Impact of social learning on privacy-preserving data collection

被引:1
|
作者
Akbay A.B. [1 ]
Wang W. [2 ]
Zhang J. [1 ]
机构
[1] The School of Electrical, Computer and Energy Engineering, Arizona State University, Tempe, 85281, AZ
[2] The Department of Computer Science, Carnegie Mellon University, Pittsburgh, 15213, PA
来源
Akbay, Abdullah Basar (aakbay@asu.edu) | 1600年 / Institute of Electrical and Electronics Engineers Inc.卷 / 02期
关键词
Crowdsourcing; Data collection; Differential privacy; Social networks;
D O I
10.1109/JSAIT.2021.3053545
中图分类号
学科分类号
摘要
We study a game-theoretic model where a data collector purchases data from users through a payment mechanism. Each user has her personal signal which represents her knowledge about the underlying state the data collector desires to learn. Through social interactions, each user can also learn noisy versions of her friends’ personal signals, which are called ‘group signals’. We develop a Bayesian game theoretic framework to study the impact of social learning on users’ data reporting strategies and devise the payment mechanism for the data collector accordingly. We show that the Bayesian-Nash equilibrium can be in the form of either a symmetric randomized response (SR) strategy or an informative non-disclosive (ND) strategy. Specifically, a generalized majority voting rule is applied by each user to her noisy group signals to determine which strategy to follow. Our findings reveal that both the data collector and the users can benefit from social learning which drives down the privacy costs and helps to improve the state estimation for a given total payment budget. Further, we derive bounds on the minimum total payment required to achieve a given level of state estimation accuracy. © 2021 IEEE.
引用
收藏
页码:268 / 282
页数:14
相关论文
共 50 条
  • [41] Privacy-Preserving Deep Learning
    Shokri, Reza
    Shmatikov, Vitaly
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1310 - 1321
  • [42] Privacy-Preserving Deep Learning
    Shokri, Reza
    Shmatikov, Vitaly
    2015 53RD ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2015, : 909 - 910
  • [43] Privacy-Preserving Machine Learning
    Chow, Sherman S. M.
    FRONTIERS IN CYBER SECURITY, 2018, 879 : 3 - 6
  • [44] A New Edge Perturbation Mechanism for Privacy-Preserving Data Collection in IOT
    CHEN Qiuling
    YE Ayong
    ZHANG Qiang
    HUANG Chuan
    ChineseJournalofElectronics, 2023, 32 (03) : 603 - 612
  • [45] Secure and Privacy-Preserving Body Sensor Data Collection and Query Scheme
    Zhu, Hui
    Gao, Lijuan
    Li, Hui
    SENSORS, 2016, 16 (02)
  • [46] User-Centric Privacy-Preserving Collection and Analysis of Trajectory Data
    Romero-Tris, Cristina
    Megias, David
    DATA PRIVACY MANAGEMENT, AND SECURITY ASSURANCE, 2016, 9481 : 245 - 253
  • [47] PPDCA: Privacy-Preserving Crowdsensing Data Collection and Analysis with Randomized Response
    Lin, Bo-Cheng
    Wu, Shang-Hong
    Tsou, Yao-Tung
    Huang, Yennun
    2018 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2018,
  • [48] A Secure and Privacy-Preserving Protocol for Smart Metering Operational Data Collection
    Mustafa, Mustafa A.
    Cleemput, Sara
    Aly, Abdelrahaman
    Abidin, Aysajan
    IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (06) : 6481 - 6490
  • [49] Privacy-preserving data mining
    Agrawal, R
    Srikant, R
    SIGMOD RECORD, 2000, 29 (02) : 439 - 450
  • [50] Privacy-Preserving Data Publishing
    Liu, Ruilin
    Wang, Hui
    2010 IEEE 26TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING WORKSHOPS (ICDE 2010), 2010, : 305 - 308