4.7 Article

Privacy-preserving scheme in social participatory sensing based on Secure Multi-party Cooperation

Journal

COMPUTER COMMUNICATIONS
Volume 119, Issue -, Pages 167-178

Publisher

ELSEVIER
DOI: 10.1016/j.comcom.2017.10.007

Keywords

Social participatory sensing; Privacy-preserving; Secure Multi-party Cooperation

Funding

  1. National Natural Science Foundation of China [61602051, 61402045, 61300220, 61772194]
  2. Fundamental Research Funds for the Central Universities [2017RC11]
  3. Open Foundation of State Key Laboratory of Networking and Switching Technology (Beijing University of Posts and Telecommunications) [SKLNST20170202]
  4. Scientific Research Fund of Hunan Provincial Education Department [16B089]
  5. National High Technology Research and Development Program [2015AA016101]

Ask authors/readers for more resources

Social participant sensing has been widely used to collect location related sensory data for various applications. In order to improve the Quality of Information (QoI) of the collected data with constrained budget, the application server needs to coordinate participants with different data collection capabilities and various incentive requirements. However, existing participant coordination methods either require participants to reveal their trajectories to the server which causes privacy leakage, or tradeoff the location accuracy of participants for privacy, thereby leading to lower QoI. In this paper, we propose a privacy-preserving scheme, which allows application server to provide quasi-optimal QoI for social sensing tasks without knowing participants' trajectories and identity. More specifically, we first suggest a Secure Multi-party Cooperation (SMC) based approach to evaluate participant's contribution in terms of QoI without disclosing each individual's trajectory. Second, a fuzzy decision based approach which aims to finely balance data utility gain, incentive budget and inferable privacy protection ability is adopted to coordinate participant in an incremental way. Third, sensory data and incentive are encrypted and then transferred along with participant-chain in perturbed way to protect user privacy throughout the data uploading and incentive distribution procedure. Simulation results show that our proposed method can efficiently select appropriate participants to achieve better QoI than other methods, and can protect each participant's privacy effectively.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available