Noninteractive Lightweight Privacy-Preserving Auditing on Images in Mobile Crowdsourcing Networks

To determine whether images on the crowdsourcing server meet the mobile user’s requirement, an auditing protocol is desired to check these images. However, before paying for images, the mobile user typically cannot download them for checking. Moreover, since mobiles are usually low-power devices and the crowdsourcing server has to handle a large number of mobile users, the auditing protocol should be lightweight. To address the above security and efficiency issues, we propose a novel noninteractive lightweight privacy-preserving auditing protocol on images in mobile crowdsourcing networks, called NLPAS. Since NLPAS allows the mobile user to check images on the crowdsourcing server without downloading them, the newly designed protocol can provide privacy protection for these images. At the same time, NLPAS uses the binary convolutional neural network for extracting features from images and designs a novel privacy-preserving Hamming distance computation algorithm for determining whether these images on the crowdsourcing server meet the mobile user’s requirement. Since these two techniques are both lightweight, NLPAS can audit images on the crowdsourcing server in a privacy-preserving manner while still enjoying high efficiency. Experimental results show that NLPAS is feasible for real-world applications.

[1]  Xuemin Shen,et al.  Exploiting mobile crowdsourcing for pervasive cloud services: challenges and solutions , 2015, IEEE Communications Magazine.

[2]  Wei Peng,et al.  Secure Remote Multi-Factor Authentication Scheme Based on Chaotic Map Zero-Knowledge Proof for Crowdsourcing Internet of Things , 2020, IEEE Access.

[3]  Ming Xu,et al.  FIDC: A framework for improving data credibility in mobile crowdsensing , 2017, Comput. Networks.

[4]  Vaidy S. Sunderam,et al.  Dynamic Data Driven Crowd Sensing Task Assignment , 2014, ICCS.

[5]  Mohsen Guizani,et al.  User privacy and data trustworthiness in mobile crowd sensing , 2015, IEEE Wireless Communications.

[6]  Yoshua Bengio,et al.  Gradient-based learning applied to document recognition , 1998, Proc. IEEE.

[7]  Hengrun Zhang,et al.  A Survey on Security, Privacy, and Trust in Mobile Crowdsourcing , 2018, IEEE Internet of Things Journal.

[8]  Mani B. Srivastava,et al.  Truth Discovery in Crowdsourced Detection of Spatial Events , 2016, IEEE Trans. Knowl. Data Eng..

[9]  Cyrus Shahabi,et al.  A Framework for Protecting Worker Location Privacy in Spatial Crowdsourcing , 2014, Proc. VLDB Endow..

[10]  Kwok-Yan Lam,et al.  Blockchain-based mechanism for fine-grained authorization in data crowdsourcing , 2020, Future Gener. Comput. Syst..

[11]  Luca Foschini,et al.  Toward Fog-Based Mobile Crowdsensing Systems: State of the Art and Opportunities , 2019, IEEE Communications Magazine.

[12]  Jianwei Chen,et al.  Private data aggregation with integrity assurance and fault tolerance for mobile crowd-sensing , 2017, Wirel. Networks.

[13]  Mani B. Srivastava,et al.  Aggregating Crowdsourced Quantitative Claims: Additive and Multiplicative Models , 2016, IEEE Transactions on Knowledge and Data Engineering.

[14]  Xuemin Shen,et al.  SACRM: Social Aware Crowdsourcing with Reputation Management in mobile sensing , 2014, Comput. Commun..

[15]  Debiao He,et al.  SecBCS: a secure and privacy-preserving blockchain-based crowdsourcing system , 2020, Science China Information Sciences.

[16]  Liangmin Wang,et al.  Privacy-Aware Task Allocation and Data Aggregation in Fog-Assisted Spatial Crowdsourcing , 2020, IEEE Transactions on Network Science and Engineering.