{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T07:17:54Z","timestamp":1721805474967},"reference-count":63,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers & Security"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1016\/j.cose.2021.102529","type":"journal-article","created":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T06:46:59Z","timestamp":1635749219000},"page":"102529","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":12,"special_numbering":"C","title":["Personal big data pricing method based on differential privacy"],"prefix":"10.1016","volume":"113","author":[{"given":"Yuncheng","family":"Shen","sequence":"first","affiliation":[]},{"given":"Bing","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Shen","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7559-346X","authenticated-orcid":false,"given":"Xuliang","family":"Duan","sequence":"additional","affiliation":[]},{"given":"Xiangqian","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Chuanwu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yuming","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.cose.2021.102529_bib0001","series-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","first-page":"308","article-title":"Deep learning with differential privacy","author":"Abadi","year":"2016"},{"key":"10.1016\/j.cose.2021.102529_bib0002","series-title":"Proceedings of the 13th International Conference on Predictive Models and Data Analytics in Software Engineering","first-page":"63","article-title":"Context-centric pricing: farly pricing models for software crowdsourcing tasks","author":"Alelyani","year":"2017"},{"key":"10.1016\/j.cose.2021.102529_bib0003","series-title":"Proceedings of the 19th International Conference on World Wide Web","first-page":"61","article-title":"Find me if you can: improving geographical prediction with social and spatial proximity","author":"Backstrom","year":"2010"},{"key":"10.1016\/j.cose.2021.102529_bib0004","unstructured":"Bafna, M., Ullman, J., 2017. The price of selection in differential privacy. arXiv.org URL: http:\/\/search.proquest.com\/docview\/2074674569\/."},{"key":"10.1016\/j.cose.2021.102529_bib0005","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1016\/j.procs.2016.04.211","article-title":"Monetizing personal data: a two-sided market approach","volume":"83","author":"Bataineh","year":"2016","journal-title":"Procedia Comput. Sci."},{"key":"10.1016\/j.cose.2021.102529_bib0006","doi-asserted-by":"crossref","unstructured":"Bun, M., Steinke, T., Ullman, J., 2016. Make up your mind: the price of online queries in differential privacy. arXiv.org URL: http:\/\/search.proquest.com\/docview\/2077033886\/.","DOI":"10.1137\/1.9781611974782.85"},{"issue":"4","key":"10.1016\/j.cose.2021.102529_bib0007","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2691190.2691191","article-title":"A theory of pricing private data","volume":"39","author":"Chao","year":"2014","journal-title":"ACM Trans. Database Syst."},{"key":"10.1016\/j.cose.2021.102529_bib0008","series-title":"Proceedings of the 1st Workshop on Data Management for End-to-end Machine Learning","first-page":"1","article-title":"Model-based pricing: do not pay for more than what you learn","author":"Chen","year":"2017"},{"issue":"1","key":"10.1016\/j.cose.2021.102529_bib0009","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1145\/357980.358007","article-title":"A relational model of data for large shared data banks","volume":"26","author":"Codd","year":"1983","journal-title":"Commun. ACM"},{"key":"10.1016\/j.cose.2021.102529_bib0010","series-title":"Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science","first-page":"317","article-title":"Accuracy for sale: aggregating data with a variance constraint","author":"Cummings","year":"2015"},{"key":"10.1016\/j.cose.2021.102529_bib0011","series-title":"Proceedings of the Twenty-second ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems","first-page":"202","article-title":"Revealing information while preserving privacy","author":"Dinur","year":"2003"},{"issue":"3","key":"10.1016\/j.cose.2021.102529_bib0012","doi-asserted-by":"crossref","first-page":"17","DOI":"10.29012\/jpc.v7i3.405","article-title":"Calibrating noise to sensitivity in private data analysis","volume":"7","author":"Dwork","year":"2017","journal-title":"J. Privacy Confid."},{"issue":"3-4","key":"10.1016\/j.cose.2021.102529_bib0013","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1561\/0400000042","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"Dwork","year":"2014","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"10.1016\/j.cose.2021.102529_bib0014","unstructured":"Facebook, 2018. Facebook is not the problem. lax privacy rules are.https:\/\/www.nytimes.com\/2018\/04\/01\/opinion\/facebooklax-privacy-rules.html\/."},{"key":"10.1016\/j.cose.2021.102529_bib0015","doi-asserted-by":"crossref","unstructured":"Fricker, S., Maksimov, Y., 2017. Pricing of data products in data marketplaces. vol. 304, pp. 49\u201366.","DOI":"10.1007\/978-3-319-69191-6_4"},{"issue":"002","key":"10.1016\/j.cose.2021.102529_bib0016","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2699501","article-title":"Optimizing batch linear queries under exact and approximate differential privacy","volume":"040","author":"Ganzhao","year":"2015","journal-title":"ACM Trans. Database Syst. (TODS)"},{"issue":"C","key":"10.1016\/j.cose.2021.102529_bib0017","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1016\/j.geb.2013.06.013","article-title":"Selling privacy at auction","volume":"91","author":"Ghosh","year":"2015","journal-title":"Games Econ. Behav."},{"issue":"2","key":"10.1016\/j.cose.2021.102529_bib0018","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/s12525-015-0188-8","article-title":"Pricing private data","volume":"25","author":"Gkatzelis","year":"2015","journal-title":"Electron. Mark."},{"issue":"1","key":"10.1016\/j.cose.2021.102529_bib0019","first-page":"126","article-title":"Personal data bank:a new mode of personal big data asset management and value-added services based on bank architecture","volume":"40","author":"Guo","year":"2017","journal-title":"Chin. J. Comput."},{"issue":"2","key":"10.1016\/j.cose.2021.102529_bib0020","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1145\/2185376.2185390","article-title":"Privacy analytics","volume":"42","author":"Haddadi","year":"2012","journal-title":"Acm Sigcomm Comput. Commun. Rev."},{"issue":"4","key":"10.1016\/j.cose.2021.102529_bib0021","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1007\/s007780100054","article-title":"Answering queries using views: a survey","volume":"10","author":"Halevy","year":"2001","journal-title":"VLDB J."},{"key":"10.1016\/j.cose.2021.102529_bib0022","series-title":"2015 IEEE 31st International Conference on Data Engineering","first-page":"1023","article-title":"Conservative or liberal? Personalized differential privacy","author":"Jorgensen","year":"2015"},{"key":"10.1016\/j.cose.2021.102529_bib0023","doi-asserted-by":"crossref","unstructured":"Kiyomoto, S., 2016. Data value estimation for privacy-preserving big\/personal data businesses.","DOI":"10.1007\/978-4-431-55342-7_14"},{"issue":"5","key":"10.1016\/j.cose.2021.102529_bib0024","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2770870","article-title":"Query-based data pricing","volume":"62","author":"Koutris","year":"2015","journal-title":"J. ACM"},{"issue":"12","key":"10.1016\/j.cose.2021.102529_bib0025","doi-asserted-by":"crossref","first-page":"1962","DOI":"10.14778\/2367502.2367548","article-title":"Querymarket demonstration: pricing for online data markets","volume":"5","author":"Koutris","year":"2012","journal-title":"Proc. VLDB Endow."},{"key":"10.1016\/j.cose.2021.102529_bib0026","unstructured":"Leroy, S., Werner, J., 2018. Arbitrage and Positive Pricing. pp. 24\u201334. 10.1017\/cbo9781139162272.005"},{"issue":"12","key":"10.1016\/j.cose.2021.102529_bib0027","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1145\/3139457","article-title":"A theory of pricing private data","volume":"60","author":"Li","year":"2017","journal-title":"Commun. ACM"},{"key":"10.1016\/j.cose.2021.102529_bib0028","unstructured":"Li, C., Miklau, G., 2012. Pricing aggregate queries in a data marketplace. Webdb."},{"key":"10.1016\/j.cose.2021.102529_bib0029","doi-asserted-by":"crossref","first-page":"15132","DOI":"10.1109\/ACCESS.2018.2806881","article-title":"A survey on big data market: pricing, trading and protection","volume":"6","author":"Liang","year":"2018","journal-title":"Ieee Access"},{"key":"10.1016\/j.cose.2021.102529_bib0030","series-title":"The Network and Distributed System Security Symposium 2016","article-title":"Dependence makes you vulnerable: differential privacy under dependent tuples","author":"Liu","year":"2016"},{"issue":"5","key":"10.1016\/j.cose.2021.102529_bib0031","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1002\/mde.2669","article-title":"Reverse pricing and revenue sharing in a vertical market","volume":"36","author":"Liu","year":"2015","journal-title":"Manag. Decis. Econ."},{"issue":"2","key":"10.1016\/j.cose.2021.102529_bib0032","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1016\/j.clsr.2017.08.006","article-title":"Pricing privacy \u2013 the right to know the value of your personal data","volume":"34","author":"Malgieri","year":"2018","journal-title":"Comput. Law Secur. Rev."},{"key":"10.1016\/j.cose.2021.102529_bib0033","series-title":"IEEE INFOCOM 2019 - IEEE Conference on Computer Communications","first-page":"1837","article-title":"Pricing for revenue maximization in IoT data markets: an information design perspective","author":"Mao","year":"2019"},{"key":"10.1016\/j.cose.2021.102529_bib0034","series-title":"48th Annual IEEE Symposium on Foundations of Computer Science (FOCS\u201907)","first-page":"94","article-title":"Mechanism design via differential privacy","author":"Mcsherry","year":"2007"},{"key":"10.1016\/j.cose.2021.102529_bib0035","unstructured":"MovieLens, 2003. Movielens 1mdataset. 2003. Available online. https:\/\/grouplens.org\/datasets\/movielens\/1m\/."},{"issue":"3","key":"10.1016\/j.cose.2021.102529_bib0036","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1806907.1806913","article-title":"Views and queries: determinacy and rewriting","volume":"35","author":"Nash","year":"2010","journal-title":"ACM Trans. Database Syst. (TODS)"},{"key":"10.1016\/j.cose.2021.102529_bib0037","unstructured":"Nget, R., Cao, Y., Yoshikawa, M., 2018. How to balance privacy and money through pricing mechanism in personal data market. arXiv.org URL: http:\/\/search.proquest.com\/docview\/2068911597\/."},{"key":"10.1016\/j.cose.2021.102529_bib0038","series-title":"IEEE INFOCOM 2019 - IEEE Conference on Computer Communications","first-page":"568","article-title":"Making big money from small sensors: trading time-series data under pufferfish privacy","author":"Niu","year":"2019"},{"key":"10.1016\/j.cose.2021.102529_bib0039","series-title":"2017 IEEE 33rd International Conference on Data Engineering (ICDE)","first-page":"223","article-title":"Trading data in good faith: integrating truthfulness and privacy preservation in data markets","author":"Niu","year":"2017"},{"issue":"1","key":"10.1016\/j.cose.2021.102529_bib0040","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1109\/TKDE.2018.2822727","article-title":"Achieving data truthfulness and privacy preservation in data markets","volume":"31","author":"Niu","year":"2019","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/j.cose.2021.102529_bib0041","series-title":"Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","first-page":"2031","article-title":"Unlocking the value of privacy: trading aggregate statistics over private correlated data","author":"Niu","year":"2018"},{"issue":"001","key":"10.1016\/j.cose.2021.102529_bib0042","doi-asserted-by":"crossref","first-page":"103","DOI":"10.2478\/popets-2020-0007","article-title":"Not all attributes are created equal: dx-private mechanisms for linear queries","volume":"2020","author":"Parameswaran","year":"2020","journal-title":"Proc. Privacy Enhancing Technol."},{"issue":"C","key":"10.1016\/j.cose.2021.102529_bib0043","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1016\/j.ins.2017.10.009","article-title":"Optimized, direct sale of privacy in personal data marketplaces","volume":"424","author":"Parra-Arnau","year":"2018","journal-title":"Inf. Sci."},{"issue":"5","key":"10.1016\/j.cose.2021.102529_bib0044","doi-asserted-by":"crossref","first-page":"482","DOI":"10.1109\/TST.2016.7590317","article-title":"A pricing model for big personal data","volume":"21","author":"Shen","year":"2016","journal-title":"Tsinghua Sci. Technol."},{"issue":"16","key":"10.1016\/j.cose.2021.102529_bib0045","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/app9163388","article-title":"Pricing personal data based on data provenance","volume":"9","author":"Shen","year":"2019","journal-title":"Appl. Sci."},{"key":"10.1016\/j.cose.2021.102529_bib0046","series-title":"Proceedings of the 2017 ACM International Conference on Management of Data","first-page":"1291","article-title":"Pufferfish privacy mechanisms for correlated data","author":"Song","year":"2017"},{"key":"10.1016\/j.cose.2021.102529_bib0047","series-title":"2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW)","first-page":"290","article-title":"High quality information provisioning and data pricing","author":"Stahl","year":"2013"},{"key":"10.1016\/j.cose.2021.102529_bib0048","series-title":"Data Quality Scores for Pricing on Data Marketplaces","first-page":"215","author":"Stahl","year":"2016"},{"issue":"6","key":"10.1016\/j.cose.2021.102529_bib0049","doi-asserted-by":"crossref","first-page":"768","DOI":"10.1016\/j.clsr.2017.05.008","article-title":"Online price discrimination and personal data: ageneral data protection regulation perspective","volume":"33","author":"Steppe","year":"2017","journal-title":"Comput. Law Secur. Rev."},{"key":"10.1016\/j.cose.2021.102529_bib0050","series-title":"2012 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining","first-page":"411","article-title":"A guide to differential privacy theory in social network analysis","author":"Task","year":"2012"},{"key":"10.1016\/j.cose.2021.102529_bib0051","unstructured":"Twitter, 2018. Twitter sold data access to cambridge analytica-linked researcher. https:\/\/www.bloomberg.com\/news\/articles\/2018-04-29\/twitter-sold-cambridge-analytica-researcher-public-dataaccess\/."},{"issue":"1","key":"10.1016\/j.cose.2021.102529_bib0052","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/974121.974131","article-title":"State-of-the-art in privacy preserving data mining","volume":"33","author":"Verykios","year":"2004","journal-title":"ACM SIGMOD Rec."},{"issue":"1","key":"10.1016\/j.cose.2021.102529_bib0053","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/TBDATA.2017.2723563","article-title":"Robust big data analytics for electricity price forecasting in the smart grid","volume":"5","author":"Wang","year":"2019","journal-title":"IEEE Trans. Big Data"},{"issue":"4","key":"10.1016\/j.cose.2021.102529_bib0054","doi-asserted-by":"crossref","first-page":"759","DOI":"10.1007\/s10766-017-0534-x","article-title":"A novel auction-based query pricing schema","volume":"47","author":"Wang","year":"2019","journal-title":"Int. J. Parallel Program."},{"issue":"001","key":"10.1016\/j.cose.2021.102529_bib0055","first-page":"219","article-title":"The optimal upper bound of the number of queries for laplace mechanism under differential privacy","volume":"503","author":"Xiaoguang","year":"2019","journal-title":"Inf. Sci."},{"issue":"2","key":"10.1016\/j.cose.2021.102529_bib0056","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1109\/TIFS.2016.2611487","article-title":"Dynamic privacy pricing: a multi-armed bandit approach with time-variant rewards","volume":"12","author":"Xu","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.cose.2021.102529_bib0057","series-title":"Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data","first-page":"747","article-title":"Bayesian differential privacy on correlated data","author":"Yang","year":"2015"},{"key":"10.1016\/j.cose.2021.102529_bib0058","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cie.2017.08.008","article-title":"Data pricing strategy based on data quality","volume":"112","author":"Yu","year":"2017","journal-title":"Comput. Ind. Eng."},{"issue":"11","key":"10.1016\/j.cose.2021.102529_bib0059","doi-asserted-by":"crossref","first-page":"1364","DOI":"10.14778\/2350229.2350253","article-title":"Functional mechanism: regression analysis under differential privacy","volume":"5","author":"Zhang","year":"2012","journal-title":"Proc. VLDB Endow."},{"key":"10.1016\/j.cose.2021.102529_bib0060","series-title":"2011 IEEE International Conference on Communications (ICC)","first-page":"1","article-title":"Distributed data mining with differential privacy","author":"Zhang","year":"2011"},{"issue":"4","key":"10.1016\/j.cose.2021.102529_bib0061","doi-asserted-by":"crossref","first-page":"769","DOI":"10.1109\/TMC.2019.2900243","article-title":"Arete: on designing joint online pricing and reward sharing mechanisms for mobile data markets","volume":"19","author":"Zheng","year":"2019","journal-title":"IEEE Trans. Mob. Comput."},{"key":"10.1016\/j.cose.2021.102529_bib0062","series-title":"Proceedings of the 15th ACM International Symposium on Mobile Ad Hoc Networking and Computing","first-page":"185","article-title":"Differentially private spectrum auction with approximate revenue maximization","author":"Zhu","year":"2014"},{"issue":"8","key":"10.1016\/j.cose.2021.102529_bib0063","doi-asserted-by":"crossref","first-page":"1619","DOI":"10.1109\/TKDE.2017.2697856","article-title":"Differentially private data publishing and analysis: a survey","volume":"29","author":"Zhu","year":"2017","journal-title":"IEEE Trans. Knowl. Data Eng."}],"container-title":["Computers & Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404821003539?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404821003539?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,3,29]],"date-time":"2024-03-29T00:36:33Z","timestamp":1711672593000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404821003539"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2]]},"references-count":63,"alternative-id":["S0167404821003539"],"URL":"https:\/\/doi.org\/10.1016\/j.cose.2021.102529","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2022,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Personal big data pricing method based on differential privacy","name":"articletitle","label":"Article Title"},{"value":"Computers & Security","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.cose.2021.102529","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2021 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"102529"}}