Achieving Trust-Based and Privacy-Preserving Customer Selection in Ubiquitous Computing

The recent proliferation of smart devices has given rise to ubiquitous computing, an emerging computing paradigm which allows anytime & anywhere computing possible. In such a ubiquitous computing environment, customers release different computing or sensing tasks, and people, also known as data processors, participate in these tasks and get paid for providing their idle computing and communication resources. Thus, how to select an appropriate and reliable customer while not disclosing processors' privacy has become an interesting problem. In this article, we present a trust-based and privacy-preserving customer selection scheme in ubiquitous computing, called TPCS, to enable potential processors select the customers with good reputation. The basic concept of TPCS is that each data processor holds a trust value, and the reputation score of the customer is calculated based on processors' trust values and feedbacks via a truth discovery process. To preserve processors' privacy, pseudonyms and Paillier cryptosystem are applied to conceal each processor's real identity. In addition, three authentication protocols are designed to ensure that only the valid data processors (i.e., the processors registering in the system, holding the truthful trust values, and joining the computing tasks) can pass the authentication. A comprehensive security analysis is conducted to prove that our proposed TPCS scheme is secure and can defend against several sophisticated attacks. Moreover, extensive simulations are conducted to demonstrate the correctness and effectiveness of the proposed scheme.

[1]  Cheng Huang,et al.  TJET: Ternary Join-Exit-Tree Based Dynamic Key Management for Vehicle Platooning , 2017, IEEE Access.

[2]  Hong Shen,et al.  Privacy-Preserving Tuple Matching in Distributed Databases , 2009, IEEE Transactions on Knowledge and Data Engineering.

[3]  Feng Xia,et al.  BEEINFO: Interest-Based Forwarding Using Artificial Bee Colony for Socially Aware Networking , 2015, IEEE Transactions on Vehicular Technology.

[4]  Xiaojiang Du,et al.  Security in wireless sensor networks , 2008, IEEE Wireless Communications.

[5]  Nenghai Yu,et al.  AnFRA: Anonymous and Fast Roaming Authentication for Space Information Network , 2019, IEEE Transactions on Information Forensics and Security.

[6]  Wei Wang,et al.  HeteRank: A general similarity measure in heterogeneous information networks by integrating multi-type relationships , 2018, Inf. Sci..

[7]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[8]  Wei Hu,et al.  ATCS: A Novel Anonymous and Traceable Communication Scheme for Vehicular Ad Hoc Networks , 2011, Int. J. Netw. Secur..

[9]  Jie Wu,et al.  Defending Resource Depletion Attacks on Implantable Medical Devices , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[10]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[11]  Bo Zhao,et al.  Conflicts to Harmony: A Framework for Resolving Conflicts in Heterogeneous Data by Truth Discovery , 2016, IEEE Transactions on Knowledge and Data Engineering.

[12]  Timothy W. Finin,et al.  A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks , 2006, 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services.

[13]  Gregory D. Abowd,et al.  Charting past, present, and future research in ubiquitous computing , 2000, TCHI.

[14]  Xiaojiang Du,et al.  Internet Protocol Television (IPTV): The Killer Application for the Next-Generation Internet , 2007, IEEE Communications Magazine.

[15]  Sherali Zeadally,et al.  Trust-based security adaptation mechanism for Vehicular Sensor Networks , 2018, Comput. Networks.

[16]  Panagiotis Papadimitratos,et al.  On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[17]  Xiaojiang Du,et al.  Biometric-based two-level secure access control for Implantable Medical Devices during emergencies , 2011, 2011 Proceedings IEEE INFOCOM.

[18]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[19]  Longfei Wu,et al.  EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid , 2019, Science China Information Sciences.

[20]  Peilin Hong,et al.  PSAP: Pseudonym-Based Secure Authentication Protocol for NFC Applications , 2018, IEEE Transactions on Consumer Electronics.

[21]  Naima Iltaf,et al.  Modeling interaction using trust and recommendation in ubiquitous computing environment , 2012, EURASIP J. Wirel. Commun. Netw..

[22]  Chenglin Miao,et al.  A lightweight privacy-preserving truth discovery framework for mobile crowd sensing systems , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[23]  Mohsen Guizani,et al.  PRIF: A Privacy-Preserving Interest-Based Forwarding Scheme for Social Internet of Vehicles , 2018, IEEE Internet of Things Journal.

[24]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[25]  Mihir Bellare,et al.  The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES , 2001, CT-RSA.

[26]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[27]  Christine Julien,et al.  Trust-Based, Privacy-Preserving Context Aggregation and Sharing in Mobile Ubiquitous Computing , 2013, MobiQuitous.

[28]  Alicia Nieto-Reyes,et al.  Classification of Alzheimer’s Patients through Ubiquitous Computing † , 2017, Sensors.

[29]  Hao Hu,et al.  REPLACE: A Reliable Trust-Based Platoon Service Recommendation Scheme in VANET , 2017, IEEE Transactions on Vehicular Technology.

[30]  Mohsen Guizani,et al.  An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.

[31]  Bo Zhao,et al.  Resolving conflicts in heterogeneous data by truth discovery and source reliability estimation , 2014, SIGMOD Conference.

[32]  Jianhua Ma,et al.  Ubisafe Computing: Vision and Challenges (I) , 2006, ATC.

[33]  Nenghai Yu,et al.  Fog-Aided Verifiable Privacy Preserving Access Control for Latency-Sensitive Data Sharing in Vehicular Cloud Computing , 2018, IEEE Network.

[34]  Yuxin Peng,et al.  Complex activity recognition using time series pattern dictionary learned from ubiquitous sensors , 2016, Inf. Sci..

[35]  Rongxing Lu,et al.  TPSQ: Trust-based platoon service query via vehicular communications , 2015, Peer-to-Peer Networking and Applications.

[36]  SuKyoung Lee,et al.  Energy-efficient wireless hospital sensor networking for remote patient monitoring , 2014, Inf. Sci..

[37]  Mohsen Guizani,et al.  LPTD: Achieving Lightweight and Privacy-Preserving Truth Discovery in CIoT , 2018, Future Gener. Comput. Syst..

[38]  Pin-Han Ho,et al.  A Trust Modeling Framework for Message Propagation and Evaluation in VANETs , 2010, 2010 2nd International Conference on Information Technology Convergence and Services.

[39]  Giovanni Acampora,et al.  A proposal of ubiquitous fuzzy computing for Ambient Intelligence , 2008, Inf. Sci..

[40]  Mohsen Guizani,et al.  Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.

[41]  Chin-Feng Lai,et al.  Multi-appliance recognition system with hybrid SVM/GMM classifier in ubiquitous smart home , 2013, Inf. Sci..

[42]  Chenglin Miao,et al.  Cloud-Enabled Privacy-Preserving Truth Discovery in Crowd Sensing Systems , 2015, SenSys.

[43]  Laurence T. Yang,et al.  Security, privacy and trust of user-centric solutions , 2018, Future Gener. Comput. Syst..

[44]  Ali A. Ghorbani,et al.  A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT , 2017, IEEE Access.

[45]  Keke Gai,et al.  Controllable and trustworthy blockchain-based cloud data management , 2019, Future Gener. Comput. Syst..

[46]  Liehuang Zhu,et al.  RTSense: Providing Reliable Trust-Based Crowdsensing Services in CVCC , 2018, IEEE Network.

[47]  Anelise Munaretto,et al.  GrAnt: Inferring best forwarders from complex networks' dynamics through a greedy Ant Colony Optimization , 2012, Comput. Networks.

[48]  Liehuang Zhu,et al.  ASAP: An Anonymous Smart-Parking and Payment Scheme in Vehicular Networks , 2020, IEEE Transactions on Dependable and Secure Computing.