Privacy-preserving and verifiable online crowdsourcing with worker updates

被引:24
作者
Zhang, Xiaoyu [1 ]
Chen, Xiaofeng [1 ]
Yan, Hongyang [2 ]
Xiang, Yang [3 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian, Peoples R China
[2] Guangzhou Univ, Sch Comp Sci & Cyber Engn, Guangzhou, Peoples R China
[3] Swinburne Univ Technol, Sch Software & Elect Engn, Hawthorn, Vic, Australia
基金
中国国家自然科学基金;
关键词
Privacy preservation; Crowdsourcing; Dynamic adding and revocation; Verification mechanism; SECURE; EFFICIENT; CLASSIFICATION;
D O I
10.1016/j.ins.2020.10.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As a novel problem-solving paradigm, crowdsourcing has been emerged aiming at performing truthful data aggregation and addressing problems that are hard for one organization. However, in reality, these answers submitted by distributed workers can be regarded as their intellectual properties because of professional skills and intensive computation overhead. Besides, it may contain highly sensitive information and should not be directly released without protection. Besides, the worker skill estimation is only considered into plaintext scenario but no longer suitable to ciphertext setting. To address these challenges, we propose a novel privacy-preserving and verifiable online crowdsourcing protocol (PVOC) for workers in the same group while preserving their answers privacy. Besides, PVOC also supports worker dynamic adding and revocation for different classification tasks with a minimum computation overhead. Finally, we introduce a verification mechanism to identify and update the worker skills of participants. Thus, since no decryption operations are involved in PVOC, our design is efficient and lightweight. Security analysis demonstrates that PVOC can guarantee the workers' privacy without accuracy loss. Furthermore, we evaluate and show its effectiveness and practicability on three real data sets MNIST, CIFAR-10 and CIFAR-100. (c) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页码:212 / 232
页数:21
相关论文
共 37 条
[1]   Practical Secure Aggregation for Privacy-Preserving Machine Learning [J].
Bonawitz, Keith ;
Ivanov, Vladimir ;
Kreuter, Ben ;
Marcedone, Antonio ;
McMahan, H. Brendan ;
Patel, Sarvar ;
Ramage, Daniel ;
Segal, Aaron ;
Seth, Karn .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1175-1191
[2]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
[3]   Lean Crowdsourcing: Combining Humans and Machines in an Online System [J].
Branson, Steve ;
Van Horn, Grant ;
Perona, Pietro .
30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017), 2017, :6109-6118
[4]   Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks [J].
Castelluccia, Claude ;
Chan, Aldar C-F ;
Mykletun, Einar ;
Tsudik, Gene .
ACM TRANSACTIONS ON SENSOR NETWORKS, 2009, 5 (03) :1-36
[5]  
Chen X., 2020, P 11 ACM INT C BIOIN, P1, DOI DOI 10.1145/3388440.3412469
[6]   New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations [J].
Chen, Xiaofeng ;
Huang, Xinyi ;
Li, Jin ;
Ma, Jianfeng ;
Lou, Wenjing ;
Wong, Duncan S. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (01) :69-78
[7]   Secure Outsourced Attribute-Based Signatures [J].
Chen, Xiaofeng ;
Li, Jin ;
Huang, Xinyi ;
Li, Jingwei ;
Xiang, Yang ;
Wong, Duncan S. .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (12) :3285-3294
[8]  
Dawid AP, 1979, APPL STAT, V28, P20, DOI [DOI 10.2307/2346806, 10.2307/2346806]
[9]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[10]   Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack [J].
Gao, Chong-zhi ;
Cheng, Qiong ;
He, Pei ;
Susilo, Willy ;
Li, Jin .
INFORMATION SCIENCES, 2018, 444 :72-88