Computer Science ›› 2026, Vol. 53 ›› Issue (4): 121-133.doi: 10.11896/jsjkx.250900002
• Database & Big Data & Data Science • Previous Articles Next Articles
CUI Jinjia1, ZENG Chen1, WANG Lu2, PENG Xiaohui1
CLC Number:
| [1]National Data Administration[EB/OL].https://www.nda.gov.cn. [2]Data Governance Act[EB/OL].https://eur-lex.europa.eu/eli/reg/2022/868/oj. [3]Opinions of the Communist Party of China Central Committee and the State Council on Establishing a Basic Data System to Better Give Play to the Role of Data Elements[EB/OL].https://www.gov.cn/zhengce/2022-12/19/content_5732695.htm. [4]General Data Protection Regulation[EB/OL].https://gdpr-info.eu/. [5]National Development and Reform Commission[EB/OL].ht-tps://www.ndrc.gov.cn/wsdwhfz/202209/t20220913_1335479_ext.html. [6]Shanghai Data Exchange[EB/OL].https://www.chinadep.com/. [7]Guiyang Big Data Exchange[EB/OL].https://www.gzdex.com.cn/. [8]Research Report on Consumer Data Circulation Model Based on the Right to Data Portability[EB/OL].http://www.sic.gov.cn/sic/93/552/622/0529/202405290808571136847956_pc.html. [9]XIONG Q,TANG K.Research Progress on the Right Delimitation,Exchange and Pricing of Data[J].Economic Perspectives,2021(2):143-158. [10]JIANG D,YUAN Y,ZHANG X,et al.Survey on Data Pricing and Trading Research[J].Journal of Software,2022,34(3):1396-1424. [11]MAO W,ZHENG Z,WU F.Pricing for Revenue Maximization in IoT Data Markets:An Information Design Perspective[C]//IEEE INFOCOM 2019-IEEE Conference on Computer Communications.IEEE,2019:1837-1845. [12]TIAN X,ZHENG J,ZHANG Z.Jaccard Text Similarity Algorithm Based on Word Embedding[J].Computer Science,2018,45(7):186-189. [13]WU W,LI B,CHEN L,et al.A Review for Weighted MinHash Algorithms(Extended abstract)[C]//2023 IEEE 39th International Conference on Data Engineering(ICDE).IEEE,2023:3785-3786. [14]NAKAMOTO S.Bitcoin:A Peer-to-Peer Electronic Cash System[EB/OL].https://bitcoin.org/bitcoin.pdf. [15]Peercoin-The Pioneer of Proof-of-Stake[EB/OL].https://www.peercoin.net/read/papers/peercoin-paper.pdf. [16]Delegated Proof of Stake Consensus[EB/OL].https://bits-hares.org/delegated-proof-of-stake-consensus/. [17]CASTRO M,LISKOV B.Practical Byzantine fault tolerance[C]//Proceedings of the Third Symposium on Operating Systems Design and Implementation.USENIX Association,1999:173-186. [18]GENTRY C,BONEH D.A fully homomorphic encryptionscheme[EB/OL].https://crypto.stanford.edu/craig/craig-thesis.pdf. [19]Intel Software Guard Extensions[EB/OL].Intel.https://www.intel.com/sgx. [20]Building a Secure System using TrustZone Technology[EB/OL].https://documentation-service.arm.com/static/5f212796500e883ab8e74531. [21]RIVEST R L,SHAMIR A,ADLEMAN L.A method for obtaining digital signatures and public-key cryptosystems[J].Communications of the ACM,1978,21(2):120-126. [22]SU G,YANG W,LUO Z,et al.BDTF:A Blockchain-Based Data Trading Framework with Trusted Execution Environment[C]//2020 16th International Conference on Mobility,Sensing and Networking(MSN).IEEE,2020:92-97. [23]CHEN F,WANG J,JIANG C,et al.Blockchain Based Non-repudiable IoT Data Trading:Simpler,Faster,and Cheaper[C]//IEEE INFOCOM 2022-IEEE Conference on Computer Communications.IEEE,2022:1958-1967. [24]LIU Y,HAO X,REN W,et al.A Blockchain-Based Decentralized,Fair and Authenticated Information Sharing Scheme in Zero Trust Internet-of-Things[J].IEEE Transactions on Compu-ters,2023,72(2):501-512. [25]WU Z,ZHENG H,ZHANG L,et al.Privacy-friendly Blockchain Based Data Trading and Tracking[C]//2019 5th International Conference on Big Data Computing and Communications(BIGCOM).IEEE,2019:240-244. [26]JUNG T,LI X Y,HUANG W,et al.AccountTrade:Accountable protocols for big data trading against dishonest consumers[C]//IEEE INFOCOM 2017-IEEE Conference on Computer Communications.IEEE,2017:1-9. [27]HE Y,ZHU H,WANG C,et al.An Accountable Data TradingPlatform Based on Blockchain[C]//IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops(INFOCOM WKSHPS).IEEE,2019:1-6. [28]DAI W,DAI C,CHOO K K R,et al.SDTE:A Secure Blockchain-Based Data Trading Ecosystem[J].IEEE Transactions on Information Forensics and Security,2020,15:725-737. [29]ZHENG Z,MAO W,XING Y,et al.On Designing Market Mo-del and Pricing Mechanisms for IoT Data Exchange[J].IEEE Transactions on Mobile Computing,2024,23(11):10202-10218. [30]LI Q,LIU Z,LI Q,et al.martFL:Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture[C]//Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security.ACM,2023:1496-1510. [31]CHEN L,KOUTRIS P,KUMAR A.Model-based Pricing forMachine Learning in a Data Marketplace[J].arXiv:1805.11450,2018. [32]SHENG D,XIAO M,LIU A,et al.CPchain:A Copyright-Preserving Crowdsourcing Data Trading Framework Based on Blockchain[C]//2020 29th International Conference on Computer Communications and Networks(ICCCN).IEEE,2020:1-9. [33]CAI C,ZHENG Y,ZHOU A,et al.Building a Secure Know-ledge Marketplace Over Crowdsensed Data Streams[J].IEEE Transactions on Dependable and Secure Computing,2021,18(6):2601-2616. [34]AN B,XIAO M,LIU A,et al.Secure Crowdsensed Data Trading Based on Blockchain[J].IEEE Transactions on Mobile Computing,2023,22(3):1763-1778. [35]DENG Q,ZUO Q,LI Z,et al.Privacy-Preserving Stable DataTrading for Unknown Market Based on Blockchain[J].IEEE Transactions on Mobile Computing,2025,24(7):5615-5631. [36]WANG E,CAI J,YANG Y,et al.Trustworthy and Efficient Crowdsensed Data Trading on Sharding Blockchain[J].IEEE Journal on Selected Areas in Communications,2022,40(12):3547-3561. [37]ZHANG L,LI Y,XIAO X,et al.CrowdBuy:Privacy-friendlyImage Dataset Purchasing via Crowdsourcing[C]//IEEE INFOCOM 2018-IEEE Conference on Computer Communications.IEEE,2018:2735-2743. [38]ZHENG Z,PENG Y,WU F,et al.Trading Data in the Crowd:Profit-Driven Data Acquisition for Mobile Crowdsensing[J].IEEE Journal on Selected Areas in Communications,2017,35(2):486-501. [39]CHENLI C,TANG W,GOMULKA F,et al.ProvNet:Net-worked bi-directional blockchain for data sharing with verifiable provenance[J].Journal of Parallel and Distributed Computing,2022,166:32-44. [40]XIONG W,XIONG L.Smart Contract Based Data TradingMode Using Blockchain and Machine Learning[J].IEEE Access,2019,7:102331-102344. [41]HUANG Y,ZENG Y,YE F,et al.Fair and Protected ProfitSharing for Data Trading in Pervasive Edge Computing Environments[C]//IEEE INFOCOM 2020-IEEE Conference on Computer Communications.IEEE,2020:1718-1727. [42]ZHAO Y,GONG X,CHEN X.Privacy-Preserving IncentiveMechanisms for Truthful Data Quality in Data Crowdsourcing[J].IEEE Transactions on Mobile Computing,2022,21(7):2518-2532. [43]ZHAO C,YANG S,MCCANN J A.On the Data Quality in Privacy-Preserving Mobile Crowdsensing Systems with Untruthful Reporting[J].IEEE Transactions on Mobile Computing,2021,20(2):647-661. [44]ZHOU M,FANTI G,SHI E.Conan:Distributed Proofs of Compliance for Anonymous Data Collection[C]//Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security.New York:ACM,2024:914-928. [45]NIU C,ZHENG Z,WU F,et al.Trading Data in Good Faith:Integrating Truthfulness and Privacy Preservation in Data Markets[C]//2017 IEEE 33rd International Conference on Data Engineering(ICDE).2017:223-226. [46]ZHANG M,LI X,MIAO Y,et al.Privacy-Preserved Data Disturbance and Truthfulness Verification for Data Trading[J].IEEE Transactions on Information Forensics and Security,2024,19:5545-5560. [47]ZHENG S,PAN L,HU D,et al.A Blockchain-Based TradingPlatform for Big Data[C]//IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops(INFOCOM WKSHPS).IEEE,2020:991-996. [48]CHEN W,YANG W,XIAO M,et al.LBDT:A LightweightBlockchain-Based Data Trading Scheme in Internet of Vehicles Using Proof-of-Reputation[J].IEEE Transactions on Mobile Computing,2025,24(4):2800-2816. [49]ZHENG Z,PENG Y,WU F,et al.ARETE:On Designing Joint Online Pricing and Reward Sharing Mechanisms for Mobile Data Markets[J].IEEE Transactions on Mobile Computing,2020,19(4):769-787. [50]XUE S,DING H,ZHANG L,et al.Online Competitive Posted-Pricing Mechanism for Trading Time-Sensitive Valued Data[C]//2022 8th International Conference on Big Data Computing and Communications(BigCom).IEEE,2022:44-53. [51]ZHANG M,ARAFA A,HUANG J,et al.Pricing Fresh Data[J].IEEE Journal on Selected Areas in Communications,2021,39(5):1211-1225. [52]NIU C,ZHENG Z,TANG S,et al.Making Big Money fromSmall Sensors:Trading Time-Series Data under Pufferfish Privacy[C]//IEEE INFOCOM 2019-IEEE Conference on Computer Communications.IEEE,2019:568-576. [53]NIU C,ZHENG Z,WU F,et al.Online Pricing with Reserve Price Constraint for Personal Data Markets[C]//2020 IEEE 36th International Conference on Data Engineering(ICDE).2020:1978-1981. [54]LI C,LI D Y,MIKLAU G,et al.A Theory of Pricing Private Data[J].ACM Transactions on Database Systems,2014,39(4):1-28. [55]NIU C,ZHENG Z,WU F,et al.ERATO:Trading Noisy Aggregate Statistics over Private Correlated Data[J].IEEE Transactions on Knowledge and Data Engineering,2019,33(3):975-990. [56]XU A,ZHENG Z,LI Q,et al.VAP:Online Data Valuation and Pricing for Machine Learning Models in Mobile Health[J].IEEE Transactions on Mobile Computing,2024,23(5):5966-5983. [57]MAO W,ZHENG Z,WU F,et al.Online Pricing for Revenue Maximization with Unknown Time Discounting Valuations[C]//Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence.Stockholm:International Joint Conferences on Artificial Intelligence Organization,2018:440-446. [58]XIAO M,LI M,ZHANG J J.Locally Differentially Private Personal Data Markets Using Contextual Dynamic Pricing Mechanism[J].IEEE Transactions on Dependable and Secure Computing,2023,20(6):5043-5055. [59]KOUTRIS P,UPADHYAYA P,BALAZINSKA M,et al.To-ward practical query pricing with QueryMarket[C]//Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data.New York:ACM,2013:613-624. [60]LI Q,LI Z,ZHENG Z,et al.Capitalize Your Data:Optimal Selling Mechanisms for IoT Data Exchange[J].IEEE Transactions on Mobile Computing,2023,22(4):1988-2000. [61]CHENLI C,TANG W,JUNG T.FairTrade:Efficient AtomicExchange-based Fair Exchange Protocol for Digital Data Trading[C]//2021 IEEE International Conference on Blockchain(Blockchain).IEEE,2021:38-46. [62]TAS E N,SERES I A,ZHANG Y,et al.Atomic and Fair Data Exchange via Blockchain[C]//Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security.New York:ACM,2024:3227-3241. [63]UROVI V,JAIMAN V,ANGERER A,et al.LUCE:A Blockchain-based data sharing platform for monitoring data license accountability and compliance[J].arXiv:2202.11646,2022. [64]JU C,TANG W,CHENLI C,et al.Monitoring Provenance ofDelegated Personal Data with Blockchain[C]//2022 IEEE International Conference on Blockchain(Blockchain).2022:11-20. [65]LOHMÖLLER J,VLAD E,DAHLMANNS M,et al.Poster:Bridging Trust Gaps:Data Usage Transparency in Federated Data Ecosystems[C]//Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security.New York:ACM,2023:3582-3584. [66]DAIDONE F,CARMINATI B,FERRARI E.Blockchain-Based Privacy Enforcement in the IoT Domain[J].IEEE Transactions on Dependable and Secure Computing,2022,19(6):3887-3898. [67]COHEN A,SMITH A,SWANBERG M,et al.Control,Confidentiality,and the Right to be Forgotten[C]//Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security.ACM,2023:3358-3372. [68]MEI Q,YANG M,CHEN J,et al.Expressive Data Sharing and Self-Controlled Fine-Grained Data Deletion in Cloud-Assisted IoT[J].IEEE Transactions on Dependable and Secure Computing,2023,20(3):2625-2640. [69]Gaia-X:A Federated Secure Data Infrastructure[EB/OL].https://gaia-x.eu/. [70]Decentralized Identifiers v1.0[EB/OL].https://www.w3.org/TR/did-1.0/. [71]Verifiable Credential 2.0[EB/OL].https://www.w3.org/TR/vc-data-model-2.0/. |
| [1] | WANG Jie, YANG Xiancan, ZHAO Xingwang. Protein Complex Identification Algorithm Based on Hypergraph Network Embedding [J]. Computer Science, 2025, 52(12): 102-114. |
| [2] | ZHENG Jingjing, CHEN Xing, ZHANG Jianshan. SCDDA:SCA and Dinkelbach-based Approach for UAV Trajectory and Computation Offloading in Space-Air-Ground Integrated Networks [J]. Computer Science, 2025, 52(11): 270-279. |
| [3] | CHEN Junjie, ZHAO Hong, LUO Yong, DING Xiaoyun. Target Recognition Algorithm in Urban Traffic Field of View Based on Improved YOLOv8 [J]. Computer Science, 2025, 52(11A): 241200131-8. |
| [4] | MENG Dongyue, HUANG Yuchuan, HAN Guoxiang, LI Hongchen, WANG Pengfei. Research on Emergency Rescue Quadcopter UAV Safety Control Based on Feedforward PID [J]. Computer Science, 2025, 52(11A): 241200203-9. |
| [5] | LI Ruiyang, LI Shuyi, YANG Yuexi, PENG Chuhan, XING Jingyu, QIAO Gaoxiu. Research on Portfolio Construction Based on Topological Structure Features [J]. Computer Science, 2025, 52(10): 13-21. |
| [6] | RAN Qin, RUAN Xiaoli, XU Jing, LI Shaobo, HU Bingqi. Function Prediction of Therapeutic Peptides with Multi-coded Neural Networks Based on Projected Gradient Descent [J]. Computer Science, 2025, 52(6A): 240800024-6. |
| [7] | YANG Jixiang, JIANG Huiping, WANG Sen, MA Xuan. Research Progress and Challenges in Forest Fire Risk Prediction [J]. Computer Science, 2025, 52(6A): 240400177-8. |
| [8] | PIAO Mingjie, ZHANG Dongdong, LU Hu, LI Rupeng, GE Xiaoli. Study on Multi-agent Supply Chain Inventory Management Method Based on Improved Transformer [J]. Computer Science, 2025, 52(6A): 240500054-10. |
| [9] | CHEN Wangxu, WEN Hao, NI Yang. Application of Requirements Traceability in Code Static Analysis [J]. Computer Science, 2025, 52(6A): 241000024-5. |
| [10] | CHEN Yanfeng, FENG Zhiwei, DENG Qingxu, WANG Yan. Survey of Sensor Attack Defense Strategies for Cyber Physical Systems [J]. Computer Science, 2025, 52(4): 4-13. |
| [11] | ZHENG Xiubao, LI Jing, ZHU Ming, NING Yingying. Selection Method for Cloud Manufacturing Industrial Services Based on Generative AdversarialNetworks [J]. Computer Science, 2025, 52(4): 54-63. |
| [12] | CHEN Zhangyuan, CHEN Ling, LIU Wei, LI Bin. Method for Selecting Observers Based on Doubly Resolving Set in Independent Cascade Model [J]. Computer Science, 2025, 52(4): 280-290. |
| [13] | SHENG Sirou, OUYANG Xiao, TAO Hong, HOU Chenping. Multi-view Multi-label Learning with Label Correlation Priors [J]. Computer Science, 2025, 52(2): 58-66. |
| [14] | DONG Hui, ZHANG Yuansong, LIN Wenjie, WU Xiang, GUO Fanghong, ZHANG Dan. Improved Mesh Optimization-based Image Stitching Algorithm of Large Field Binocular Vision [J]. Computer Science, 2025, 52(2): 212-221. |
| [15] | YAN Yusong, ZHOU Yuan, WANG Cong, KONG Shengqi, WANG Quan, LI Minne, WANG Zhiyuan. COA Generation Based on Pre-trained Large Language Models [J]. Computer Science, 2025, 52(1): 80-86. |
|
||