Computer Science ›› 2022, Vol. 49 ›› Issue (5): 303-310.doi: 10.11896/jsjkx.210400077

• Information Security • Previous Articles     Next Articles

Review of Privacy-preserving Mechanisms in Crowdsensing

LI Li1, HE Xin2,3, HAN Zhi-jie3   

  1. 1 School of Computer and Information Engineering,Henan University,Kaifeng,Henan 475004,China
    2 International Joint Laboratory of Intelligent Network Theory and Key Technology,Henan University,Kaifeng,Henan 475004,China
    3 School of Software,Henan University,Kaifeng,Henan 475004,China
  • Received:2021-04-08 Revised:2021-07-20 Online:2022-05-15 Published:2022-05-06
  • About author:LI Li,born in 1977,Ph.D candidate, is a student member of China Computer Federation.Her main research interests include crowdcomputing,crowdsensing,privacy-preserving and machine lear-ning.
    HE Xin,born in 1974,professor,Ph.D supervisor,is a senior member of China Computer Federation.His main research interests include crowdsensing,mobilecomputing,cloudcomputing and big data processing.
  • Supported by:
    National Natural Science Foundation of China(61672209,61701170),Major Science and Technology Special Project of Henan Province(201300210400) and Key R & D and Promotion Special Project of Henan Province(212102210094).

Abstract: In recent years,the rapid popularity of intelligent terminals has greatly promoted the development of crowdsensing service paradigm,which integrates data collection,analysis and processing.As a necessary base to ensure the safe operation of services and encourage the participation of sensing users,privacy-preserving has become the primary issue to be solved.This paper presents the state-of-the-art in privacy-preserving mechanisms for crowdsensing service.After describing its main components,this paper discusses the definition and metrics of privacy-preserving from the view of crowdsensing’s whole life cycle.The privacy-preserving mechanisms designed in literatures are analyzed and discussed according to different stages in crowdsensing’s whole-life-cycle,and the experimental datasets used in literatures are given.Finally,Future research challenges are proposed based on the development of crowdsensing and global regulatory requirements for privacy-preserving.

Key words: Anonymization, Crowdcomputing, Crowdsensing, Encryption, Privacy-preserving

CLC Number: 

  • TP393
[1]GOASDUFF L,PETTEY C.Gartner Says Worldwide Smart-phone Sales to Grow 11% in 2021(WSCI)[OL].https://www.gartner.com/en/newsroom/press-releases/2021-02-03-gartner-says-worldwide-smartphone-sales-to-grow-11-percent-in-2021.
[2]RIMOL M.Gartner Forecasts Global Spending on Wearable Devices to Total $81.5 Billion in 2021(WSCI)[OL].https://www.gartner.com/en/newsroom/press-releases/2021-01-11-gartner-forecasts-global-spending-on-wearable-devices-to-total-81-5-billion-in-2021.
[3]GANTI R K,FAN Y,LEI H.Mobile crowdsensing:currentstate and future challenges[J].IEEE Communications Magazine,2011,49(11):32-39.
[4]KHAN W Z,XIANG Y,AALSALEM M Y,et al.Mobile Phone Sensing Systems:A Survey[J].IEEE Communications Surveys &Tutorials,2013,15(1):402-427.
[5]LIU L,WEI W,ZHAO D,et al.Urban Resolution:New Metric for Measuring the Quality of Urban Sensing[J].IEEE Transactions on Mobile Computing,2015,14(12):2560-2575.
[6]WU Y,WANG Y,HU W,et al.SmartPhoto:A Resource-Aware Crowdsourcing Approach for Image Sensing with Smartphones[J].IEEE Transactions on Mobile Computing,2016,15(5):1249-1263.
[7]SAREMI F,FATEMIEH O,AHMADI H,et al.Experienceswith GreenGPS—Fuel-Efficient Navigation Using Participatory Sensing[J].IEEE Transactions on Mobile Computing,2016,15(3):672-689.
[8]PRYSS R,REICHERT M,HERRMANN J,et al.Mobile Crowd Sensing in Clinical and Psychological Trials-A Case Study[C]//2015 IEEE 28th International Symposium on Computer-Based Medical Systems.IEEE Press,2015:23-24.
[9]REDDY S,PARKER A,HYMAN J,et al.Image browsing,processing,and clustering for participatory sensing:lessons from a DietSense prototype[C]//Workshop on Embedded Networked Sensors.ACM,2007.
[10]LIU L,LIU W,ZHENG Y,et al.Third-Eye:A mobilephone-enabled crowdsensing system for air quality monitoring[J].Proceedings of the ACM on Interactive,Mobile,Wearable and Ubiquitous Technologies,2018,2(1):1-26.
[11]KIM S,ROBSON C,ZIMMERMAN T,et al.Creek Watch:Pairing usefulness and usability for successful citizen science[C]//Proceedings of the ACM Conference on Human Factors in Computing Systems.Canada:ACM,2011:2125-2134.
[12]BONINO D,DELGADO M T,PASTRONE C,et al.WasteApp:Smarter Waste Recycling for Smart Citizens[C]//2016 International Multidisciplinary Conference on Computer and Energy Science (SpliTech).IEEE,2016:1-6.
[13]MATARAZZO T J,SANTI P,PAKZAD S N,et al.Crowdsensing Framework for Monitoring Bridge Vibrations Using Moving Smartphones[J].Proceedings of the IEEE,2018,106(4):577-593.
[14]LI Q,CAO G.Efficient and Privacy-Aware Data Aggregation in Mobile Sensing[J].IEEE Transactions on Dependable and Secure Computing,2014,11(2):115-129.
[15]WANG E,YANG Y J,WU J,et al.An Efficient Prediction-Based User Recruitment for Mobile Crowdsensing[J].IEEE Transactions on Mobile Computing,2018,17(1):16-28.
[16]YIN B,LU J,WEI X T.Correlation-Based Task ProcessingPlans in Crowdsensing Platforms[J].IEEE Transactions on Network Science and Engineering,2021,8(2):1542-1556.
[17]GONG X,SHROFF N B.Truthful Mobile Crowdsensing forStrategic Users With Private Data Quality[J].IEEE/ACM Transactions on Networking,2019,27(5):1959-1972.
[18]AN J,LIANG D,GUI X,et al.Crowdsensing Quality Control and Grading Evaluation Based on a Two-Consensus Blockchain[J].IEEE Internet of Things Journal,2019,6(3):4711-4718.
[19]YANG D,XUE G,FANG X,et al.Incentive Mechanisms forCrowdsensing:Crowdsourcing With Smartphones[J].IEEE/ACM Transactions on Networking,2016,24(3):1732-1744.
[20]XIONG J B,CHEN X H,YANG Q,et al.A Task-Oriented User Selection Incentive Mechanism in Edge-Aided Mobile Crowdsensing[J].IEEE Transactions on Network Science and Engineering,2019,7(4):2347-2360.
[21]VERGARA-LAURENS I,JAIMES L,LABRADOR M.Privacy-Preserving Mechanisms for Crowdsensing:Survey and Research Challenges[J].IEEE Internet of Things Journal,2017,4(4):855-869.
[22]KHAN F,REHMAN A U,ZHENG J,et al.Mobile crowdsen-sing:A survey on privacy-preservation,task management,assignment models,and incentives mechanisms[J].Future Generation Computer Systems,2019,100(11):456-472.
[23]GUO B,YU Z,ZHANG D,et al.From Participatory Sensing to Mobile Crowd Sensing[C]//2014 IEEE International Confe-rence on Pervasive Computing and Communication Workshops (Percom Workshops).2014:593-598.
[24]DING S,HE X,WANG J.Multiobjective Optimization Modelfor Service Node Selection Based on a Tradeoff Between Quality of Service and Resource Consumption in Mobile Crowd Sensing[J].IEEE Internet of Things Journal,2017,4(1):258-268.
[25]HUI Z,BOLOT J.Anonymization of location data does notwork:A large-scale measurement study[C]//Proceedings of the 17th Annual International Conference on Mobile Computing and Networking.2011.
[26]SHEN H,BAI G,HU Y,et al.P2TA:Privacy-Preserving Task Allocation for Edge Computing Enhanced Mobile Crowdsensing[J].Journal of Systems Architecture,2019,97:130-141.
[27]WANG Z,HU J,LV R,et al.Personalized privacy-preservingtask allocation for mobile crowdsensing[J].IEEE Transactions on Mobile Computing,2018,18(6):1330-1341.
[28]XIAO M,JIE W,SHENG Z,et al.Secret-sharing-based secure user recruitment protocol for mobile crowdsensing[C]//IEEE INFOCOM 2017-IEEE Conference on Computer Communications.2017:1-9.
[29]MA L,LIU X,PEI Q,et al.Privacy-preserving reputation management for edge computing enhanced mobile crowdsensing[J].IEEE Transactions on Services Computing,2018,12(5):786-799.
[30]YANG L,ZHANG M,HE S,et al.Crowd-empowered privacy-preserving data aggregation for mobile crowdsensing[C]//Proceedings of the Eighteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing.2018:151-160.
[31]XIONG J,MA R,CHEN L,et al.A personalized privacy protection framework for mobile crowdsensing in IIoT[J].IEEE Transactions on Industrial Informatics,2019,16(6):4231-4241.
[32]MIAO C,JIANG W,SU L,et al.Privacy-preserving truth discovery in crowd sensing systems[J].ACM Transactions on Sensor Networks (TOSN),2019,15(1):1-32.
[33]SUN G,SUN S,YU H,et al.Toward Incentivizing Fog-BasedPrivacy-Preserving Mobile Crowdsensing in the Internet of Vehicles[J].IEEE Internet of Things Journal,2019,7(5):4128-4142.
[34]LIANG Y,AN J,HU X Z,et al.Dynamic incentive mechanism supported privacy-preserving in mobile CrowdSensing[J].Computer Application Research,2019,36(11):3404-3409.
[35]WU H,WANG L,XUE G,et al.Enabling data trustworthiness and user privacy in mobile crowdsensing[J].IEEE/ACM Transactions on Networking,2019,27(6):2294-2307.
[36]WANG X,LIU Z,TIAN X,et al.Incentivizing crowdsensingwithlocation-privacy preserving[J].IEEE Transactions on Wireless Communications,2017,16(10):6940-6952.
[37]BASUDAN S,LIN X,SANKARANARAYANAN K.A privacy-preserving vehicular crowdsensing-based road surface condition monitoring system using fog computing[J].IEEE Internet of Things Journal,2017,4(3):772-782.
[38]SUCASAS V,MANTAS G,BASTOS J,et al.A signaturescheme with unlinkable-yet-accountable pseudonymity for privacy-preserving crowdsensing[J].IEEE Transactions on Mobile Computing,2019,19(4):752-768.
[39]XIONG J,ZHAO M,BHUIYAN M,et al.An AI-enabledThree-party Game Framework for Guaranteed Data Privacy in Mobile Edge Crowdsensing of IoT[J].IEEE Transactions on Industrial Informatics,2021,17(2):922-933.
[40]YANG M,ZHU T,LIANG K,et al.A blockchain-based location privacy-preserving crowdsensing system[J].Future Generation Computer Systems,2019,94:408-418.
[41]NI J,ZHANG K,YU Y,et al.Providing task allocation and secure deduplication for mobile crowdsensing via fog computing[J].IEEE Transactions on Dependable and Secure Computing,2018,17(3):581-594.
[42]WU D,YANG Z,YANG B,et al.From Centralized Managementto Edge Collaboration:A Privacy-Preserving Task Assignment Framework for Mobile Crowd Sensing[J].IEEE Internet of Things Journal,2021,8(6):4579-4589.
[43]ZHENG Y,DUAN H,WANG C.Learning the Truth Privately and Confidently:Encrypted Confidence-Aware Truth Discovery in Mobile Crowdsensing[J].IEEE Transactions on Information Forensics and Security,2018,13(10):2475-2489.
[44]WANG J,LI M,HE Y,et al.A blockchain based privacy-preserving incentive mechanism in crowdsensing applications[J].IEEE Access,2018,6:17545-17556.
[45]VERGARA-LAURENS I,MENDEZ D,LABRADOR M.Privacy,quality of information,and energy consumption in Participatory Sensing systems[C]//2014 IEEE International Conference on Pervasive Computing and Communications (PerCom).IEEE,2014:199-207.
[46]AN J,YANG H,GUI X,et al.TCNS:node selection with privacy protection in crowdsensing based on twice consensuses of blockchain[J].IEEE Transactions on Network and Service Management,2019,16(3):1255-1267.
[47]NI J,ZHANG K,XIA Q,et al.Enabling strong privacy preservation and accurate task allocation for mobile crowdsensing[J].IEEE Transactions on Mobile Computing,2019,19(6):1317-1331.
[48]WU H,WANG L,XUE G.Privacy-aware task allocation anddata aggregation in fog-assisted spatial crowdsourcing[J].IEEE Transactions on Network Science and Engineering,2019,7(1):589-602.
[49]MAN H A,SUSILO W,YI M.Constant-Size Dynamic k-TAA[C]//5th International Conference on Security and Cryptography for Networks,Lecture Notes in Computer Science.Maiori,2006:111-125.
[50]YANG P,GUI X,JIAN A,et al.An Efficient Secret Key Homomorphic Encryption Used in Image Processing Service[J].Security & Communication Networks,2017,2017:1-11.
[51]JIANG J,ZHENG Y,SHI Z,et al.A Practical System for Privacy-Aware Targeted Mobile Advertising Services[J].IEEE Transactions on Services Computing,2020,13(3):410-424.
[52]LIN J,YANG D,LI M,et al.Frameworks for Privacy-Preserving Mobile Crowdsensing Incentive Mechanisms[J].IEEE Transactions on Mobile Computing,2018,17(8):1851-1864.
[53]SWEENEY L.k-anonymity:A model for protecting privacy[J].International Journal of Uncertainty,Fuzziness and Knowledge-Based Systems,2002,10(5):557-570.
[54]DENT A W,ZHENG Y,YUNG M.Practical Signcryption[M].Berlin:Springer,2010.
[55]ZMAB C,JMA C,YMAB C,et al.Privacy-preserving and high-accurate outsourced disease predictor on random forest[J].Information Sciences,2019,496:225-241.
[56]civil code.civil code(WSCI)[OL].http://www.npc.gov.cn/npc/c35174/mfdgfbca.shtml.
[57]LI T,JUNG T,QIU Z,et al.Scalable Privacy-Preserving Parti-cipant Selection for Mobile Crowdsensing Systems:Participant Grouping and Secure Group Bidding[J].IEEE Transactions on Network Science & Engineering,2020,7(2):855-868.
[58]ZHENG Y,DUAN H,WANG C.Learning the truth privately and confidently:Encrypted confidence-aware truth discovery in mobile crowdsensing[J].IEEE Transactions on Information Forensics and Security,2018,13(10):2475-2489.
[59]QIU F,WU F,CHEN G.Privacy and Quality Preserving Multimedia Data Aggregation for Participatory Sensing Systems[J].IEEE Transactions on Mobile Computing,2015,14(6):1287-1300.
[60]ZHAO C,YANG S,MCCANN J A.On the Data Quality in Privacy-Preserving Mobile Crowdsensing Systems with Untruthful Reporting[J].IEEE Transactions on Mobile Computing,2021,20(2):647-661.
[61]SONG Z,LI Z,CHEN X.Local Differential Privacy Preserving Mechanism for Multi-attribute Data in Mobile Crowdsensing with Edge Computing[C]//2019 IEEE International Conference on Smart Internet of Things (SmartIoT).IEEE,2019:283-290.
[62]CHEN JW,MA H D,ZHAO D,et al.Correlated Differential Privacy Protection for Mobile Crowdsensing[J].IEEE Transactions on Big Data,2021,7(4):784-795.
[1] LYU You, WU Wen-yuan. Privacy-preserving Linear Regression Scheme and Its Application [J]. Computer Science, 2022, 49(9): 318-325.
[2] WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354.
[3] ZHOU Lian-bing, ZHOU Xiang-zhen, CUI Xue-rong. Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map [J]. Computer Science, 2022, 49(8): 344-349.
[4] QIN Xiao-yue, HUANG Ru-wei, YANG Bo. NTRU Type Fully Homomorphic Encryption Scheme over Prime Power Cyclotomic Rings [J]. Computer Science, 2022, 49(5): 341-346.
[5] SONG Tao, LI Xiu-hua, LI Hui, WEN Jun-hao, XIONG Qing-yu, CHEN Jie. Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era [J]. Computer Science, 2022, 49(4): 340-353.
[6] GAO Shi-yao, CHEN Yan-li, XU Yu-lan. Expressive Attribute-based Searchable Encryption Scheme in Cloud Computing [J]. Computer Science, 2022, 49(3): 313-321.
[7] LYU You, WU Wen-yuan. Linear System Solving Scheme Based on Homomorphic Encryption [J]. Computer Science, 2022, 49(3): 338-345.
[8] REN Hua, NIU Shao-zhang, WANG Mao-sen, YUE Zhen, REN Ru-yong. Homomorphic and Commutative Fragile Zero-watermarking Based on SVD [J]. Computer Science, 2022, 49(3): 70-76.
[9] JIN Hua, ZHU Jing-yu, WANG Chang-da. Review on Video Privacy Protection [J]. Computer Science, 2022, 49(1): 306-313.
[10] LIANG Jian, HE Jun-hui. H.264/AVC Video Encryption Based on Adaptive Permutation of Macroblock Coding Information [J]. Computer Science, 2022, 49(1): 314-320.
[11] ZHANG Sai-nan, LI Qian-mu. Color Image Encryption Algorithm Based on Logistic-Sine-Cosine Mapping [J]. Computer Science, 2022, 49(1): 353-358.
[12] ZHANG Xiao-yan, LI Qin-wei, FU Fu-jie. Secret Verification Method of Blockchain Transaction Amount Based on Digital Commitment [J]. Computer Science, 2021, 48(9): 324-329.
[13] TANG Fei, CHEN Yun-long, FENG Zhuo. Electronic Prescription Sharing Scheme Based on Blockchain and Proxy Re-encryption [J]. Computer Science, 2021, 48(6A): 498-503.
[14] WANG Le-ye. Geographic Local Differential Privacy in Crowdsensing:Current States and Future Opportunities [J]. Computer Science, 2021, 48(6): 301-305.
[15] QIAN Xin-yuan, WU Wen-yuan. Identity-based Encryption Scheme Based on R-SIS/R-LWE [J]. Computer Science, 2021, 48(6): 315-323.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!