Redrawing the boundaries on purchasing data from privacy-sensitive individuals

Kobbi Nissim, Salil Vadhan, David Xiao

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

40 Scopus citations

Abstract

We prove new positive and negative results concerning the existence of truthful and individually rational mechanisms for purchasing private data from individuals with unbounded and sensitive privacy preferences. We strengthen the impossibility results of Ghosh and Roth (EC 2011) by extending it to a much wider class of privacy valuations. In particular, these include privacy valuations that are based on (ε, δ)-differentially private mechanisms for non-zero S, ones where the privacy costs are measured in a per-database manner (rather than taking the worst case), and ones that do not depend on the payments made to players (which might not be observable to an adversary). To bypass this impossibility result, we study a natural special setting where individuals have monotonic privacy valuations, which captures common contexts where certain values for private data are expected to lead to higher valuations for privacy (e.g. having a particular disease). We give new mechanisms that are individually rational for all players with monotonic privacy valuations, truthful for all players whose privacy valuations are not too large, and accurate if there are not too many players with too-large privacy valuations. We also prove matching lower bounds showing that in some respects our mechanism cannot be improved significantly.

Original languageEnglish
Title of host publicationITCS 2014 - Proceedings of the 2014 Conference on Innovations in Theoretical Computer Science
PublisherAssociation for Computing Machinery
Pages411-421
Number of pages11
ISBN (Print)9781450322430
DOIs
StatePublished - 1 Jan 2014
Event2014 5th Conference on Innovations in Theoretical Computer Science, ITCS 2014 - Princeton, NJ, United States
Duration: 12 Jan 201414 Jan 2014

Publication series

NameITCS 2014 - Proceedings of the 2014 Conference on Innovations in Theoretical Computer Science

Conference

Conference2014 5th Conference on Innovations in Theoretical Computer Science, ITCS 2014
Country/TerritoryUnited States
CityPrinceton, NJ
Period12/01/1414/01/14

Keywords

  • Differential privacy
  • Mechanism design

ASJC Scopus subject areas

  • Computational Theory and Mathematics

Fingerprint

Dive into the research topics of 'Redrawing the boundaries on purchasing data from privacy-sensitive individuals'. Together they form a unique fingerprint.

Cite this