System For Privacy-Preserving Monetization Of Big Data And Method For Using The Same
First Claim
1. A computer-implemented method for privacy-preserving insight sharing, comprising:
- receiving, by a data owner, an identity of a primary object and an obfuscated list of secondary objects from a requesting party;
modifying, by the data owner, the obfuscated list of the secondary objects to create a modified obfuscated list of the secondary objects;
transmitting, from the data owner to the requesting party, the modified obfuscated list of the secondary objects;
computing at least one association relationship between the primary object and associated objects to obtain a list of insights;
selecting, by the data owner, the list of the insights, to obtain a selected list of the insights;
obfuscating, by the data owner, the selected list of the insights, to obtain an obfuscated selected list of the insights;
transmitting the obfuscated selected list of the insights to the requesting party;
providing an intersection between the modified obfuscated list of the secondary objects and the obfuscated selected list of the insights by enabling the requesting party to compare the modified obfuscated list of the secondary objects and the obfuscated selected list of the insights.
7 Assignments
0 Petitions
Accused Products
Abstract
The current invention provides a system and method for Data Owners to share with Data Seekers extracted insights from the Big Data, instead of raw data or anonymized raw data, thus reducing or eliminating privacy concerns on the data owned by the Data Owners. An Oblivious Pseudo Random Function (OPRF) is used, with operations using OPRFs occur over encrypted data, thus Data Owners learn only the primary object from Data Seeker and nothing else about the remainder of Data Owners'"'"' data. Similarly, Data Seeker learns a list of associated secondary objects and nothing else about Data Owners'"'"' data. The extent of sharing can be limited using a predefined threshold depending how much private information Data Owner is willing to share or Data Seeker is willing to pay.
-
Citations
20 Claims
-
1. A computer-implemented method for privacy-preserving insight sharing, comprising:
-
receiving, by a data owner, an identity of a primary object and an obfuscated list of secondary objects from a requesting party; modifying, by the data owner, the obfuscated list of the secondary objects to create a modified obfuscated list of the secondary objects; transmitting, from the data owner to the requesting party, the modified obfuscated list of the secondary objects; computing at least one association relationship between the primary object and associated objects to obtain a list of insights; selecting, by the data owner, the list of the insights, to obtain a selected list of the insights; obfuscating, by the data owner, the selected list of the insights, to obtain an obfuscated selected list of the insights; transmitting the obfuscated selected list of the insights to the requesting party; providing an intersection between the modified obfuscated list of the secondary objects and the obfuscated selected list of the insights by enabling the requesting party to compare the modified obfuscated list of the secondary objects and the obfuscated selected list of the insights. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-implemented system for privacy-preserving insight sharing, comprising:
-
a receiving module configured to receive an identity of a primary object and an obfuscated list of secondary objects from a requesting party; an encryption module configured to modify the obfuscated list of the secondary objects to create a modified obfuscated list of the secondary objects; a sharing module configured to transmit to the requesting party the modified obfuscated list of the secondary objects; an insight computing module configured to compute at least one association relationship between the primary object and associated objects to obtain a list of insights; a threshold module configured to select the list of the insights to obtain a selected list of the insights; the encryption module further configured to obfuscate the selected list of the insights to obtain an obfuscated selected list of the insights; the sharing module further configured to transmit the obfuscated selected list of the insights to the requesting party; a comparison module configured to provide an intersection between the modified obfuscated list of the secondary objects and the obfuscated selected list of the insights through comparing the modified obfuscated list of the secondary objects and the obfuscated selected list of the insights. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification