Computer Science ›› 2026, Vol. 53 ›› Issue (4): 121-133.doi: 10.11896/jsjkx.250900002

• Database & Big Data & Data Science • Previous Articles     Next Articles

Analysis of Data Trading Models and Transaction Challenges

CUI Jinjia1, ZENG Chen1, WANG Lu2, PENG Xiaohui1   

  1. 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China
    2 Troops 91977 PLA, Beijing 100036, China
  • Received:2025-09-01 Revised:2025-12-04 Online:2026-04-15 Published:2026-04-08
  • About author:CUI Jinjia,born in 2001,postgraduate,is a member of CCF(No.U1835G).His main research interests include decentralized identity and data trading.
    ZENG Chen,born in 1987,Ph.D,assistant researcher.Her main research interests include distributed systems and trust management.
  • Supported by:
    National Natural Science Foundation of China(62072434,U23B2004).

Abstract: With the acceleration of digitalization,data have become a core resource across industries,driving continuous market growth.However,the current data trading market remains underdeveloped,mainly due to two reasons.Firstly,the high barriers for individuals to trade behavioral data.Secondly,the lack of sound compliance review mechanisms for inter-enterprise data tran-sactions,with incomplete trading rules that restrict market vitality.The fundamental difficulties in data trading lie in the unique characteristics of data,which differ from traditional “cash-and-carry” goods,leading to challenges in pricing,data rights confirmation,data quality assurance,non-repudiation of transactions,and the safeguarding of data sovereignty.This paper collects and organizes relatively mature data trading frameworks,classifies and compares them from the perspective of trading models,and provides a detailed introduction to the solutions proposed in the literature for the five major challenges mentioned above.Finally,in light of the current development of the data trading market,this study puts forward suggestions for future development.

Key words: Challenges in data trading, Data rights confirmation, Data pricing, Data sovereignty, Data quality assurance, Non-repudiation in data trading

CLC Number: 

  • TP399
[1]National Data Administration[EB/OL].https://www.nda.gov.cn.
[2]Data Governance Act[EB/OL].https://eur-lex.europa.eu/eli/reg/2022/868/oj.
[3]Opinions of the Communist Party of China Central Committee and the State Council on Establishing a Basic Data System to Better Give Play to the Role of Data Elements[EB/OL].https://www.gov.cn/zhengce/2022-12/19/content_5732695.htm.
[4]General Data Protection Regulation[EB/OL].https://gdpr-info.eu/.
[5]National Development and Reform Commission[EB/OL].ht-tps://www.ndrc.gov.cn/wsdwhfz/202209/t20220913_1335479_ext.html.
[6]Shanghai Data Exchange[EB/OL].https://www.chinadep.com/.
[7]Guiyang Big Data Exchange[EB/OL].https://www.gzdex.com.cn/.
[8]Research Report on Consumer Data Circulation Model Based on the Right to Data Portability[EB/OL].http://www.sic.gov.cn/sic/93/552/622/0529/202405290808571136847956_pc.html.
[9]XIONG Q,TANG K.Research Progress on the Right Delimitation,Exchange and Pricing of Data[J].Economic Perspectives,2021(2):143-158.
[10]JIANG D,YUAN Y,ZHANG X,et al.Survey on Data Pricing and Trading Research[J].Journal of Software,2022,34(3):1396-1424.
[11]MAO W,ZHENG Z,WU F.Pricing for Revenue Maximization in IoT Data Markets:An Information Design Perspective[C]//IEEE INFOCOM 2019-IEEE Conference on Computer Communications.IEEE,2019:1837-1845.
[12]TIAN X,ZHENG J,ZHANG Z.Jaccard Text Similarity Algorithm Based on Word Embedding[J].Computer Science,2018,45(7):186-189.
[13]WU W,LI B,CHEN L,et al.A Review for Weighted MinHash Algorithms(Extended abstract)[C]//2023 IEEE 39th International Conference on Data Engineering(ICDE).IEEE,2023:3785-3786.
[14]NAKAMOTO S.Bitcoin:A Peer-to-Peer Electronic Cash System[EB/OL].https://bitcoin.org/bitcoin.pdf.
[15]Peercoin-The Pioneer of Proof-of-Stake[EB/OL].https://www.peercoin.net/read/papers/peercoin-paper.pdf.
[16]Delegated Proof of Stake Consensus[EB/OL].https://bits-hares.org/delegated-proof-of-stake-consensus/.
[17]CASTRO M,LISKOV B.Practical Byzantine fault tolerance[C]//Proceedings of the Third Symposium on Operating Systems Design and Implementation.USENIX Association,1999:173-186.
[18]GENTRY C,BONEH D.A fully homomorphic encryptionscheme[EB/OL].https://crypto.stanford.edu/craig/craig-thesis.pdf.
[19]Intel Software Guard Extensions[EB/OL].Intel.https://www.intel.com/sgx.
[20]Building a Secure System using TrustZone Technology[EB/OL].https://documentation-service.arm.com/static/5f212796500e883ab8e74531.
[21]RIVEST R L,SHAMIR A,ADLEMAN L.A method for obtaining digital signatures and public-key cryptosystems[J].Communications of the ACM,1978,21(2):120-126.
[22]SU G,YANG W,LUO Z,et al.BDTF:A Blockchain-Based Data Trading Framework with Trusted Execution Environment[C]//2020 16th International Conference on Mobility,Sensing and Networking(MSN).IEEE,2020:92-97.
[23]CHEN F,WANG J,JIANG C,et al.Blockchain Based Non-repudiable IoT Data Trading:Simpler,Faster,and Cheaper[C]//IEEE INFOCOM 2022-IEEE Conference on Computer Communications.IEEE,2022:1958-1967.
[24]LIU Y,HAO X,REN W,et al.A Blockchain-Based Decentralized,Fair and Authenticated Information Sharing Scheme in Zero Trust Internet-of-Things[J].IEEE Transactions on Compu-ters,2023,72(2):501-512.
[25]WU Z,ZHENG H,ZHANG L,et al.Privacy-friendly Blockchain Based Data Trading and Tracking[C]//2019 5th International Conference on Big Data Computing and Communications(BIGCOM).IEEE,2019:240-244.
[26]JUNG T,LI X Y,HUANG W,et al.AccountTrade:Accountable protocols for big data trading against dishonest consumers[C]//IEEE INFOCOM 2017-IEEE Conference on Computer Communications.IEEE,2017:1-9.
[27]HE Y,ZHU H,WANG C,et al.An Accountable Data TradingPlatform Based on Blockchain[C]//IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops(INFOCOM WKSHPS).IEEE,2019:1-6.
[28]DAI W,DAI C,CHOO K K R,et al.SDTE:A Secure Blockchain-Based Data Trading Ecosystem[J].IEEE Transactions on Information Forensics and Security,2020,15:725-737.
[29]ZHENG Z,MAO W,XING Y,et al.On Designing Market Mo-del and Pricing Mechanisms for IoT Data Exchange[J].IEEE Transactions on Mobile Computing,2024,23(11):10202-10218.
[30]LI Q,LIU Z,LI Q,et al.martFL:Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture[C]//Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security.ACM,2023:1496-1510.
[31]CHEN L,KOUTRIS P,KUMAR A.Model-based Pricing forMachine Learning in a Data Marketplace[J].arXiv:1805.11450,2018.
[32]SHENG D,XIAO M,LIU A,et al.CPchain:A Copyright-Preserving Crowdsourcing Data Trading Framework Based on Blockchain[C]//2020 29th International Conference on Computer Communications and Networks(ICCCN).IEEE,2020:1-9.
[33]CAI C,ZHENG Y,ZHOU A,et al.Building a Secure Know-ledge Marketplace Over Crowdsensed Data Streams[J].IEEE Transactions on Dependable and Secure Computing,2021,18(6):2601-2616.
[34]AN B,XIAO M,LIU A,et al.Secure Crowdsensed Data Trading Based on Blockchain[J].IEEE Transactions on Mobile Computing,2023,22(3):1763-1778.
[35]DENG Q,ZUO Q,LI Z,et al.Privacy-Preserving Stable DataTrading for Unknown Market Based on Blockchain[J].IEEE Transactions on Mobile Computing,2025,24(7):5615-5631.
[36]WANG E,CAI J,YANG Y,et al.Trustworthy and Efficient Crowdsensed Data Trading on Sharding Blockchain[J].IEEE Journal on Selected Areas in Communications,2022,40(12):3547-3561.
[37]ZHANG L,LI Y,XIAO X,et al.CrowdBuy:Privacy-friendlyImage Dataset Purchasing via Crowdsourcing[C]//IEEE INFOCOM 2018-IEEE Conference on Computer Communications.IEEE,2018:2735-2743.
[38]ZHENG Z,PENG Y,WU F,et al.Trading Data in the Crowd:Profit-Driven Data Acquisition for Mobile Crowdsensing[J].IEEE Journal on Selected Areas in Communications,2017,35(2):486-501.
[39]CHENLI C,TANG W,GOMULKA F,et al.ProvNet:Net-worked bi-directional blockchain for data sharing with verifiable provenance[J].Journal of Parallel and Distributed Computing,2022,166:32-44.
[40]XIONG W,XIONG L.Smart Contract Based Data TradingMode Using Blockchain and Machine Learning[J].IEEE Access,2019,7:102331-102344.
[41]HUANG Y,ZENG Y,YE F,et al.Fair and Protected ProfitSharing for Data Trading in Pervasive Edge Computing Environments[C]//IEEE INFOCOM 2020-IEEE Conference on Computer Communications.IEEE,2020:1718-1727.
[42]ZHAO Y,GONG X,CHEN X.Privacy-Preserving IncentiveMechanisms for Truthful Data Quality in Data Crowdsourcing[J].IEEE Transactions on Mobile Computing,2022,21(7):2518-2532.
[43]ZHAO C,YANG S,MCCANN J A.On the Data Quality in Privacy-Preserving Mobile Crowdsensing Systems with Untruthful Reporting[J].IEEE Transactions on Mobile Computing,2021,20(2):647-661.
[44]ZHOU M,FANTI G,SHI E.Conan:Distributed Proofs of Compliance for Anonymous Data Collection[C]//Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security.New York:ACM,2024:914-928.
[45]NIU C,ZHENG Z,WU F,et al.Trading Data in Good Faith:Integrating Truthfulness and Privacy Preservation in Data Markets[C]//2017 IEEE 33rd International Conference on Data Engineering(ICDE).2017:223-226.
[46]ZHANG M,LI X,MIAO Y,et al.Privacy-Preserved Data Disturbance and Truthfulness Verification for Data Trading[J].IEEE Transactions on Information Forensics and Security,2024,19:5545-5560.
[47]ZHENG S,PAN L,HU D,et al.A Blockchain-Based TradingPlatform for Big Data[C]//IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops(INFOCOM WKSHPS).IEEE,2020:991-996.
[48]CHEN W,YANG W,XIAO M,et al.LBDT:A LightweightBlockchain-Based Data Trading Scheme in Internet of Vehicles Using Proof-of-Reputation[J].IEEE Transactions on Mobile Computing,2025,24(4):2800-2816.
[49]ZHENG Z,PENG Y,WU F,et al.ARETE:On Designing Joint Online Pricing and Reward Sharing Mechanisms for Mobile Data Markets[J].IEEE Transactions on Mobile Computing,2020,19(4):769-787.
[50]XUE S,DING H,ZHANG L,et al.Online Competitive Posted-Pricing Mechanism for Trading Time-Sensitive Valued Data[C]//2022 8th International Conference on Big Data Computing and Communications(BigCom).IEEE,2022:44-53.
[51]ZHANG M,ARAFA A,HUANG J,et al.Pricing Fresh Data[J].IEEE Journal on Selected Areas in Communications,2021,39(5):1211-1225.
[52]NIU C,ZHENG Z,TANG S,et al.Making Big Money fromSmall Sensors:Trading Time-Series Data under Pufferfish Privacy[C]//IEEE INFOCOM 2019-IEEE Conference on Computer Communications.IEEE,2019:568-576.
[53]NIU C,ZHENG Z,WU F,et al.Online Pricing with Reserve Price Constraint for Personal Data Markets[C]//2020 IEEE 36th International Conference on Data Engineering(ICDE).2020:1978-1981.
[54]LI C,LI D Y,MIKLAU G,et al.A Theory of Pricing Private Data[J].ACM Transactions on Database Systems,2014,39(4):1-28.
[55]NIU C,ZHENG Z,WU F,et al.ERATO:Trading Noisy Aggregate Statistics over Private Correlated Data[J].IEEE Transactions on Knowledge and Data Engineering,2019,33(3):975-990.
[56]XU A,ZHENG Z,LI Q,et al.VAP:Online Data Valuation and Pricing for Machine Learning Models in Mobile Health[J].IEEE Transactions on Mobile Computing,2024,23(5):5966-5983.
[57]MAO W,ZHENG Z,WU F,et al.Online Pricing for Revenue Maximization with Unknown Time Discounting Valuations[C]//Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence.Stockholm:International Joint Conferences on Artificial Intelligence Organization,2018:440-446.
[58]XIAO M,LI M,ZHANG J J.Locally Differentially Private Personal Data Markets Using Contextual Dynamic Pricing Mechanism[J].IEEE Transactions on Dependable and Secure Computing,2023,20(6):5043-5055.
[59]KOUTRIS P,UPADHYAYA P,BALAZINSKA M,et al.To-ward practical query pricing with QueryMarket[C]//Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data.New York:ACM,2013:613-624.
[60]LI Q,LI Z,ZHENG Z,et al.Capitalize Your Data:Optimal Selling Mechanisms for IoT Data Exchange[J].IEEE Transactions on Mobile Computing,2023,22(4):1988-2000.
[61]CHENLI C,TANG W,JUNG T.FairTrade:Efficient AtomicExchange-based Fair Exchange Protocol for Digital Data Trading[C]//2021 IEEE International Conference on Blockchain(Blockchain).IEEE,2021:38-46.
[62]TAS E N,SERES I A,ZHANG Y,et al.Atomic and Fair Data Exchange via Blockchain[C]//Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security.New York:ACM,2024:3227-3241.
[63]UROVI V,JAIMAN V,ANGERER A,et al.LUCE:A Blockchain-based data sharing platform for monitoring data license accountability and compliance[J].arXiv:2202.11646,2022.
[64]JU C,TANG W,CHENLI C,et al.Monitoring Provenance ofDelegated Personal Data with Blockchain[C]//2022 IEEE International Conference on Blockchain(Blockchain).2022:11-20.
[65]LOHMÖLLER J,VLAD E,DAHLMANNS M,et al.Poster:Bridging Trust Gaps:Data Usage Transparency in Federated Data Ecosystems[C]//Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security.New York:ACM,2023:3582-3584.
[66]DAIDONE F,CARMINATI B,FERRARI E.Blockchain-Based Privacy Enforcement in the IoT Domain[J].IEEE Transactions on Dependable and Secure Computing,2022,19(6):3887-3898.
[67]COHEN A,SMITH A,SWANBERG M,et al.Control,Confidentiality,and the Right to be Forgotten[C]//Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security.ACM,2023:3358-3372.
[68]MEI Q,YANG M,CHEN J,et al.Expressive Data Sharing and Self-Controlled Fine-Grained Data Deletion in Cloud-Assisted IoT[J].IEEE Transactions on Dependable and Secure Computing,2023,20(3):2625-2640.
[69]Gaia-X:A Federated Secure Data Infrastructure[EB/OL].https://gaia-x.eu/.
[70]Decentralized Identifiers v1.0[EB/OL].https://www.w3.org/TR/did-1.0/.
[71]Verifiable Credential 2.0[EB/OL].https://www.w3.org/TR/vc-data-model-2.0/.
[1] WANG Jie, YANG Xiancan, ZHAO Xingwang. Protein Complex Identification Algorithm Based on Hypergraph Network Embedding [J]. Computer Science, 2025, 52(12): 102-114.
[2] ZHENG Jingjing, CHEN Xing, ZHANG Jianshan. SCDDA:SCA and Dinkelbach-based Approach for UAV Trajectory and Computation Offloading in Space-Air-Ground Integrated Networks [J]. Computer Science, 2025, 52(11): 270-279.
[3] CHEN Junjie, ZHAO Hong, LUO Yong, DING Xiaoyun. Target Recognition Algorithm in Urban Traffic Field of View Based on Improved YOLOv8 [J]. Computer Science, 2025, 52(11A): 241200131-8.
[4] MENG Dongyue, HUANG Yuchuan, HAN Guoxiang, LI Hongchen, WANG Pengfei. Research on Emergency Rescue Quadcopter UAV Safety Control Based on Feedforward PID [J]. Computer Science, 2025, 52(11A): 241200203-9.
[5] LI Ruiyang, LI Shuyi, YANG Yuexi, PENG Chuhan, XING Jingyu, QIAO Gaoxiu. Research on Portfolio Construction Based on Topological Structure Features [J]. Computer Science, 2025, 52(10): 13-21.
[6] RAN Qin, RUAN Xiaoli, XU Jing, LI Shaobo, HU Bingqi. Function Prediction of Therapeutic Peptides with Multi-coded Neural Networks Based on Projected Gradient Descent [J]. Computer Science, 2025, 52(6A): 240800024-6.
[7] YANG Jixiang, JIANG Huiping, WANG Sen, MA Xuan. Research Progress and Challenges in Forest Fire Risk Prediction [J]. Computer Science, 2025, 52(6A): 240400177-8.
[8] PIAO Mingjie, ZHANG Dongdong, LU Hu, LI Rupeng, GE Xiaoli. Study on Multi-agent Supply Chain Inventory Management Method Based on Improved Transformer [J]. Computer Science, 2025, 52(6A): 240500054-10.
[9] CHEN Wangxu, WEN Hao, NI Yang. Application of Requirements Traceability in Code Static Analysis [J]. Computer Science, 2025, 52(6A): 241000024-5.
[10] CHEN Yanfeng, FENG Zhiwei, DENG Qingxu, WANG Yan. Survey of Sensor Attack Defense Strategies for Cyber Physical Systems [J]. Computer Science, 2025, 52(4): 4-13.
[11] ZHENG Xiubao, LI Jing, ZHU Ming, NING Yingying. Selection Method for Cloud Manufacturing Industrial Services Based on Generative AdversarialNetworks [J]. Computer Science, 2025, 52(4): 54-63.
[12] CHEN Zhangyuan, CHEN Ling, LIU Wei, LI Bin. Method for Selecting Observers Based on Doubly Resolving Set in Independent Cascade Model [J]. Computer Science, 2025, 52(4): 280-290.
[13] SHENG Sirou, OUYANG Xiao, TAO Hong, HOU Chenping. Multi-view Multi-label Learning with Label Correlation Priors [J]. Computer Science, 2025, 52(2): 58-66.
[14] DONG Hui, ZHANG Yuansong, LIN Wenjie, WU Xiang, GUO Fanghong, ZHANG Dan. Improved Mesh Optimization-based Image Stitching Algorithm of Large Field Binocular Vision [J]. Computer Science, 2025, 52(2): 212-221.
[15] YAN Yusong, ZHOU Yuan, WANG Cong, KONG Shengqi, WANG Quan, LI Minne, WANG Zhiyuan. COA Generation Based on Pre-trained Large Language Models [J]. Computer Science, 2025, 52(1): 80-86.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!