Providing Efficient Privacy-Aware Incentives for Mobile Sensing

被引:51
作者
Li, Qinghua [1 ]
Cao, Guohong [2 ]
机构
[1] Univ Arkansas, Dept Comp Sci & Comp Engn, Fayetteville, AR 72701 USA
[2] Penn State Univ, Dept Comp Sci & Engn, State Coll, PA 16801 USA
来源
2014 IEEE 34TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2014) | 2014年
关键词
D O I
10.1109/ICDCS.2014.29
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile sensing relies on data contributed by users through their mobile device (e.g., smart phone) to obtain useful information about people and their surroundings. However, users may not want to contribute due to lack of incentives and concerns on possible privacy leakage. To effectively promote user participation, both incentive and privacy issues should be addressed. Existing work on privacy-aware incentive is limited to special scenario of mobile sensing where each sensing task needs only one data report from each user, and thus not appropriate for generic scenarios in which sensing tasks may require multiple reports from each user (e.g., in environmental monitoring applications). In this paper, we propose a privacy-aware incentive scheme for general mobile sensing, which allows each sensing task to collect one or multiple reports from each user as needed. Besides being more flexible in task management, our scheme has much lower computation and communication cost compared to the existing solution. Evaluations show that, when each node only contributes data for a small fraction of sensing tasks (e.g, due to the incapability or disqualification to generate sensing data for other tasks), our scheme runs at least one order of magnitude faster.
引用
收藏
页码:208 / 217
页数:10
相关论文
共 32 条
[1]  
Abe M., 1996, Advances in Cryptology - ASIACRYPT'96 International Conference on the Theory and Applications of Cryptology and Information Security. Proceedings, P244, DOI 10.1007/BFb0034851
[2]  
Abe M, 2000, LECT NOTES COMPUT SC, V1880, P271
[3]  
[Anonymous], 2010, P IEEE INFOCOM
[4]  
[Anonymous], 2011, P 5 INT ICST C PERV
[5]  
[Anonymous], ACM SENSYS
[6]  
Chaum D., 1983, Advances in Cryptology, Proceedings of Crypto 82, P199
[7]  
Chaum David., 1982, ADV CRYPTOLOGY
[8]  
Christin D, 2012, INT CONF PERVAS COMP, P135, DOI 10.1109/PerCom.2012.6199860
[9]  
Cornelius C, 2008, MOBISYS'08: PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, P211
[10]  
Cristofaro E. D., 2011, P ACM WISEC