decentralized Data Marketplace. In Wireless Internet: 15th EAI International Conference, WiCON 2022, Virtual Event, November 2022, Proceedings. Springer, 59–75.
    [3]
    Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, and Łukasz Mazurek. 2014. Fair two-party computations via bitcoin deposits. In Financial Cryptography and Data Security: FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers 18. Springer, 105–121.
    [4]
    Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, and Lukasz Mazurek. 2014. Secure Multiparty Computations on Bitcoin. In 2014 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 443–458. https://doi.org/10.1109/SP.2014.35
    [5]
    Toshinori Araki, Jun Furukawa, Yehuda Lindell, Ariel Nof, and Kazuma Ohara. 2016. High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority. In ACM CCS 2016, Edgar R. Weippl, Stefan Katzenbeisser, Christopher Kruegel, Andrew C. Myers, and Shai Halevi (Eds.). ACM Press, 805–817. https://doi.org/10.1145/2976749.2978331
    [6]
    Prabal Banerjee and Sushmita Ruj. 2018. Blockchain Enabled Data Marketplace – Design and Challenges. https://doi.org/10.48550/ARXIV.1811.11462
    [7]
    Carsten Baum, Bernardo David, and Rafael Dowsley. 2020. Insured MPC: Efficient Secure Computation with Financial Penalties. In FC 2020(LNCS, Vol. 12059), Joseph Bonneau and Nadia Heninger (Eds.). Springer, Heidelberg, 404–420. https://doi.org/10.1007/978-3-030-51280-4_22
    [8]
    Carsten Baum, Bernardo David, Rafael Dowsley, Ravi Kishore, Jesper Buus Nielsen, and Sabine Oechsner. 2023. CRAFT: Composable Randomness Beacons and Output-Independent Abort MPC From Time. In To appear at PKC 2023. Available at Cryptology ePrint Archive 2020/784.
    [9]
    Carsten Baum, Bernardo David, Rafael Dowsley, Jesper Buus Nielsen, and Sabine Oechsner. 2021. TARDIS: A Foundation of Time-Lock Puzzles in UC. In EUROCRYPT 2021, Part III(LNCS, Vol. 12698), Anne Canteaut and François-Xavier Standaert (Eds.). Springer, Heidelberg, 429–459. https://doi.org/10.1007/978-3-030-77883-5_15
    [10]
    Carsten Baum, Bernardo David, and Tore Kasper Frederiksen. 2021. P2DEX: Privacy-Preserving Decentralized Cryptocurrency Exchange. In ACNS 21, Part I(LNCS, Vol. 12726), Kazue Sako and Nils Ole Tippenhauer (Eds.). Springer, Heidelberg, 163–194. https://doi.org/10.1007/978-3-030-78372-3_7
    [11]
    Carsten Baum, James Hsin yu Chiang, Bernardo David, and Tore Kasper Frederiksen. 2022. Eagle: Efficient Privacy Preserving Smart Contracts. Cryptology ePrint Archive, Paper 2022/1435. https://eprint.iacr.org/2022/1435 To appear at Financial Cryptography 2023.
    [12]
    Iddo Bentov, Ranjit Kumaresan, and Andrew Miller. 2017. Instantaneous Decentralized Poker. In ASIACRYPT 2017, Part II(LNCS, Vol. 10625), Tsuyoshi Takagi and Thomas Peyrin (Eds.). Springer, Heidelberg, 410–440. https://doi.org/10.1007/978-3-319-70697-9_15
    [13]
    Ran Canetti. 2001. Universally Composable Security: A New Paradigm for Cryptographic Protocols. In 42nd FOCS. IEEE Computer Society Press, 136–145. https://doi.org/10.1109/SFCS.2001.959888
    [14]
    Cardano. 2023. Cardano. https://cardano.org/. [Online; accessed 7-March-2023].
    [15]
    Nicholas Carlini, Chang Liu, Úlfar Erlingsson, Jernej Kos, and Dawn Song. 2019. The secret sharer: Evaluating and testing unintended memorization in neural networks. In 28th USENIX Security Symposium. 267–284.
    [16]
    Peng Chen, Peichang Shi, Jie Xu, Xiang Fu, Linhui Li, Tao Zhong, Liangliang Xiang, and Jinzhu Kong. 2021. TeeSwap: Private Data Exchange using Smart Contract and Trusted Execution Environment. In 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys). IEEE, 237–244.
    [17]
    Ronald Cramer, Ivan Damgard, and Jesper Nielsen. 2015. Secure Multiparty Computation and Secret Sharing. Cambridge University Press Print, New York.
    [18]
    Bernardo David, Rafael Dowsley, and Mario Larangeira. 2018. Kaleidoscope: An Efficient Poker Protocol with Payment Distribution and Penalty Enforcement. In FC 2018(LNCS, Vol. 10957), Sarah Meiklejohn and Kazue Sako (Eds.). Springer, Heidelberg, 500–519. https://doi.org/10.1007/978-3-662-58387-6_27
    [19]
    Bernardo David, Rafael Dowsley, and Mario Larangeira. 2019. ROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement. In FC 2019(LNCS, Vol. 11598), Ian Goldberg and Tyler Moore (Eds.). Springer, Heidelberg, 282–300. https://doi.org/10.1007/978-3-030-32101-7_18
    [20]
    Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating noise to sensitivity in private data analysis. In Theory of Cryptography Conference. Springer, 265–284.
    [21]
    Matt Fredrikson, Somesh Jha, and Thomas Ristenpart. 2015. Model inversion attacks that exploit confidence information and basic countermeasures. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 1322–1333.
    [22]
    Lodovico Giaretta, Ioannis Savvidis, Thomas Marchioro, Šarūnas Girdzijauskas, George Pallis, Marios D Dikaiakos, and Evangelos Markatos. 2021. PDS 2: A user-centered decentralized marketplace for privacy preserving data processing. In 2021 IEEE 37th International Conference on Data Engineering Workshops (ICDEW). IEEE, 92–99.
    [23]
    Xiaolan Gu, Ming Li, and Li Xiong. 2021. Precad: Privacy-preserving and robust federated learning via crypto-aided differential privacy. arXiv preprint arXiv:2110.11578 (2021).
    [24]
    Nick Hynes, David Dao, David Yan, Raymond Cheng, and Dawn Song. 2018. A demonstration of sterling: A privacy-preserving data marketplace. Proceedings of the VLDB Endowment 11, 12 (2018), 2086–2089.
    [25]
    Patrick Jauernig, Ahmad-Reza Sadeghi, and Emmanuel Stapf. 2020. Trusted Execution Environments: Properties, Applications, and Challenges. IEEE Security & Privacy 18, 2 (2020), 56–60. https://doi.org/10.1109/MSEC.2019.2947124
    [26]
    Kaleido. 2023. Kaleido. https://www.kaleido.io/resources/data-marketplaces. [Online; accessed 7-March-2023].
    [27]
    Karl Koch, Stephan Krenn, Tilen Marc, Stefan More, and Sebastian Ramacher. 2022. KRAKEN: a privacy-preserving data market for authentic data. In Proceedings of the 1st International Workshop on Data Economy. 15–20.
    [28]
    Vlasis Koutsos, Dimitrios Papadopoulos, Dimitris Chatzopoulos, Sasu Tarkoma, and Pan Hui. 2021. Agora: A privacy-aware data marketplace. IEEE Transactions on Dependable and Secure Computing 19, 6 (2021), 3728–3740.
    [29]
    Ranjit Kumaresan and Iddo Bentov. 2014. How to Use Bitcoin to Incentivize Correct Computations. In ACM CCS 2014, Gail-Joon Ahn, Moti Yung, and Ninghui Li (Eds.). ACM Press, 30–41. https://doi.org/10.1145/2660267.2660380
    [30]
    Ranjit Kumaresan and Iddo Bentov. 2016. Amortizing Secure Computation with Penalties. In ACM CCS 2016, Edgar R. Weippl, Stefan Katzenbeisser, Christopher Kruegel, Andrew C. Myers, and Shai Halevi (Eds.). ACM Press, 418–429. https://doi.org/10.1145/2976749.2978424
    [31]
    Ranjit Kumaresan, Vinod Vaikuntanathan, and Prashant Nalini Vasudevan. 2016. Improvements to Secure Computation with Penalties. In ACM CCS 2016, Edgar R. Weippl, Stefan Katzenbeisser, Christopher Kruegel, Andrew C. Myers, and Shai Halevi (Eds.). ACM Press, 406–417. https://doi.org/10.1145/2976749.2978421
    [32]
    Stefan More and Lukas Alber. 2022. YOU SHALL NOT COMPUTE on my Data: Access Policies for Privacy-Preserving Data Marketplaces and an Implementation for a Distributed Market using MPC. arXiv preprint arXiv:2206.07507 (2022).
    [33]
    Nokia. 2023. Blockchain Data Marketplace Can Fuel the Data Economy. https://www.nokia.com/blog/blockchain-data-marketplace-can-fuel-the-data-economy/. [Online; accessed 7-March-2023].
    [34]
    Sikha Pentyala, Davis Railsback, Ricardo Maia, Rafael Dowsley, David Melanson, Anderson Nascimento, and Martine De Cock. 2022. Training Differentially Private Models with Secure Multiparty Computation. Cryptology ePrint Archive, Report 2022/146. https://ia.cr/2022/146.
    [35]
    Mayana Pereira, Sikha Pentyala, Anderson Nascimento, Rafael T de Sousa Jr, and Martine De Cock. 2022. Secure Multiparty Computation for Synthetic Data Generation from Distributed Data. In SyntheticData4ML workshop at NeurIPS2022.
    [36]
    Ocean Protocol. 2023. Ocean Protocol. https://oceanprotocol.com/. [Online; accessed 7-March-2023].
    [37]
    Congzheng Song, Thomas Ristenpart, and Vitaly Shmatikov. 2017. Machine learning models that remember too much. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 587–601.
    [38]
    Nick Szabo. 1997. Formalizing and Securing Relationships on Public Networks. First Monday 2, 9 (Sep. 1997). https://doi.org/10.5210/fm.v2i9.548
    [39]
    Zhihua Tian, Jian Liu, Jingyu Li, Xinle Cao, Ruoxi Jia, and Kui Ren. 2022. Private Data Valuation and Fair Payment in Data Marketplaces. arXiv preprint arXiv:2210.08723 (2022).
    [40]
    Florian Tramèr, Fan Zhang, Ari Juels, Michael K Reiter, and Thomas Ristenpart. 2016. Stealing machine learning models via prediction APIs. In 25th USENIX Security Symposium. 601–618.
    [41]
    Stacey Truex, Nathalie Baracaldo, Ali Anwar, Thomas Steinke, Heiko Ludwig, Rui Zhang, and Yi Zhou. 2019. A hybrid approach to privacy-preserving federated learning. In Proceedings of the 12th ACM workshop on artificial intelligence and security. 1–11.
    [42]
    Jiasi Weng, Jian Weng, Chengjun Cai, Hongwei Huang, and Cong Wang. 2021. Golden grain: Building a secure and decentralized model marketplace for MLaaS. IEEE Transactions on Dependable and Secure Computing 19, 5 (2021), 3149–3167.
    [43]
    Gavin Wood. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151 (2014), 1–32.
    [44]
    Sen Yuan, Milan Shen, Ilya Mironov, and Anderson Nascimento. 2021. Label private deep learning training based on secure multiparty computation and differential privacy. In NeurIPS 2021 Workshop Privacy in Machine Learning.

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    DEC '23: Proceedings of the Second ACM Data Economy Workshop
    June 2023
    57 pages
    ISBN:9798400708466
    DOI:10.1145/3600046
    This work is licensed under a Creative Commons Attribution International 4.0 License.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 07 September 2023

    Check for updates

    Author Tags

    1. Data holder
    2. Differential Privacy
    3. Secure Multiparty Computation
    4. blockchain.
    5. data consumer
    6. data economy
    7. privacy budget

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    DEC '23
    DEC '23: Second ACM Data Economy Workshop
    June 18, 2023
    WA, Seattle, USA

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 254
      Total Downloads
    • Downloads (Last 12 months)254
    • Downloads (Last 6 weeks)33

    Other Metrics

    Citations

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media