计算机科学 ›› 2026, Vol. 53 ›› Issue (4): 121-133.doi: 10.11896/jsjkx.250900002

• 数据库&大数据&数据科学 • 上一篇    下一篇

数据交易模式对比与交易难点分析

崔金甲1, 曾琛1, 王璐2, 彭晓晖1   

  1. 1 中国科学院计算技术研究所 北京 100190
    2 中国人民解放军91977部队 北京 100036
  • 收稿日期:2025-09-01 修回日期:2025-12-04 出版日期:2026-04-15 发布日期:2026-04-08
  • 通讯作者: 曾琛(zengchen@ict.ac.cn)
  • 作者简介:(mundotsui@qq.com)
  • 基金资助:
    国家自然科学基金(62072434,U23B2004)

Analysis of Data Trading Models and Transaction Challenges

CUI Jinjia1, ZENG Chen1, WANG Lu2, PENG Xiaohui1   

  1. 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China
    2 Troops 91977 PLA, Beijing 100036, China
  • Received:2025-09-01 Revised:2025-12-04 Published:2026-04-15 Online:2026-04-08
  • About author:CUI Jinjia,born in 2001,postgraduate,is a member of CCF(No.U1835G).His main research interests include decentralized identity and data trading.
    ZENG Chen,born in 1987,Ph.D,assistant researcher.Her main research interests include distributed systems and trust management.
  • Supported by:
    National Natural Science Foundation of China(62072434,U23B2004).

摘要: 在数字化加速的趋势下,数据要素成为各行业的核心资源,推动了市场的不断发展。然而,目前的数据交易市场发展并不完善,其原因主要有两点:一是个人用户的行为数据交易门槛过高;二是企业间数据交易的合规审查机制不健全,数据交易规则尚未完善,市场活力受到制约。数据交易困难的根本原因在于数据本身区别于传统意义上“一手交钱一手交货”的商品,存在定价难、确权难、质量保证难、交易非否认难和保障数据主权难的问题。对此,搜集整理了现有较为完善的数据交易框架,从交易模式的视角对现有框架进行分类对比;针对上述5个难点,详细介绍了现有文献的解决方案;针对现有数据交易市场的发展情况,提出了对未来发展的建议。

关键词: 数据交易难点, 数据确权, 数据定价, 数据主权, 数据质量保证, 数据交易非否认

Abstract: With the acceleration of digitalization,data have become a core resource across industries,driving continuous market growth.However,the current data trading market remains underdeveloped,mainly due to two reasons.Firstly,the high barriers for individuals to trade behavioral data.Secondly,the lack of sound compliance review mechanisms for inter-enterprise data tran-sactions,with incomplete trading rules that restrict market vitality.The fundamental difficulties in data trading lie in the unique characteristics of data,which differ from traditional “cash-and-carry” goods,leading to challenges in pricing,data rights confirmation,data quality assurance,non-repudiation of transactions,and the safeguarding of data sovereignty.This paper collects and organizes relatively mature data trading frameworks,classifies and compares them from the perspective of trading models,and provides a detailed introduction to the solutions proposed in the literature for the five major challenges mentioned above.Finally,in light of the current development of the data trading market,this study puts forward suggestions for future development.

Key words: Challenges in data trading, Data rights confirmation, Data pricing, Data sovereignty, Data quality assurance, Non-repudiation in data trading

中图分类号: 

  • TP399
[1]National Data Administration[EB/OL].https://www.nda.gov.cn.
[2]Data Governance Act[EB/OL].https://eur-lex.europa.eu/eli/reg/2022/868/oj.
[3]Opinions of the Communist Party of China Central Committee and the State Council on Establishing a Basic Data System to Better Give Play to the Role of Data Elements[EB/OL].https://www.gov.cn/zhengce/2022-12/19/content_5732695.htm.
[4]General Data Protection Regulation[EB/OL].https://gdpr-info.eu/.
[5]National Development and Reform Commission[EB/OL].ht-tps://www.ndrc.gov.cn/wsdwhfz/202209/t20220913_1335479_ext.html.
[6]Shanghai Data Exchange[EB/OL].https://www.chinadep.com/.
[7]Guiyang Big Data Exchange[EB/OL].https://www.gzdex.com.cn/.
[8]Research Report on Consumer Data Circulation Model Based on the Right to Data Portability[EB/OL].http://www.sic.gov.cn/sic/93/552/622/0529/202405290808571136847956_pc.html.
[9]XIONG Q,TANG K.Research Progress on the Right Delimitation,Exchange and Pricing of Data[J].Economic Perspectives,2021(2):143-158.
[10]JIANG D,YUAN Y,ZHANG X,et al.Survey on Data Pricing and Trading Research[J].Journal of Software,2022,34(3):1396-1424.
[11]MAO W,ZHENG Z,WU F.Pricing for Revenue Maximization in IoT Data Markets:An Information Design Perspective[C]//IEEE INFOCOM 2019-IEEE Conference on Computer Communications.IEEE,2019:1837-1845.
[12]TIAN X,ZHENG J,ZHANG Z.Jaccard Text Similarity Algorithm Based on Word Embedding[J].Computer Science,2018,45(7):186-189.
[13]WU W,LI B,CHEN L,et al.A Review for Weighted MinHash Algorithms(Extended abstract)[C]//2023 IEEE 39th International Conference on Data Engineering(ICDE).IEEE,2023:3785-3786.
[14]NAKAMOTO S.Bitcoin:A Peer-to-Peer Electronic Cash System[EB/OL].https://bitcoin.org/bitcoin.pdf.
[15]Peercoin-The Pioneer of Proof-of-Stake[EB/OL].https://www.peercoin.net/read/papers/peercoin-paper.pdf.
[16]Delegated Proof of Stake Consensus[EB/OL].https://bits-hares.org/delegated-proof-of-stake-consensus/.
[17]CASTRO M,LISKOV B.Practical Byzantine fault tolerance[C]//Proceedings of the Third Symposium on Operating Systems Design and Implementation.USENIX Association,1999:173-186.
[18]GENTRY C,BONEH D.A fully homomorphic encryptionscheme[EB/OL].https://crypto.stanford.edu/craig/craig-thesis.pdf.
[19]Intel Software Guard Extensions[EB/OL].Intel.https://www.intel.com/sgx.
[20]Building a Secure System using TrustZone Technology[EB/OL].https://documentation-service.arm.com/static/5f212796500e883ab8e74531.
[21]RIVEST R L,SHAMIR A,ADLEMAN L.A method for obtaining digital signatures and public-key cryptosystems[J].Communications of the ACM,1978,21(2):120-126.
[22]SU G,YANG W,LUO Z,et al.BDTF:A Blockchain-Based Data Trading Framework with Trusted Execution Environment[C]//2020 16th International Conference on Mobility,Sensing and Networking(MSN).IEEE,2020:92-97.
[23]CHEN F,WANG J,JIANG C,et al.Blockchain Based Non-repudiable IoT Data Trading:Simpler,Faster,and Cheaper[C]//IEEE INFOCOM 2022-IEEE Conference on Computer Communications.IEEE,2022:1958-1967.
[24]LIU Y,HAO X,REN W,et al.A Blockchain-Based Decentralized,Fair and Authenticated Information Sharing Scheme in Zero Trust Internet-of-Things[J].IEEE Transactions on Compu-ters,2023,72(2):501-512.
[25]WU Z,ZHENG H,ZHANG L,et al.Privacy-friendly Blockchain Based Data Trading and Tracking[C]//2019 5th International Conference on Big Data Computing and Communications(BIGCOM).IEEE,2019:240-244.
[26]JUNG T,LI X Y,HUANG W,et al.AccountTrade:Accountable protocols for big data trading against dishonest consumers[C]//IEEE INFOCOM 2017-IEEE Conference on Computer Communications.IEEE,2017:1-9.
[27]HE Y,ZHU H,WANG C,et al.An Accountable Data TradingPlatform Based on Blockchain[C]//IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops(INFOCOM WKSHPS).IEEE,2019:1-6.
[28]DAI W,DAI C,CHOO K K R,et al.SDTE:A Secure Blockchain-Based Data Trading Ecosystem[J].IEEE Transactions on Information Forensics and Security,2020,15:725-737.
[29]ZHENG Z,MAO W,XING Y,et al.On Designing Market Mo-del and Pricing Mechanisms for IoT Data Exchange[J].IEEE Transactions on Mobile Computing,2024,23(11):10202-10218.
[30]LI Q,LIU Z,LI Q,et al.martFL:Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture[C]//Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security.ACM,2023:1496-1510.
[31]CHEN L,KOUTRIS P,KUMAR A.Model-based Pricing forMachine Learning in a Data Marketplace[J].arXiv:1805.11450,2018.
[32]SHENG D,XIAO M,LIU A,et al.CPchain:A Copyright-Preserving Crowdsourcing Data Trading Framework Based on Blockchain[C]//2020 29th International Conference on Computer Communications and Networks(ICCCN).IEEE,2020:1-9.
[33]CAI C,ZHENG Y,ZHOU A,et al.Building a Secure Know-ledge Marketplace Over Crowdsensed Data Streams[J].IEEE Transactions on Dependable and Secure Computing,2021,18(6):2601-2616.
[34]AN B,XIAO M,LIU A,et al.Secure Crowdsensed Data Trading Based on Blockchain[J].IEEE Transactions on Mobile Computing,2023,22(3):1763-1778.
[35]DENG Q,ZUO Q,LI Z,et al.Privacy-Preserving Stable DataTrading for Unknown Market Based on Blockchain[J].IEEE Transactions on Mobile Computing,2025,24(7):5615-5631.
[36]WANG E,CAI J,YANG Y,et al.Trustworthy and Efficient Crowdsensed Data Trading on Sharding Blockchain[J].IEEE Journal on Selected Areas in Communications,2022,40(12):3547-3561.
[37]ZHANG L,LI Y,XIAO X,et al.CrowdBuy:Privacy-friendlyImage Dataset Purchasing via Crowdsourcing[C]//IEEE INFOCOM 2018-IEEE Conference on Computer Communications.IEEE,2018:2735-2743.
[38]ZHENG Z,PENG Y,WU F,et al.Trading Data in the Crowd:Profit-Driven Data Acquisition for Mobile Crowdsensing[J].IEEE Journal on Selected Areas in Communications,2017,35(2):486-501.
[39]CHENLI C,TANG W,GOMULKA F,et al.ProvNet:Net-worked bi-directional blockchain for data sharing with verifiable provenance[J].Journal of Parallel and Distributed Computing,2022,166:32-44.
[40]XIONG W,XIONG L.Smart Contract Based Data TradingMode Using Blockchain and Machine Learning[J].IEEE Access,2019,7:102331-102344.
[41]HUANG Y,ZENG Y,YE F,et al.Fair and Protected ProfitSharing for Data Trading in Pervasive Edge Computing Environments[C]//IEEE INFOCOM 2020-IEEE Conference on Computer Communications.IEEE,2020:1718-1727.
[42]ZHAO Y,GONG X,CHEN X.Privacy-Preserving IncentiveMechanisms for Truthful Data Quality in Data Crowdsourcing[J].IEEE Transactions on Mobile Computing,2022,21(7):2518-2532.
[43]ZHAO C,YANG S,MCCANN J A.On the Data Quality in Privacy-Preserving Mobile Crowdsensing Systems with Untruthful Reporting[J].IEEE Transactions on Mobile Computing,2021,20(2):647-661.
[44]ZHOU M,FANTI G,SHI E.Conan:Distributed Proofs of Compliance for Anonymous Data Collection[C]//Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security.New York:ACM,2024:914-928.
[45]NIU C,ZHENG Z,WU F,et al.Trading Data in Good Faith:Integrating Truthfulness and Privacy Preservation in Data Markets[C]//2017 IEEE 33rd International Conference on Data Engineering(ICDE).2017:223-226.
[46]ZHANG M,LI X,MIAO Y,et al.Privacy-Preserved Data Disturbance and Truthfulness Verification for Data Trading[J].IEEE Transactions on Information Forensics and Security,2024,19:5545-5560.
[47]ZHENG S,PAN L,HU D,et al.A Blockchain-Based TradingPlatform for Big Data[C]//IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops(INFOCOM WKSHPS).IEEE,2020:991-996.
[48]CHEN W,YANG W,XIAO M,et al.LBDT:A LightweightBlockchain-Based Data Trading Scheme in Internet of Vehicles Using Proof-of-Reputation[J].IEEE Transactions on Mobile Computing,2025,24(4):2800-2816.
[49]ZHENG Z,PENG Y,WU F,et al.ARETE:On Designing Joint Online Pricing and Reward Sharing Mechanisms for Mobile Data Markets[J].IEEE Transactions on Mobile Computing,2020,19(4):769-787.
[50]XUE S,DING H,ZHANG L,et al.Online Competitive Posted-Pricing Mechanism for Trading Time-Sensitive Valued Data[C]//2022 8th International Conference on Big Data Computing and Communications(BigCom).IEEE,2022:44-53.
[51]ZHANG M,ARAFA A,HUANG J,et al.Pricing Fresh Data[J].IEEE Journal on Selected Areas in Communications,2021,39(5):1211-1225.
[52]NIU C,ZHENG Z,TANG S,et al.Making Big Money fromSmall Sensors:Trading Time-Series Data under Pufferfish Privacy[C]//IEEE INFOCOM 2019-IEEE Conference on Computer Communications.IEEE,2019:568-576.
[53]NIU C,ZHENG Z,WU F,et al.Online Pricing with Reserve Price Constraint for Personal Data Markets[C]//2020 IEEE 36th International Conference on Data Engineering(ICDE).2020:1978-1981.
[54]LI C,LI D Y,MIKLAU G,et al.A Theory of Pricing Private Data[J].ACM Transactions on Database Systems,2014,39(4):1-28.
[55]NIU C,ZHENG Z,WU F,et al.ERATO:Trading Noisy Aggregate Statistics over Private Correlated Data[J].IEEE Transactions on Knowledge and Data Engineering,2019,33(3):975-990.
[56]XU A,ZHENG Z,LI Q,et al.VAP:Online Data Valuation and Pricing for Machine Learning Models in Mobile Health[J].IEEE Transactions on Mobile Computing,2024,23(5):5966-5983.
[57]MAO W,ZHENG Z,WU F,et al.Online Pricing for Revenue Maximization with Unknown Time Discounting Valuations[C]//Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence.Stockholm:International Joint Conferences on Artificial Intelligence Organization,2018:440-446.
[58]XIAO M,LI M,ZHANG J J.Locally Differentially Private Personal Data Markets Using Contextual Dynamic Pricing Mechanism[J].IEEE Transactions on Dependable and Secure Computing,2023,20(6):5043-5055.
[59]KOUTRIS P,UPADHYAYA P,BALAZINSKA M,et al.To-ward practical query pricing with QueryMarket[C]//Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data.New York:ACM,2013:613-624.
[60]LI Q,LI Z,ZHENG Z,et al.Capitalize Your Data:Optimal Selling Mechanisms for IoT Data Exchange[J].IEEE Transactions on Mobile Computing,2023,22(4):1988-2000.
[61]CHENLI C,TANG W,JUNG T.FairTrade:Efficient AtomicExchange-based Fair Exchange Protocol for Digital Data Trading[C]//2021 IEEE International Conference on Blockchain(Blockchain).IEEE,2021:38-46.
[62]TAS E N,SERES I A,ZHANG Y,et al.Atomic and Fair Data Exchange via Blockchain[C]//Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security.New York:ACM,2024:3227-3241.
[63]UROVI V,JAIMAN V,ANGERER A,et al.LUCE:A Blockchain-based data sharing platform for monitoring data license accountability and compliance[J].arXiv:2202.11646,2022.
[64]JU C,TANG W,CHENLI C,et al.Monitoring Provenance ofDelegated Personal Data with Blockchain[C]//2022 IEEE International Conference on Blockchain(Blockchain).2022:11-20.
[65]LOHMÖLLER J,VLAD E,DAHLMANNS M,et al.Poster:Bridging Trust Gaps:Data Usage Transparency in Federated Data Ecosystems[C]//Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security.New York:ACM,2023:3582-3584.
[66]DAIDONE F,CARMINATI B,FERRARI E.Blockchain-Based Privacy Enforcement in the IoT Domain[J].IEEE Transactions on Dependable and Secure Computing,2022,19(6):3887-3898.
[67]COHEN A,SMITH A,SWANBERG M,et al.Control,Confidentiality,and the Right to be Forgotten[C]//Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security.ACM,2023:3358-3372.
[68]MEI Q,YANG M,CHEN J,et al.Expressive Data Sharing and Self-Controlled Fine-Grained Data Deletion in Cloud-Assisted IoT[J].IEEE Transactions on Dependable and Secure Computing,2023,20(3):2625-2640.
[69]Gaia-X:A Federated Secure Data Infrastructure[EB/OL].https://gaia-x.eu/.
[70]Decentralized Identifiers v1.0[EB/OL].https://www.w3.org/TR/did-1.0/.
[71]Verifiable Credential 2.0[EB/OL].https://www.w3.org/TR/vc-data-model-2.0/.
[1] 丛颖男, 彭友, 朱金清.
卡-梅框架下数据财产权益保护规则分类分级配置研究
Study on Classification and Grading Allocation of Data Property Rights Protection Rules UnderC&M Framework
计算机科学, 2024, 51(8): 34-44. https://doi.org/10.11896/jsjkx.240100030
[2] 王海龙,田有亮,尹鑫.
基于区块链的大数据确权方案
Blockchain-based Big Data Right Confirmation Scheme
计算机科学, 2018, 45(2): 15-19. https://doi.org/10.11896/j.issn.1002-137X.2018.02.003
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!