Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery

被引:83
作者
Zheng, Yifeng [1 ,2 ]
Duan, Huayi [1 ]
Yuan, Xingliang [3 ]
Wang, Cong [1 ,2 ]
机构
[1] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Peoples R China
[2] City Univ Hong Kong, Shenzhen Res Inst, Shenzhen 518057, Peoples R China
[3] Monash Univ, Fac Informat Technol, Clayton, Vic 3800, Australia
基金
中国国家自然科学基金;
关键词
Mobile crowdsensing; truth discovery; privacy; cloud computing; DATA AGGREGATION; CLOUD;
D O I
10.1109/TDSC.2017.2753245
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Truth discovery in mobile crowdsensing has recently received wide attention. It refers to the procedure for estimating the unknown user reliability from collected sensory data and inferring truthful information via reliability-aware data aggregation. Though widely studied in the plaintext domain, truth discovery remains largely under-explored in privacy-aware mobile crowdsensing. Existing works either do not consider user reliability issue or fall short of achieving practical cost efficiency, due to iterative transmission and computation over large ciphertexts from homomorphic cryptosystem. In this paper, we propose two new privacy-aware crowdsensing designs with truth discovery that significantly improve the bandwidth and computation performance on individual users. Our insight is to identify the core atomic operation in the iterative truth discovery procedure, and carefully craft security designs accordingly to enable efficient truth discovery in the ciphertext domain. Our first design is highly customized for the single-server setting, while our second design under the two-server model further shifts most of user workloads to the cloud server side. Both our designs protect individual sensory data and reliability degrees throughout the truth discovery procedure. Experiments show that compared with the prior result, our designs gain at least 30x and 10x savings on user communication and computation, respectively.
引用
收藏
页码:121 / 133
页数:13
相关论文
共 39 条
[1]   Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice [J].
Adrian, David ;
Bhargavan, Karthikeyan ;
Durumeric, Zakir ;
Gaudry, Pierrick ;
Green, Matthew ;
Halderman, J. Alex ;
Heninger, Nadia ;
Springall, Drew ;
Thome, Emmanuel ;
Valenta, Luke ;
VanderSloot, Benjamin ;
Wustrow, Eric ;
Zanella-Beguelin, Santiago ;
Zimmermann, Paul .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :5-17
[2]  
[Anonymous], APPL US DIFF PRIV IS
[3]  
[Anonymous], CAN IPHONE TRANSF WA
[4]  
[Anonymous], 2016, PETROCHEMICAL APPL, DOI DOI 10.1109/INFOCOM.2016.7524346
[5]  
[Anonymous], HIPAA BREACH CLOUD
[6]  
Bilogrevic I, 2014, LECT NOTES COMPUT SC, V8713, P128, DOI 10.1007/978-3-319-11212-1_8
[7]   Machine Learning Classification over Encrypted Data [J].
Bost, Raphael ;
Popa, Raluca Ada ;
Tu, Stephen ;
Goldwasser, Shafi .
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
[8]   SplitX: High-Performance Private Analytics [J].
Chen, Ruichuan ;
Akkus, Istemi Ekin ;
Francis, Paul .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2013, 43 (04) :315-326
[9]  
Corrigan-Gibbs H, 2017, PROCEEDINGS OF NSDI '17: 14TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION, P259
[10]  
Dutta MK, 2013, INT CONF CONTEMP, P108, DOI 10.1109/IC3.2013.6612172