4.6 Article

Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing

期刊

出版社

IEEE COMPUTER SOC
DOI: 10.1109/TDSC.2018.2791432

关键词

Mobile communication; Sensors; Resource management; Data privacy; Encryption; Edge computing; Mobile crowdsensing; fog computing; task allocation; secure deduplication

资金

  1. National Key RAMP
  2. D Program of China [2017YFB0802000]
  3. National Natural Science Foundation of China (NSFC) Research Fund [61728102]
  4. NSFC Research Fund for International Young Scientists [61750110528]
  5. National Cryptography Development Fund during the 13th Five-year Plan Period [MMJJ20170216]
  6. Fundamental Research Funds for the Central Universities [GK201702004]

向作者/读者索取更多资源

Mobile crowdsensing enables a crowd of individuals to cooperatively collect data for special interest customers using their mobile devices. The success of mobile crowdsensing largely depends on the participating mobile users. The broader participation, the more sensing data are collected; nevertheless, the more replicate data may be generated, thereby bringing unnecessary heavy communication overhead. Hence it is critical to eliminate duplicate data to improve communication efficiency, a.k.a., data deduplication. Unfortunately, sensing data is usually protected, making its deduplication challenging. In this paper, we propose a fog-assisted mobile crowdsensing framework, enabling fog nodes to allocate tasks based on user mobility for improving the accuracy of task assignment. Further, a fog-assisted secure data deduplication scheme (Fo-SDD) is introduced to improve communication efficiency while guaranteeing data confidentiality. Specifically, a BLS-oblivious pseudo-random function is designed to enable fog nodes to detect and remove replicate data in sensing reports without exposing the content of reports. To protect the privacy of mobile users, we further extend the Fo-SDD to hide users' identities during data collection. In doing so, Chameleon hash function is leveraged to achieve contribution claim and reward retrieval for anonymous mobile users. Finally, we demonstrate that both schemes achieve secure, efficient data deduplication.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据