Privacy-Preserving Interest-Ability Based Task Allocation in Crowdsourcing

被引:0
作者
Hao, Jialu [1 ]
Huang, Cheng [2 ]
Chen, Guangyu [1 ]
Xian, Ming [1 ]
Shen, Xuemin [2 ]
机构
[1] Natl Univ Def Technol, Coll Elect Sci & Technol, Changsha, Hunan, Peoples R China
[2] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON, Canada
来源
ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) | 2019年
基金
中国国家自然科学基金;
关键词
Task allocation; attribute-based encryption; searchable encryption; privacy preservation; crowdsourcing; REPUTATION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Numerous crowdsourcing applications have emerged in our daily lives, which enable customers to outsource their complicated tasks to a crowd of workers. However, the information of task tags and worker profiles is explicitly obtained by the crowdsourcing server to recommend tasks effectively, which violates the privacy of both customers and workers. Moreover, the worker's ability to do the task should also be verified in a privacy-preserving way. To address these issues, we propose a privacy-preserving interest-ability based task allocation scheme in crowdsourcing, which protects both task and worker privacy and enables the crowdsourcing server to allocate tasks in a fine-grained way. Specifically, by utilizing attribute-based encryption (ABE) and proxy re-encryption based searchable encryption (PRE-SE) on the task content and task tags respectively, customers are able to enforce fine-grained ability requirements on their tasks, and workers can specify flexible interests to choose their desired tasks. Additionally, EIGamal signature enables workers to prove their abilities to the crowdsourcing server without revealing the task content. Numerical analysis and experiment results demonstrate that our proposed scheme is efficient in terms of computation and storage overhead and is practical to be implemented in crowdsourcing.
引用
收藏
页数:6
相关论文
共 15 条
[1]   FAME: Fast Attribute-based Message Encryption [J].
Agrawal, Shashank ;
Chase, Melissa .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :665-682
[2]  
Ambati V., 2011, HUMAN COMPUTATION, P1
[3]  
[Anonymous], 2016, 2016 IEEE GLOBAL COM
[4]  
Difallah D.E., 2013, P 22 INT C WORLD WID, P367
[5]  
Dong CY, 2008, LECT NOTES COMPUT SC, V5094, P127
[6]  
Hao J., 2019, COMPUT NETW
[7]  
Howe J., 2006, Wired Mag, V14, P1
[8]  
Huang KL, 2012, C LOCAL COMPUT NETW, P10, DOI 10.1109/LCN.2012.6423585
[9]  
Li J., 2010, P 5 ACM S INF COMP C, P60, DOI DOI 10.1145/1755688.1755697
[10]  
Ni J., 2017, Communications (ICC), 2017 IEEE International Conference on, P1, DOI DOI 10.1109/ICC.2017.7996808