Computer Science ›› 2022, Vol. 49 ›› Issue (5): 303-310.doi: 10.11896/jsjkx.210400077
• Information Security • Previous Articles Next Articles
LI Li1, HE Xin2,3, HAN Zhi-jie3
CLC Number:
[1]GOASDUFF L,PETTEY C.Gartner Says Worldwide Smart-phone Sales to Grow 11% in 2021(WSCI)[OL].https://www.gartner.com/en/newsroom/press-releases/2021-02-03-gartner-says-worldwide-smartphone-sales-to-grow-11-percent-in-2021. [2]RIMOL M.Gartner Forecasts Global Spending on Wearable Devices to Total $81.5 Billion in 2021(WSCI)[OL].https://www.gartner.com/en/newsroom/press-releases/2021-01-11-gartner-forecasts-global-spending-on-wearable-devices-to-total-81-5-billion-in-2021. [3]GANTI R K,FAN Y,LEI H.Mobile crowdsensing:currentstate and future challenges[J].IEEE Communications Magazine,2011,49(11):32-39. [4]KHAN W Z,XIANG Y,AALSALEM M Y,et al.Mobile Phone Sensing Systems:A Survey[J].IEEE Communications Surveys &Tutorials,2013,15(1):402-427. [5]LIU L,WEI W,ZHAO D,et al.Urban Resolution:New Metric for Measuring the Quality of Urban Sensing[J].IEEE Transactions on Mobile Computing,2015,14(12):2560-2575. [6]WU Y,WANG Y,HU W,et al.SmartPhoto:A Resource-Aware Crowdsourcing Approach for Image Sensing with Smartphones[J].IEEE Transactions on Mobile Computing,2016,15(5):1249-1263. [7]SAREMI F,FATEMIEH O,AHMADI H,et al.Experienceswith GreenGPS—Fuel-Efficient Navigation Using Participatory Sensing[J].IEEE Transactions on Mobile Computing,2016,15(3):672-689. [8]PRYSS R,REICHERT M,HERRMANN J,et al.Mobile Crowd Sensing in Clinical and Psychological Trials-A Case Study[C]//2015 IEEE 28th International Symposium on Computer-Based Medical Systems.IEEE Press,2015:23-24. [9]REDDY S,PARKER A,HYMAN J,et al.Image browsing,processing,and clustering for participatory sensing:lessons from a DietSense prototype[C]//Workshop on Embedded Networked Sensors.ACM,2007. [10]LIU L,LIU W,ZHENG Y,et al.Third-Eye:A mobilephone-enabled crowdsensing system for air quality monitoring[J].Proceedings of the ACM on Interactive,Mobile,Wearable and Ubiquitous Technologies,2018,2(1):1-26. [11]KIM S,ROBSON C,ZIMMERMAN T,et al.Creek Watch:Pairing usefulness and usability for successful citizen science[C]//Proceedings of the ACM Conference on Human Factors in Computing Systems.Canada:ACM,2011:2125-2134. [12]BONINO D,DELGADO M T,PASTRONE C,et al.WasteApp:Smarter Waste Recycling for Smart Citizens[C]//2016 International Multidisciplinary Conference on Computer and Energy Science (SpliTech).IEEE,2016:1-6. [13]MATARAZZO T J,SANTI P,PAKZAD S N,et al.Crowdsensing Framework for Monitoring Bridge Vibrations Using Moving Smartphones[J].Proceedings of the IEEE,2018,106(4):577-593. [14]LI Q,CAO G.Efficient and Privacy-Aware Data Aggregation in Mobile Sensing[J].IEEE Transactions on Dependable and Secure Computing,2014,11(2):115-129. [15]WANG E,YANG Y J,WU J,et al.An Efficient Prediction-Based User Recruitment for Mobile Crowdsensing[J].IEEE Transactions on Mobile Computing,2018,17(1):16-28. [16]YIN B,LU J,WEI X T.Correlation-Based Task ProcessingPlans in Crowdsensing Platforms[J].IEEE Transactions on Network Science and Engineering,2021,8(2):1542-1556. [17]GONG X,SHROFF N B.Truthful Mobile Crowdsensing forStrategic Users With Private Data Quality[J].IEEE/ACM Transactions on Networking,2019,27(5):1959-1972. [18]AN J,LIANG D,GUI X,et al.Crowdsensing Quality Control and Grading Evaluation Based on a Two-Consensus Blockchain[J].IEEE Internet of Things Journal,2019,6(3):4711-4718. [19]YANG D,XUE G,FANG X,et al.Incentive Mechanisms forCrowdsensing:Crowdsourcing With Smartphones[J].IEEE/ACM Transactions on Networking,2016,24(3):1732-1744. [20]XIONG J B,CHEN X H,YANG Q,et al.A Task-Oriented User Selection Incentive Mechanism in Edge-Aided Mobile Crowdsensing[J].IEEE Transactions on Network Science and Engineering,2019,7(4):2347-2360. [21]VERGARA-LAURENS I,JAIMES L,LABRADOR M.Privacy-Preserving Mechanisms for Crowdsensing:Survey and Research Challenges[J].IEEE Internet of Things Journal,2017,4(4):855-869. [22]KHAN F,REHMAN A U,ZHENG J,et al.Mobile crowdsen-sing:A survey on privacy-preservation,task management,assignment models,and incentives mechanisms[J].Future Generation Computer Systems,2019,100(11):456-472. [23]GUO B,YU Z,ZHANG D,et al.From Participatory Sensing to Mobile Crowd Sensing[C]//2014 IEEE International Confe-rence on Pervasive Computing and Communication Workshops (Percom Workshops).2014:593-598. [24]DING S,HE X,WANG J.Multiobjective Optimization Modelfor Service Node Selection Based on a Tradeoff Between Quality of Service and Resource Consumption in Mobile Crowd Sensing[J].IEEE Internet of Things Journal,2017,4(1):258-268. [25]HUI Z,BOLOT J.Anonymization of location data does notwork:A large-scale measurement study[C]//Proceedings of the 17th Annual International Conference on Mobile Computing and Networking.2011. [26]SHEN H,BAI G,HU Y,et al.P2TA:Privacy-Preserving Task Allocation for Edge Computing Enhanced Mobile Crowdsensing[J].Journal of Systems Architecture,2019,97:130-141. [27]WANG Z,HU J,LV R,et al.Personalized privacy-preservingtask allocation for mobile crowdsensing[J].IEEE Transactions on Mobile Computing,2018,18(6):1330-1341. [28]XIAO M,JIE W,SHENG Z,et al.Secret-sharing-based secure user recruitment protocol for mobile crowdsensing[C]//IEEE INFOCOM 2017-IEEE Conference on Computer Communications.2017:1-9. [29]MA L,LIU X,PEI Q,et al.Privacy-preserving reputation management for edge computing enhanced mobile crowdsensing[J].IEEE Transactions on Services Computing,2018,12(5):786-799. [30]YANG L,ZHANG M,HE S,et al.Crowd-empowered privacy-preserving data aggregation for mobile crowdsensing[C]//Proceedings of the Eighteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing.2018:151-160. [31]XIONG J,MA R,CHEN L,et al.A personalized privacy protection framework for mobile crowdsensing in IIoT[J].IEEE Transactions on Industrial Informatics,2019,16(6):4231-4241. [32]MIAO C,JIANG W,SU L,et al.Privacy-preserving truth discovery in crowd sensing systems[J].ACM Transactions on Sensor Networks (TOSN),2019,15(1):1-32. [33]SUN G,SUN S,YU H,et al.Toward Incentivizing Fog-BasedPrivacy-Preserving Mobile Crowdsensing in the Internet of Vehicles[J].IEEE Internet of Things Journal,2019,7(5):4128-4142. [34]LIANG Y,AN J,HU X Z,et al.Dynamic incentive mechanism supported privacy-preserving in mobile CrowdSensing[J].Computer Application Research,2019,36(11):3404-3409. [35]WU H,WANG L,XUE G,et al.Enabling data trustworthiness and user privacy in mobile crowdsensing[J].IEEE/ACM Transactions on Networking,2019,27(6):2294-2307. [36]WANG X,LIU Z,TIAN X,et al.Incentivizing crowdsensingwithlocation-privacy preserving[J].IEEE Transactions on Wireless Communications,2017,16(10):6940-6952. [37]BASUDAN S,LIN X,SANKARANARAYANAN K.A privacy-preserving vehicular crowdsensing-based road surface condition monitoring system using fog computing[J].IEEE Internet of Things Journal,2017,4(3):772-782. [38]SUCASAS V,MANTAS G,BASTOS J,et al.A signaturescheme with unlinkable-yet-accountable pseudonymity for privacy-preserving crowdsensing[J].IEEE Transactions on Mobile Computing,2019,19(4):752-768. [39]XIONG J,ZHAO M,BHUIYAN M,et al.An AI-enabledThree-party Game Framework for Guaranteed Data Privacy in Mobile Edge Crowdsensing of IoT[J].IEEE Transactions on Industrial Informatics,2021,17(2):922-933. [40]YANG M,ZHU T,LIANG K,et al.A blockchain-based location privacy-preserving crowdsensing system[J].Future Generation Computer Systems,2019,94:408-418. [41]NI J,ZHANG K,YU Y,et al.Providing task allocation and secure deduplication for mobile crowdsensing via fog computing[J].IEEE Transactions on Dependable and Secure Computing,2018,17(3):581-594. [42]WU D,YANG Z,YANG B,et al.From Centralized Managementto Edge Collaboration:A Privacy-Preserving Task Assignment Framework for Mobile Crowd Sensing[J].IEEE Internet of Things Journal,2021,8(6):4579-4589. [43]ZHENG Y,DUAN H,WANG C.Learning the Truth Privately and Confidently:Encrypted Confidence-Aware Truth Discovery in Mobile Crowdsensing[J].IEEE Transactions on Information Forensics and Security,2018,13(10):2475-2489. [44]WANG J,LI M,HE Y,et al.A blockchain based privacy-preserving incentive mechanism in crowdsensing applications[J].IEEE Access,2018,6:17545-17556. [45]VERGARA-LAURENS I,MENDEZ D,LABRADOR M.Privacy,quality of information,and energy consumption in Participatory Sensing systems[C]//2014 IEEE International Conference on Pervasive Computing and Communications (PerCom).IEEE,2014:199-207. [46]AN J,YANG H,GUI X,et al.TCNS:node selection with privacy protection in crowdsensing based on twice consensuses of blockchain[J].IEEE Transactions on Network and Service Management,2019,16(3):1255-1267. [47]NI J,ZHANG K,XIA Q,et al.Enabling strong privacy preservation and accurate task allocation for mobile crowdsensing[J].IEEE Transactions on Mobile Computing,2019,19(6):1317-1331. [48]WU H,WANG L,XUE G.Privacy-aware task allocation anddata aggregation in fog-assisted spatial crowdsourcing[J].IEEE Transactions on Network Science and Engineering,2019,7(1):589-602. [49]MAN H A,SUSILO W,YI M.Constant-Size Dynamic k-TAA[C]//5th International Conference on Security and Cryptography for Networks,Lecture Notes in Computer Science.Maiori,2006:111-125. [50]YANG P,GUI X,JIAN A,et al.An Efficient Secret Key Homomorphic Encryption Used in Image Processing Service[J].Security & Communication Networks,2017,2017:1-11. [51]JIANG J,ZHENG Y,SHI Z,et al.A Practical System for Privacy-Aware Targeted Mobile Advertising Services[J].IEEE Transactions on Services Computing,2020,13(3):410-424. [52]LIN J,YANG D,LI M,et al.Frameworks for Privacy-Preserving Mobile Crowdsensing Incentive Mechanisms[J].IEEE Transactions on Mobile Computing,2018,17(8):1851-1864. [53]SWEENEY L.k-anonymity:A model for protecting privacy[J].International Journal of Uncertainty,Fuzziness and Knowledge-Based Systems,2002,10(5):557-570. [54]DENT A W,ZHENG Y,YUNG M.Practical Signcryption[M].Berlin:Springer,2010. [55]ZMAB C,JMA C,YMAB C,et al.Privacy-preserving and high-accurate outsourced disease predictor on random forest[J].Information Sciences,2019,496:225-241. [56]civil code.civil code(WSCI)[OL].http://www.npc.gov.cn/npc/c35174/mfdgfbca.shtml. [57]LI T,JUNG T,QIU Z,et al.Scalable Privacy-Preserving Parti-cipant Selection for Mobile Crowdsensing Systems:Participant Grouping and Secure Group Bidding[J].IEEE Transactions on Network Science & Engineering,2020,7(2):855-868. [58]ZHENG Y,DUAN H,WANG C.Learning the truth privately and confidently:Encrypted confidence-aware truth discovery in mobile crowdsensing[J].IEEE Transactions on Information Forensics and Security,2018,13(10):2475-2489. [59]QIU F,WU F,CHEN G.Privacy and Quality Preserving Multimedia Data Aggregation for Participatory Sensing Systems[J].IEEE Transactions on Mobile Computing,2015,14(6):1287-1300. [60]ZHAO C,YANG S,MCCANN J A.On the Data Quality in Privacy-Preserving Mobile Crowdsensing Systems with Untruthful Reporting[J].IEEE Transactions on Mobile Computing,2021,20(2):647-661. [61]SONG Z,LI Z,CHEN X.Local Differential Privacy Preserving Mechanism for Multi-attribute Data in Mobile Crowdsensing with Edge Computing[C]//2019 IEEE International Conference on Smart Internet of Things (SmartIoT).IEEE,2019:283-290. [62]CHEN JW,MA H D,ZHAO D,et al.Correlated Differential Privacy Protection for Mobile Crowdsensing[J].IEEE Transactions on Big Data,2021,7(4):784-795. |
[1] | LYU You, WU Wen-yuan. Privacy-preserving Linear Regression Scheme and Its Application [J]. Computer Science, 2022, 49(9): 318-325. |
[2] | WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354. |
[3] | ZHOU Lian-bing, ZHOU Xiang-zhen, CUI Xue-rong. Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map [J]. Computer Science, 2022, 49(8): 344-349. |
[4] | QIN Xiao-yue, HUANG Ru-wei, YANG Bo. NTRU Type Fully Homomorphic Encryption Scheme over Prime Power Cyclotomic Rings [J]. Computer Science, 2022, 49(5): 341-346. |
[5] | SONG Tao, LI Xiu-hua, LI Hui, WEN Jun-hao, XIONG Qing-yu, CHEN Jie. Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era [J]. Computer Science, 2022, 49(4): 340-353. |
[6] | GAO Shi-yao, CHEN Yan-li, XU Yu-lan. Expressive Attribute-based Searchable Encryption Scheme in Cloud Computing [J]. Computer Science, 2022, 49(3): 313-321. |
[7] | LYU You, WU Wen-yuan. Linear System Solving Scheme Based on Homomorphic Encryption [J]. Computer Science, 2022, 49(3): 338-345. |
[8] | REN Hua, NIU Shao-zhang, WANG Mao-sen, YUE Zhen, REN Ru-yong. Homomorphic and Commutative Fragile Zero-watermarking Based on SVD [J]. Computer Science, 2022, 49(3): 70-76. |
[9] | JIN Hua, ZHU Jing-yu, WANG Chang-da. Review on Video Privacy Protection [J]. Computer Science, 2022, 49(1): 306-313. |
[10] | LIANG Jian, HE Jun-hui. H.264/AVC Video Encryption Based on Adaptive Permutation of Macroblock Coding Information [J]. Computer Science, 2022, 49(1): 314-320. |
[11] | ZHANG Sai-nan, LI Qian-mu. Color Image Encryption Algorithm Based on Logistic-Sine-Cosine Mapping [J]. Computer Science, 2022, 49(1): 353-358. |
[12] | ZHANG Xiao-yan, LI Qin-wei, FU Fu-jie. Secret Verification Method of Blockchain Transaction Amount Based on Digital Commitment [J]. Computer Science, 2021, 48(9): 324-329. |
[13] | TANG Fei, CHEN Yun-long, FENG Zhuo. Electronic Prescription Sharing Scheme Based on Blockchain and Proxy Re-encryption [J]. Computer Science, 2021, 48(6A): 498-503. |
[14] | WANG Le-ye. Geographic Local Differential Privacy in Crowdsensing:Current States and Future Opportunities [J]. Computer Science, 2021, 48(6): 301-305. |
[15] | QIAN Xin-yuan, WU Wen-yuan. Identity-based Encryption Scheme Based on R-SIS/R-LWE [J]. Computer Science, 2021, 48(6): 315-323. |
|