Reputation-Aware Trust and Privacy-Preservation for Mobile Cloud Computing

Mobile Cloud Computing (MCC) is getting growing interest due to its wide applicability in variety of social, industrial, and commercial mobile applications. Mobile and smart devices can share complex computational operations with Cloud Service Providers (CSPs). It also provides storage, access polices enforcement, and security operations. In many cases, CSP requires services from crowd contributors CCs for data collection, sharing, and mobile application support. It requires trust management for CCs to guard against malicious CCs and ensure security and privacy of data. However, end users or data requesters also demand reliable security solutions for sharing their data or accessing data from unknown CCs. To ensure strong security, mobile devices are not computationally feasible to perform complex cryptographic operations for desired privacy. To resolve these issues, we propose Reputation-aware Trust and Privacy Preservation scheme for MCC. In first phase, we deal with the trust management by utilizing reputation aware selection of CCs and leverage cloud services where CSP maintains trust score for CCs and data requesters. In second phase, we manage privacy preservation by using our proposed Anonymous Secure-shell Ciphertext-policy Attribute Based Encryption (AS-CABE). We have also proposed a hybrid policy tree mechanism for dynamic attribute selection used for security solutions and key management. Next, an anonymous secure shell is maintained between the CCs and the crowd servers to ensure registration after approval from trusted authority. In the similar vein, we propose outsourced encryption and decryption mechanism for mobiles that further utilize encryption and decryption service providers for complex operations. To the best of our knowledge, we are the first one to deal with the trust issues of data requester and privacy concerns of CCs and users both at the same time. After that, we have presented the security analysis to analyze AS-CABE against security attacks. Finally, the results are presented that ensure the supremacy of our proposed scheme as compared to counterparts in terms of reputation score, storage, computation, trust, resilience, encryption, and decryption time.

[1]  Xi Fang,et al.  Crowdsourcing to smartphones: incentive mechanism design for mobile phone sensing , 2012, Mobicom '12.

[2]  Chonho Lee,et al.  A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..

[3]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[4]  Levent Ertaul,et al.  Security Challenges in Cloud Computing , 2010, Security and Management.

[5]  Ming Xu,et al.  FIDC: A framework for improving data credibility in mobile crowdsensing , 2017, Comput. Networks.

[6]  Jiguo Yu,et al.  Follow But No Track: Privacy Preserved Profile Publishing in Cyber-Physical Social Systems , 2017, IEEE Internet of Things Journal.

[7]  Zhongcheng Li,et al.  A Truthful Incentive Mechanism for Online Recruitment in Mobile Crowd Sensing System , 2017, Sensors.

[8]  Athanasios V. Vasilakos,et al.  Security and privacy challenges in mobile cloud computing: Survey and way ahead , 2017, J. Netw. Comput. Appl..

[9]  Burak Kantarci,et al.  Anchor-Assisted and Vote-Based Trustworthiness Assurance in Smart City Crowdsensing , 2016, IEEE Access.

[10]  J. Wenny Rahayu,et al.  Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..

[11]  Mohammed Hussain,et al.  Trust in Mobile Cloud Computing with LTE-based Deployment , 2014, 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops.

[12]  Ioannis N. Athanasiadis,et al.  Privacy-preserving computation of participatory noise maps in the cloud , 2014, J. Syst. Softw..

[13]  Fan Wu,et al.  Data Quality Guided Incentive Mechanism Design for Crowdsensing , 2018, IEEE Transactions on Mobile Computing.

[14]  Xiaohui Liang,et al.  Security and Privacy in Smart City Applications: Challenges and Solutions , 2017, IEEE Communications Magazine.

[15]  Siti Hafizah Ab Hamid,et al.  Mobile storage augmentation in mobile cloud computing: Taxonomy, approaches, and open issues , 2015, Simul. Model. Pract. Theory.

[16]  Jian Shen,et al.  Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length , 2017, Secur. Commun. Networks.

[17]  Dan Boneh,et al.  Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.

[18]  Hao Wang,et al.  Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing , 2016, Soft Computing.

[19]  Nima Jafari Navimipour,et al.  Cloud computing and trust evaluation: A systematic literature review of the state-of-the-art mechanisms , 2018, Journal of Electrical Systems and Information Technology.

[20]  Georgios Kambourakis,et al.  A cloud-based architecture to crowdsource mobile app privacy leaks , 2014, Panhellenic Conference on Informatics.

[21]  V. Viji Rajendran,et al.  Hybrid model for dynamic evaluation of trust in cloud services , 2016, Wirel. Networks.

[22]  Jian Shen,et al.  A secure cloud-assisted urban data sharing framework for ubiquitous-cities , 2017, Pervasive Mob. Comput..

[23]  Luca Foschini,et al.  Quantifying User Reputation Scores, Data Trustworthiness, and User Incentives in Mobile Crowd-Sensing , 2017, IEEE Access.

[24]  Jin Li,et al.  Efficient attribute-based data sharing in mobile clouds , 2016, Pervasive Mob. Comput..

[25]  Yunhao Liu,et al.  Toward Efficient Mechanisms for Mobile Crowdsensing , 2017, IEEE Transactions on Vehicular Technology.

[26]  Victor C. M. Leung,et al.  A Novel Sensory Data Processing Framework to Integrate Sensor Networks With Mobile Cloud , 2016, IEEE Systems Journal.

[27]  Nima Jafari Navimipour,et al.  A new method for trust and reputation evaluation in the cloud environments using the recommendations of opinion leaders' entities and removing the effect of troll entities , 2016, Comput. Hum. Behav..

[28]  Jianhua Wang,et al.  Verifiable Outsourced Ciphertext-Policy Attribute-Based Encryption for Mobile Cloud Computing , 2017, KSII Trans. Internet Inf. Syst..

[29]  Tie Luo,et al.  Reshaping Mobile Crowd Sensing Using Cross Validation to Improve Data Credibility , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[30]  Li Xu,et al.  A reliable recommendation and privacy-preserving based cross-layer reputation mechanism for mobile cloud computing , 2015, Future Gener. Comput. Syst..

[31]  G. Ravi,et al.  Attribute Based Encryption With Verifiable Outsourced Decryption , 2014 .

[32]  Suat Ozdemir,et al.  Functional reputation based reliable data aggregation and transmission for wireless sensor networks , 2008 .

[33]  Jin Li,et al.  Securely Outsourcing Attribute-Based Encryption with Checkability , 2014, IEEE Transactions on Parallel and Distributed Systems.

[34]  Zhibin Zhou,et al.  Efficient and secure data storage operations for mobile cloud computing , 2012, 2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm).

[35]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[36]  Hakima Chaouchi,et al.  Extended Privacy in Crowdsourced Location-Based Services Using Mobile Cloud Computing , 2016, Mob. Inf. Syst..

[37]  Xiang-Yang Li,et al.  Budget-Feasible Online Incentive Mechanisms for Crowdsourcing Tasks Truthfully , 2016, IEEE/ACM Transactions on Networking.

[38]  Hassan Takabi,et al.  Mobile Cloud Computing and Its Security, Privacy and Trust Management Challenges , 2013 .

[39]  Paramvir Bahl,et al.  The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.

[40]  Jiguo Yu,et al.  Latent-Data Privacy Preserving With Customized Data Utility for Social Network Data , 2018, IEEE Transactions on Vehicular Technology.

[41]  Jia Guo,et al.  A survey of trust computation models for service management in internet of things systems , 2017, Comput. Commun..

[42]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[43]  Yingshu Li,et al.  Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks , 2018, IEEE Transactions on Dependable and Secure Computing.