Computer Science ›› 2023, Vol. 50 ›› Issue (1): 294-301.doi: 10.11896/jsjkx.220400101

• Computer Network • Previous Articles     Next Articles

Incentive Mechanism for Continuous Crowd Sensing Based Symmetric Encryption and Double Truth Discovery

XU Miaomiao, CHEN Zhenping   

  1. School of Electronic and Information Engineering,Suzhou University of Science and Technology,Suzhou,Jiangsu 215009,China
  • Received:2022-04-10 Revised:2022-08-21 Online:2023-01-15 Published:2023-01-09
  • About author:XU Miaomiao,born in 1998,postgra-duate.Her main research interests include group intelligence perception and privacy protection.
    CHEN Zhenping,born in 1981,Ph.D,professor.Her main research interests include group intelligence perception and Internet of things technology.
  • Supported by:
    National Natural Science Foundation of China(51874205).

Abstract: Aimed at the problems in continuous crowd sensing,such as the increased privacy requirements,the unreliable perception data collected and the low enthusiasm of users to participate,this paper proposes an incentive mechanism based on symmetric encryption and double-layer truth discovery(SDIM).First,the symmetric encryption algorithm is used to protect the privacy of the perceived data.When the privacy requirements are high and the number of perceptions is large,the computing overhead and the time of data encryption and reward computing will be greatly reduced.Second,based on a double-layer truth discovery model,an incentive mechanism supporting data reliability evaluation is proposed.The purpose is to simultaneously realize the real time reward of continuous crowd sensing,and improve the fairness of reward when the participants have malicious behavior.Finally,the dual privacy analysis of the proposed method is illustrated.The simulation results show that the proposed method can effectively calculate the true value and the reward according to the data reliability.Notably,it is obviously superior to the comparative model in the time of data encryption and reward computing,and can calculate the reward more fairly when the participants have malicious behavior.

Key words: Real time incentive mechanism, Symmetric encryption, Continuous crowd sensing, Data reliability assessment, Privacy protection

CLC Number: 

  • TP309
[1]CAO L,CAI Y,YUE Y G.Swarm Intelligence-Based Perfor-mance Optimization for Mobile Wireless Sensor Networks:Survey,Challenges,and Future Directions [J].IEEE Access,2019,7:161524-161553.
[2]ZHOU Y K,RAO B,WANG W.UAV Swarm Intelligence:Recent Advances and Future Trends [J].IEEE Access,2020,8:183856-183878.
[3]ZHANG Y H,DENG R H,ZHENG D,et al.Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-Assisted Industrial IoT [J].IEEE Transactions on Industrial Informatics,2019,15(9):5099-5108.
[4]HUANG H Y,CHEN D,LI Y T.IM-LDP:Incentive Mecha-nism for Mobile Crowd-Sensing Based on Local Differential Privacy[J].IEEE Communications Letters,2021,25(3):960-964.
[5]ZHAO B W,TANG S H,LIU X M,et al.PACE:Privacy-Preserving and Quality-Aware Incentive Mechanism for Mobile Crowdsensing [J].IEEE Transactions on Mobile Computing,2021,20(5):1924-1939.
[6]ZHAO C,YANG S S,MCCANN J A.On the Data Quality inPrivacy-Preserving Mobile Crowdsensing Systems with Untruthful Reporting [J].IEEE Transactions on Mobile Computing,2021,20(2):647-661.
[7]ZHANG Y F,ZHANG X L.Price Learning-based IncentiveMechanism for Mobile Crowd Sensing[J].ACM Transactions on Sensor Networks,2021,17(2):1-24.
[8]DAN P,FAN W,CHEN G H.Data Quality Guided IncentiveMechanism Design for Crowdsensing [J].IEEE Transactions on Mobile Computing,2018,17(2):307-319.
[9]LIU Y X,TANG S H,WU H T,et al.RTPT:A Framework for Real-Time Privacy-Preserving Truth Discovery on Crowd Sensed Data Streams[J].Computer Networks,2019,148(15):349-360.
[10]HE D J,CHAN S,GUIZANI M.User Privacy and Data Trustworthiness in Mobile Crowd Sensing [J].IEEE Wireless Communications,2015,22(1):28-34.
[11]ZHAO B W,LIU X M,CHEN W N,et al.PRICE:Privacy and Reliability-Aware Real-Time Incentive System for Crowdsensing [J].IEEE Internet of Things Journal,2021,8(24):17584- 17595.
[12]XUE K P,ZHU B,YANG Q Y,et al.InPPTD:A Lightweight Incentive-Based Privacy-Preserving Truth Discovery for Crowd-sensing Systems [J].IEEE Internet of Things Journal,2021,8(6):4305-4316.
[13]SHI F,WU D,ARKHIPOV D I,et al.ParkCrowd:ReliableCrowdsensing for Aggregation and Dissemination of Parking Space Information [J].IEEE Transactions on Intelligent Transportation Systems,2019,20(11):4032-4044.
[14]XU C,WANG J C,ZHU L H,et al.PPMR:A Privacy-Preserving Online Medical Service Recommendation Scheme in eHealthcare System [J].IEEE Internet of Things Journal,2019,6(3):5665-5673.
[15]CAPPONI A,FIANDRINO C,KANTARCI B,et al.A Survey on Mobile Crowdsensing Systems:Challenges,Solutions,and Opportunities [J].IEEE Communications Surveys & Tutorials,2019,21(3):2419-2465.
[16]CHEN X,TANG C,LI Z,et al.A Pricing Approach Toward Incentive Mechanisms for Participant Mobile Crowdsensing in Edge Computing [J].Mobile Networks and Applications,2020,25(3):1220-1232.
[17]WANG J Z,LI M R,HE Y H,et al.A Blockchain Based Privacy-Preserving Incentive Mechanism in Crowdsensing Applications [J].IEEE Access,2018,6:17545-17556.
[18]WANG D,REN J,WANG Z,et al.Privacy-preserving Streaming Truth Discovery in Crowdsourcing with Differential Privacy[J].IEEE Transactions on Mobile Computing,2022,21(10):3757-3772.
[19]LI Q H,CAO G H,PORTA T F L.Efficient and Privacy-Aware Data Aggregation in Mobile Sensing[J].IEEE Transactions on Dependable and Secure Computing,2014,11(2):115-129.
[20]LI Q,LI Y,GAO J,et al.Resolving conflicts in heterogeneous data by truth discovery and source reliability estimation[C]//Proceedings of ACM International Conference on Management of Data.2014:1187-1198.
[21]TANG J,FU S,XU M,et al.Achieve Privacy Preserving Truth Discovery in Crowdsensing Systems[C]//Proceedings of ACM International Conference on Information and Knowledge Mana-gement.2019:1301-1310.
[1] LU Chen-yang, DENG Su, MA Wu-bin, WU Ya-hui, ZHOU Hao-hao. Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients [J]. Computer Science, 2022, 49(9): 183-193.
[2] WANG Mei-shan, YAO Lan, GAO Fu-xiang, XU Jun-can. Study on Differential Privacy Protection for Medical Set-Valued Data [J]. Computer Science, 2022, 49(4): 362-368.
[3] GUO Yan-qing, LI Yu-hang, WANG Wan-wan, FU Hai-yan, WU Ming-kan, LI Yi. FL-GRM:Gamma Regression Algorithm Based on Federated Learning [J]. Computer Science, 2022, 49(12): 66-73.
[4] ZHOU Qian, DAI Hua, SHENG Wen-jie, HU Zheng, YANG Geng. Research on Verifiable Keyword Search over Encrypted Cloud Data:A Survey [J]. Computer Science, 2022, 49(10): 272-278.
[5] LI Yi-cong, ZHOU Kuan-jiu, WANG Zi-zhong, XU Lin. ZKFERP:Universal and Efficient Range Proof Scheme with Constant Computational Cost [J]. Computer Science, 2022, 49(10): 335-343.
[6] JIN Hua, ZHU Jing-yu, WANG Chang-da. Review on Video Privacy Protection [J]. Computer Science, 2022, 49(1): 306-313.
[7] LEI Yu-xiao , DUAN Yu-cong. AI Governance Oriented Legal to Technology Bridging Framework for Cross-modal Privacy Protection [J]. Computer Science, 2021, 48(9): 9-20.
[8] GUO Rui, LU Tian-liang, DU Yan-hui. Source-location Privacy Protection Scheme Based on Target Decision in WSN [J]. Computer Science, 2021, 48(5): 334-340.
[9] ZHENG Jia-tong, WU Wen-yuan. Practical Bi-deniable Encryption Scheme Based on MLWE [J]. Computer Science, 2021, 48(3): 307-312.
[10] WANG Rui-jin, TANG Yu-cheng, PEI Xi-kai, GUO Shang-tong, ZHANG Feng-li. Block-chain Privacy Protection Scheme Based on Lightweight Homomorphic Encryption and Zero-knowledge Proof [J]. Computer Science, 2021, 48(11A): 547-551.
[11] LENG Feng, ZHANG Ming-kai, YAN Zhi-wei, ZHANG Cui-ling, ZENG Yu. Application of Chinese Cryptographic Algorithm in RPKI [J]. Computer Science, 2021, 48(11A): 678-681.
[12] LI Yu, DUAN Hong-yue, YIN Yu-yu, GAO Hong-hao. Survey of Crowdsourcing Applications in Blockchain Systems [J]. Computer Science, 2021, 48(11): 12-27.
[13] YU Qi-long, LU Ning, SHI Wen-bo. Traceable Mixing Scheme for Bitcoin [J]. Computer Science, 2021, 48(11): 72-78.
[14] WEI Li-qi, ZHAO Zhi-hong, BAI Guang-wei, SHEN Hang. Location Privacy Game Mechanism Based on Generative Adversarial Networks [J]. Computer Science, 2021, 48(10): 266-271.
[15] YU Xue-yong, CHEN Tao. Privacy Protection Offloading Algorithm Based on Virtual Mapping in Edge Computing Scene [J]. Computer Science, 2021, 48(1): 65-71.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!