Proxy-Free Privacy-Preserving Task Matching with Efficient Revocation in Crowdsourcing

被引:49
作者
Shu, Jiangang [1 ]
Yang, Kan [2 ]
Jia, Xiaohua [1 ]
Liu, Ximeng [3 ,4 ]
Wang, Cong [1 ]
Deng, Robert H. [3 ]
机构
[1] City Univ Hong Kong, Dept Comp Sci, Kowloon Tong, Hong Kong, Peoples R China
[2] Univ Memphis, Dept Comp Sci, Memphis, TN 38152 USA
[3] Singapore Management Univ, Sch Informat Syst, Singapore 188065, Singapore
[4] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou 350108, Fujian, Peoples R China
关键词
Crowdsourcing; multi-requester; multi-worker; task matching; privacy; proxy-free; revocation; CHALLENGES; ENCRYPTION; FRAMEWORK;
D O I
10.1109/TDSC.2018.2875682
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Task matching in crowdsourcing has been extensively explored with the increasing popularity of crowdsourcing. However, privacy of tasks and workers is usually ignored in most of exiting solutions. In this paper, we study the problem of privacy-preserving task matching for crowdsourcing with multiple requesters and multiple workers. Instead of utilizing proxy re-encryption, we propose a proxy-free task matching scheme for multi-requester/multi-worker crowdsourcing, which achieves task-worker matching over encrypted data with scalability and non-interaction. We further design two different mechanisms for worker revocation including ServerLocal Revocation (SLR) and Global Revocation (GR), which realize efficient worker revocation with minimal overhead on the whole system. The proposed scheme is provably secure in the random oracle model under the Decisional q-Combined Bilinear Diffie-Hellman (q-DCDBH) assumption. Comprehensive theoretical analysis and detailed simulation results show that the proposed scheme outperforms the state-of-the-art work.
引用
收藏
页码:117 / 130
页数:14
相关论文
共 46 条
[1]   Charm: a framework for rapidly prototyping cryptosystems [J].
Akinyele, Joseph A. ;
Garman, Christina ;
Miers, Ian ;
Pagano, Matthew W. ;
Rushanan, Michael ;
Green, Matthew ;
Rubin, Aviel D. .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (02) :111-128
[2]  
Ambati V., 2011, HUMAN COMPUTATION, P1
[3]  
[Anonymous], 2013, LNCS, DOI [DOI 10.1007/978-3-642-38631-2_34, 10.1007/978-3-642-38631-2_34]
[4]  
[Anonymous], 2006, Wired magazine, DOI DOI 10.1086/599595
[5]  
[Anonymous], 2013, P ACM SIGSAC C COMP, DOI 10.1145/2508859.2516730
[6]  
Bao F, 2008, LECT NOTES COMPUT SC, V4991, P71
[7]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[8]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[9]   Leakage-Abuse Attacks Against Searchable Encryption [J].
Cash, David ;
Grubbs, Paul ;
Perry, Jason ;
Ristenpart, Thomas .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :668-679
[10]   Searchable symmetric encryption: Improved definitions and efficient constructions [J].
Curtmola, Reza ;
Garay, Juan ;
Kamara, Seny ;
Ostrovsky, Rafail .
JOURNAL OF COMPUTER SECURITY, 2011, 19 (05) :895-934