Mobile Crowd Sensing Platform for Quality and Users Privacy Protection

Mobile Crowd Sensing Platform for Quality and Users Privacy Protection PDF Author: Cristian Tanas
Publisher:
ISBN:
Category :
Languages : en
Pages : 105

Get Book Here

Book Description

Mobile Crowd Sensing Platform for Quality and Users Privacy Protection

Mobile Crowd Sensing Platform for Quality and Users Privacy Protection PDF Author: Cristian Tanas
Publisher:
ISBN:
Category :
Languages : en
Pages : 105

Get Book Here

Book Description


Privacy-Preserving in Mobile Crowdsensing

Privacy-Preserving in Mobile Crowdsensing PDF Author: Chuan Zhang
Publisher: Springer Nature
ISBN: 9811983151
Category : Computers
Languages : en
Pages : 205

Get Book Here

Book Description
Mobile crowdsensing is a new sensing paradigm that utilizes the intelligence of a crowd of individuals to collect data for mobile purposes by using their portable devices, such as smartphones and wearable devices. Commonly, individuals are incentivized to collect data to fulfill a crowdsensing task released by a data requester. This “sensing as a service” elaborates our knowledge of the physical world by opening up a new door of data collection and analysis. However, with the expansion of mobile crowdsensing, privacy issues urgently need to be solved. In this book, we discuss the research background and current research process of privacy protection in mobile crowdsensing. In the first chapter, the background, system model, and threat model of mobile crowdsensing are introduced. The second chapter discusses the current techniques to protect user privacy in mobile crowdsensing. Chapter three introduces the privacy-preserving content-based task allocation scheme. Chapter four further introduces the privacy-preserving location-based task scheme. Chapter five presents the scheme of privacy-preserving truth discovery with truth transparency. Chapter six proposes the scheme of privacy-preserving truth discovery with truth hiding. Chapter seven summarizes this monograph and proposes future research directions. In summary, this book introduces the following techniques in mobile crowdsensing: 1) describe a randomizable matrix-based task-matching method to protect task privacy and enable secure content-based task allocation; 2) describe a multi-clouds randomizable matrix-based task-matching method to protect location privacy and enable secure arbitrary range queries; and 3) describe privacy-preserving truth discovery methods to support efficient and secure truth discovery. These techniques are vital to the rapid development of privacy-preserving in mobile crowdsensing.

Incentive Mechanism for Mobile Crowdsensing

Incentive Mechanism for Mobile Crowdsensing PDF Author: Youqi Li
Publisher: Springer Nature
ISBN: 9819969212
Category : Computers
Languages : en
Pages : 137

Get Book Here

Book Description
Mobile crowdsensing (MCS) is emerging as a novel sensing paradigm in the Internet of Things (IoTs) due to the proliferation of smart devices (e.g., smartphones, wearable devices) in people’s daily lives. These ubiquitous devices provide an opportunity to harness the wisdom of crowds by recruiting mobile users to collectively perform sensing tasks, which largely collect data about a wide range of human activities and the surrounding environment. However, users suffer from resource consumption such as battery, processing power, and storage, which discourages users’ participation. To ensure the participation rate, it is necessary to employ an incentive mechanism to compensate users’ costs such that users are willing to take part in crowdsensing. This book sheds light on the design of incentive mechanisms for MCS in the context of game theory. Particularly, this book presents several game-theoretic models for MCS in different scenarios. In Chapter 1, the authors present an overview of MCS and state the significance of incentive mechanism for MCS. Then, in Chapter 2, 3, 4, and 5, the authors propose a long-term incentive mechanism, a fair incentive mechanism, a collaborative incentive mechanism, and a coopetition-aware incentive mechanism for MCS, respectively. Finally, Chapter 6 summarizes this book and point out the future directions. This book is of particular interest to the readers and researchers in the field of IoT research, especially in the interdisciplinary field of network economics and IoT.

Mobile Crowd Sensing: Incentive Mechanism Design

Mobile Crowd Sensing: Incentive Mechanism Design PDF Author: Fen Hou
Publisher: Springer
ISBN: 3030010244
Category : Technology & Engineering
Languages : en
Pages : 52

Get Book Here

Book Description
This SpringerBrief investigates and reviews the development and various applications of mobile crowd sensing (MCS). With the miniaturization of sensors and the popularity of smart mobile devices, MCS becomes a promising solution to efficiently collect different types of information, such as traffic conditions, air quality, temperature and more, which is covered in this brief. The features, novelty, and applications of MCS are elaborated in detail in this brief. In addition, the basic knowledge about auction theory and incentive mechanism design is introduced. Incentive mechanism design plays a key role in the success of MCS. With an efficient incentive mechanism, it is possible to attract enough mobile users to participate in a MCS system, thus enough high quality sensing data can be collected. Two types of incentive mechanisms with different system models are introduced in this brief. One is the reputation-aware incentive mechanism, and another is the social-aware incentive mechanism. This SpringerBrief covers the significance and the impacts of both reputation and social relationship of smartphone users (SUs) in MCS and presents extensive simulation results to demonstrate the good performance of the proposed incentive mechanisms compared with some existing counterparts. The target audience for this SpringerBrief is researchers and engineers in the area of wireless communication and networking, especially those who are interested in the mobile crowd sensing or incentive mechanism design. Meanwhile, it is also intended as a reference guide for advanced level students in the area of wireless communications and computer networks.

Privacy-preserving Mobile Crowd Sensing

Privacy-preserving Mobile Crowd Sensing PDF Author: Zhijie Wang
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 112

Get Book Here

Book Description
The presence of a rich set of embedded sensors on mobile devices has been fuelling various sensing applications regarding the activities of individuals and their surrounding environment, and these ubiquitous sensing-capable mobile devices are pushing the new paradigm of Mobile Crowd Sensing (MCS) from concept to reality. MCS aims to outsource sensing data collection to mobile users and it could revolutionize the traditional ways of sensing data collection and processing. In the meantime, cloud computing provides cloud-backed infrastructures for mobile devices to provision their capabilities with network access. With enormous computational and storage resources along with sufficient bandwidth, it functions as the hub to handle the sensing service requests from sensing service consumers and coordinate sensing task assignment among eligible mobile users to reach a desired quality of sensing service. This paper studies the problem of sensing task assignment to mobile device owners with specific spatio-temporal traits to minimize the cost and maximize the utility in MCS while adhering to QoS constraints. Greedy approaches and hybrid solutions combined with bee algorithms are explored to address the problem.Moreover, the privacy concerns arise with the widespread deployment of MCS from both the data contributors and the sensing service consumers. The uploaded sensing data, especially those tagged with spatio-temporal information, will disclose the personal information of the data contributors. In addition, the sensing service requests can reveal the personal interests of service consumers. To address the privacy issues, this paper constructs a new framework named Privacy-Preserving Mobile Crowd Sensing (PP-MCS) to leverage the sensing capabilities of ubiquitous mobile devices and cloud infrastructures. PP-MCS has a distributed architecture without relying on trusted third parties for privacy-preservation. In PP-MCS, the sensing service consumers can retrieve data without revealing the real data contributors. Besides, the individual sensing records can be compared against the aggregation result while keeping the values of sensing records unknown, and the k-nearest neighbors could be approximately identified without privacy leaks. As such, the privacy of the data contributors and the sensing service consumers can be protected to the greatest extent possible.

Location Privacy-Preserving Method for Auction-Based Incentive Mechanisms in Mobile Crowd Sensing

Location Privacy-Preserving Method for Auction-Based Incentive Mechanisms in Mobile Crowd Sensing PDF Author:
Publisher:
ISBN:
Category :
Languages : en
Pages :

Get Book Here

Book Description
Abstract It is of significant importance to provide incentives to smartphone users in mobile crowd sensing systems. Recently, a number of auction-based incentive mechanisms have been proposed. However, an auction-based incentive mechanism may unexpectedly release the location privacy of smartphone users, which may seriously reduce the willingness of users participating in contributing sensing data. In an auction-based incentive mechanism, even if the location of a user is not enclosed in his/her bid submitted to the platform, the location information may still be inferred by an adversary by using the prices of the tasks required by the user. We take an example to show how an attack can recover the location information of a smartphone user by merely knowing his/her bid. To defend against such an attack, we propose a method to protect location privacy in auctions for mobile crowd sensing systems. This method encrypts prices in a bid so that the adversary cannot access and hence the location privacy of users can be protected. In the meanwhile, however, the auction can proceed properly, i.e. the platform can select the user offering the lowest price for each sensing task or the platform can choose users with budget constraint. We demonstrate the effectiveness of our proposed method with theoretical analysis and simulations.

Security and Privacy for Next-Generation Wireless Networks

Security and Privacy for Next-Generation Wireless Networks PDF Author: Sheng Zhong
Publisher: Springer
ISBN: 303001150X
Category : Computers
Languages : en
Pages : 183

Get Book Here

Book Description
This timely book provides broad coverage of security and privacy issues in the macro and micro perspective. In macroperspective, the system and algorithm fundamentals of next-generation wireless networks are discussed. In micro-perspective, this book focuses on the key secure and privacy techniques in different emerging networks from the interconnection view of human and cyber-physical world. This book includes 7 chapters from prominent international researchers working in this subject area. This book serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to wireless security and privacy related issues Recent advances in wireless communication technologies have enabled the large-scale deployment of next-generation wireless networks, and many other wireless applications are emerging. The next generation of mobile networks continues to transform the way people communicate and access information. As a matter of fact, next-generation emerging networks are exploiting their numerous applications in both military and civil fields. For most applications, it is important to guarantee high security of the deployed network in order to defend against attacks from adversaries, as well as the privacy intrusion. The key target in the development of next-generation wireless networks is to promote the integration of the human, cyber, and physical worlds. Previous work in Cyber Physical Systems (CPS) considered the connection between the cyber world and the physical world. In the recent studies, human involvement brings new channels and initiatives in this interconnection. In this integration process, security and privacy are critical issues to many wireless network applications, and it is a paramount concern for the growth of next-generation wireless networks. This is due to the open nature of wireless communication and the involvement of humans. New opportunities for tackling these security and privacy issues in next-generation wireless networks will be achieved by leveraging the properties of interaction among human, computers and things.

Privacy for Location-based Services

Privacy for Location-based Services PDF Author: Gabriel Ghinita
Publisher: Morgan & Claypool Publishers
ISBN: 1627051503
Category : Computers
Languages : en
Pages : 87

Get Book Here

Book Description
Sharing of location data enables numerous exciting applications, such as location-based queries, location-based social recommendations, monitoring of traffic and air pollution levels, etc. Disclosing exact user locations raises serious privacy concerns, as locations may give away sensitive information about individuals' health status, alternative lifestyles, political and religious affiliations, etc. Preserving location privacy is an essential requirement towards the successful deployment of location-based applications. These lecture notes provide an overview of the state-of-the-art in location privacy protection. A diverse body of solutions is reviewed, including methods that use location generalization, cryptographic techniques or differential privacy. The most prominent results are discussed, and promising directions for future work are identified.

Intelligent Cyber-Physical Systems for Autonomous Transportation

Intelligent Cyber-Physical Systems for Autonomous Transportation PDF Author: Sahil Garg
Publisher: Springer Nature
ISBN: 3030920542
Category : Technology & Engineering
Languages : en
Pages : 289

Get Book Here

Book Description
This book provides comprehensive discussion on key topics related to the usage and deployment of AI in urban transportation systems including drones. The book presents intelligent solutions to overcome the challenges of static approaches in the transportation sector to make them intelligent, adaptive, agile, and flexible. The book showcases different AI-deployment models, algorithms, and implementations related to intelligent cyber physical systems (CPS) along with their pros and cons. Even more, this book provides deep insights into the CPS specifically about the layered architecture and different planes, interfaces, and programmable network operations. The deployment models for AI-based CPS are also included with an aim towards the design of interoperable and intelligent CPS architectures by researchers in future. The authors present hands on practical implementations, deployment scenarios, and use cases related to different transportation scenarios. In the end, the design and research challenges, open issues, and future research directions are provided.

Foundations of Cryptography: Volume 2, Basic Applications

Foundations of Cryptography: Volume 2, Basic Applications PDF Author: Oded Goldreich
Publisher: Cambridge University Press
ISBN: 1107393973
Category : Computers
Languages : en
Pages : 390

Get Book Here

Book Description
Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Foundations of Cryptography presents a rigorous and systematic treatment of foundational issues, defining cryptographic tasks and solving cryptographic problems. The emphasis is on the clarification of fundamental concepts and on demonstrating the feasibility of solving several central cryptographic problems, as opposed to describing ad-hoc approaches. This second volume contains a thorough treatment of three basic applications: Encryption, Signatures, and General Cryptographic Protocols. It builds on the previous volume, which provided a treatment of one-way functions, pseudorandomness, and zero-knowledge proofs. It is suitable for use in a graduate course on cryptography and as a reference book for experts. The author assumes basic familiarity with the design and analysis of algorithms; some knowledge of complexity theory and probability is also useful.