SALT cryptography for privacy in mobile crowdsourcing

Smart phones have advanced at a very fast pace in recent years. These advancement leads to the concern of exploitation of users’ personal information due to non-restricted usage of data by any third party applications. Mobile crowdsourcing has evolved as an appropriate method for collecting the data or finding solution of a broadcasted task where the mobile phone users can perform the task anytime and anywhere as they wish. However, sensitive information like location, contact details etc. are provided by mobile users for validation which may results in the privacy breach as the data could be misused. There have been many researches to find some tools for ensuring privacy of the mobile phone users. However, the appropriateness of these tools may not be identified by the users which require additional protection of the data to maintain the confidentiality. The motive of this research is to provide secure environment for the users or workers of crowd sourcing by protecting their personal and sensitive information. Therefore, SALT cryptography is used in proposed solution for ensuring the privacy. SALT is used as a noise with the user’s personal information so that only the valid users will be able to access the information. The obtained results are in well support of the proposed solution.

[1]  Steve Feng,et al.  Distributed Medical Image Analysis and Diagnosis through Crowd-Sourced Games: A Malaria Case Study , 2012, PloS one.

[2]  Vinesh Jain,et al.  A novel technique for secure information transmission in videos using salt cryptography , 2012, 2012 Nirma University International Conference on Engineering (NUiCONE).

[3]  Malcolm Hall,et al.  ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing , 2013, MobiSys '13.

[4]  Jiannong Cao,et al.  PriWe: Recommendation for Privacy Settings of Mobile Apps Based on Crowdsourced Users' Expectations , 2015, 2015 IEEE International Conference on Mobile Services.

[5]  Andrew C. Myers,et al.  Protecting privacy using the decentralized label model , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].

[6]  Yuguang Fang,et al.  A privacy-preserving task recommendation framework for mobile crowdsourcing , 2014, 2014 IEEE Global Communications Conference.

[7]  Klaus Wehrle,et al.  TraceMixer: Privacy-preserving crowd-sensing sans trusted third party , 2017, 2017 13th Annual Conference on Wireless On-demand Network Systems and Services (WONS).

[8]  Chi-Kin Chau,et al.  On the privacy of crowd-sourced data collection for distance-to-empty prediction and eco-routing , 2016 .

[9]  Byung-Gon Chun,et al.  TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.

[10]  Naixue Xiong,et al.  Anonymity-Based Privacy-Preserving Data Reporting for Participatory Sensing , 2015, IEEE Internet of Things Journal.

[11]  Panagiotis Papadimitratos,et al.  Security, Privacy, and Incentive Provision for Mobile Crowd Sensing Systems , 2016, IEEE Internet of Things Journal.

[12]  Norman M. Sadeh,et al.  Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.

[13]  Bo Zhang,et al.  Privacy-preserving QoI-aware participant coordination for mobile crowdsourcing , 2016, Comput. Networks.

[14]  Mark Harman,et al.  A survey of the use of crowdsourcing in software engineering , 2017, J. Syst. Softw..

[15]  Yang Gao,et al.  An incentive mechanism with privacy protection in mobile crowdsourcing systems , 2016, Comput. Networks.

[16]  Enhong Chen,et al.  Characterizing Privacy Risks of Mobile Apps with Sensitivity Analysis , 2018, IEEE Transactions on Mobile Computing.

[17]  Alastair R. Beresford,et al.  MockDroid: trading privacy for application functionality on smartphones , 2011, HotMobile '11.

[18]  Xi Chen,et al.  Privacy-preserving high-quality map generation with participatory sensing , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[19]  Prathamesh P. Churi,et al.  Jumbling-Salting: An improvised approach for password encryption , 2015, 2015 International Conference on Science and Technology (TICST).

[20]  Archan Misra,et al.  Privacy in context-aware mobile crowdsourcing systems , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).