Privacy-Preserving Reputation Management for Edge Computing Enhanced Mobile Crowdsensing

Mobile crowdsensing (MCS) has gained popularity for its potential to leverage individual mobile devices to sense, collect, and analyze data instead of deploying sensors. As the sensing data become increasingly fine-grained and complicated, there is a tendency to enhance MCS with the edge computing paradigm to reduce time delays and high bandwidth costs. The sensing data may reveal personal information, and thus it is of great significance to preserve the privacy of the participants. However, preserving privacy may hinder the process of handling malicious participants. In this paper, we propose two privacy preserving reputation management schemes for edge computing enhanced MCS to simultaneously preserve privacy and deal with malicious participants. In the basic scheme, a novel reputation value updating method is designed based on the deviations of the encrypted sensing data from the final aggregating result. The basic scheme is efficient at the expense of revealing the deviation value of each participant to the reputation manager. To conquer this drawback, we propose an advanced scheme by updating the reputation values utilizing the rank of deviations. Extensive experiments demonstrate that both these two schemes have high cost efficiency and are effective to deal with malicious participants.

[1]  Hong Zhong,et al.  Firework: Big Data Sharing and Processing in Collaborative Edge Environment , 2016, 2016 Fourth IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb).

[2]  Nikos Mamoulis,et al.  Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.

[3]  Wei Cheng,et al.  Enabling Reputation and Trust in Privacy-Preserving Mobile Sensing , 2014, IEEE Transactions on Mobile Computing.

[4]  Mohsen Guizani,et al.  User privacy and data trustworthiness in mobile crowd sensing , 2015, IEEE Wireless Communications.

[5]  Yan Lindsay Sun,et al.  Trust Management for Defending On-Off Attacks , 2015, IEEE Transactions on Parallel and Distributed Systems.

[6]  Weisong Shi,et al.  Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.

[7]  Wen Hu,et al.  Are you contributing trustworthy data?: the case for a reputation system in participatory sensing , 2010, MSWIM '10.

[8]  E. Massera,et al.  On field calibration of an electronic nose for benzene estimation in an urban pollution monitoring scenario , 2008 .

[9]  Haojin Zhu,et al.  Privacy Leakage via De-Anonymization and Aggregation in Heterogeneous Social Networks , 2020, IEEE Transactions on Dependable and Secure Computing.

[10]  Deborah Estrin,et al.  AndWellness: an open mobile system for activity and experience sampling , 2010, Wireless Health.

[11]  Qinghua Li,et al.  Privacy-aware and trustworthy data aggregation in mobile sensing , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).

[12]  E. Praganavi,et al.  EFFICIENT AND PRIVACY-AWARE DATA AGGREGATION IN MOBILE SENSING , 2017 .

[13]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[14]  Xi Fang,et al.  Incentive Mechanisms for Crowdsensing: Crowdsourcing With Smartphones , 2016, IEEE/ACM Transactions on Networking.

[15]  Aiqing Zhang,et al.  Security, Privacy, and Fairness in Fog-Based Vehicular Crowdsensing , 2017, IEEE Communications Magazine.

[16]  Ivan Damgård,et al.  Efficient and Secure Comparison for On-Line Auctions , 2007, ACISP.

[17]  Sheng Zhong,et al.  Efficient and Privacy-Preserving Min and $k$ th Min Computations in Mobile Sensing Systems , 2017, IEEE Transactions on Dependable and Secure Computing.

[18]  Stefan Katzenbeisser,et al.  Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.

[19]  Tao Zhang,et al.  Enforcing Privacy Using Symmetric Random Key-Set in Vehicular Networks , 2007, Eighth International Symposium on Autonomous Decentralized Systems (ISADS'07).

[20]  Yan Lindsay Sun,et al.  Securing Digital Reputation in Online Social Media [Applications Corner] , 2014, IEEE Signal Processing Magazine.

[21]  Frederik Vercauteren,et al.  Somewhat Practical Fully Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..

[22]  Xiaodong Lin,et al.  A Privacy-Preserving Vehicular Crowdsensing-Based Road Surface Condition Monitoring System Using Fog Computing , 2017, IEEE Internet of Things Journal.

[23]  Yi Li,et al.  Privacy-Preserving Location Proof for Securing Large-Scale Database-Driven Cognitive Radio Networks , 2016, IEEE Internet of Things Journal.

[24]  Xiaohui Liang,et al.  Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense , 2016, IEEE Transactions on Dependable and Secure Computing.

[25]  Deborah Estrin,et al.  PEIR, the personal environmental impact report, as a platform for participatory sensing systems research , 2009, MobiSys '09.