Privacy-Preserving Reputation Management for Edge Computing Enhanced Mobile Crowdsensing

被引:118
作者
Ma, Lichuan [1 ]
Liu, Xuefeng [1 ]
Pei, Qingqi [1 ]
Xiang, Yong [2 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Network, Xian 710071, Shaanxi, Peoples R China
[2] Deakin Univ, Sch Informat Technol, Geelong, Vic 3125, Australia
关键词
Sensors; Privacy; Cryptography; Edge computing; Task analysis; Servers; Reliability; reputation management; edge computing; mobile crowdsensing; EFFICIENT; SYSTEM;
D O I
10.1109/TSC.2018.2825986
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile crowdsensing (MCS) has gained popularity for its potential to leverage individual mobile devices to sense, collect, and analyze data instead of deploying sensors. As the sensing data become increasingly fine-grained and complicated, there is a tendency to enhance MCS with the edge computing paradigm to reduce time delays and high bandwidth costs. The sensing data may reveal personal information, and thus it is of great significance to preserve the privacy of the participants. However, preserving privacy may hinder the process of handling malicious participants. In this paper, we propose two privacy preserving reputation management schemes for edge computing enhanced MCS to simultaneously preserve privacy and deal with malicious participants. In the basic scheme, a novel reputation value updating method is designed based on the deviations of the encrypted sensing data from the final aggregating result. The basic scheme is efficient at the expense of revealing the deviation value of each participant to the reputation manager. To conquer this drawback, we propose an advanced scheme by updating the reputation values utilizing the rank of deviations. Extensive experiments demonstrate that both these two schemes have high cost efficiency and are effective to deal with malicious participants.
引用
收藏
页码:786 / 799
页数:14
相关论文
共 27 条
[1]   A Privacy-Preserving Vehicular Crowdsensing-Based Road Surface Condition Monitoring System Using Fog Computing [J].
Basudan, Sultan ;
Lin, Xiaodong ;
Sankaranarayanan, Karthik .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (03) :772-782
[2]   Trust Management for Defending On-Off Attacks [J].
Chae, Younghun ;
DiPippo, Lisa Cingiser ;
Sun, Yan Lindsay .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (04) :1178-1191
[3]  
Damgård I, 2007, LECT NOTES COMPUT SC, V4586, P416
[4]   On field calibration of an electronic nose for benzene estimation in an urban pollution monitoring scenario [J].
De Vito, S. ;
Massera, E. ;
Piga, A. ;
Martinotto, L. ;
Di Francia, G. .
SENSORS AND ACTUATORS B-CHEMICAL, 2008, 129 (02) :750-757
[5]  
Erkin Z, 2009, LECT NOTES COMPUT SC, V5672, P235, DOI 10.1007/978-3-642-03168-7_14
[6]  
Fan J., 2012, SOMEWHAT PRACTICAL F
[7]  
Fan JY, 2015, IEEE CONF COMM NETW, P31, DOI 10.1109/CNS.2015.7346807
[8]   USER PRIVACY AND DATA TRUSTWORTHINESS IN MOBILE CROWD SENSING [J].
He, Daojing ;
Chan, Sammy ;
Guizani, Mohsen .
IEEE WIRELESS COMMUNICATIONS, 2015, 22 (01) :28-34
[9]  
Hicks J., 2010, WIRELESS HLTH, P1
[10]  
Huang KL, 2010, ACM S MODEL ANAL SIM, P14