Privacy-preserving Crowd-sensed Trust Aggregation in the User-centeric Internet of People Networks

Today we are relying on Internet technologies for numerous services, for example, personal communication, online businesses, recruitment, and entertainment. Over these networks, people usually create content, a skillful worker profile, and provide services that are normally watched and used by other users, thus developing a social network among people termed as the Internet of People. Malicious users could also utilize such platforms for spreading unwanted content that could bring catastrophic consequences to a social network provider and the society, if not identified on time. The use of trust management over these networks plays a vital role in the success of these services. Crowd-sensing people or network users for their views about certain content or content creators could be a potential solution to assess the trustworthiness of content creators and their content. However, the human involvement in crowd-sensing would have challenges of privacy preservation and preventing intentional assignment of the fake high score given to certain user/content. To address these challenges, in this article, we propose a novel trust model that evaluates the aggregate trustworthiness of the content creator and the content without compromising the privacy of the participating people in a crowdsource group. The proposed system has inherent properties of privacy protection of participants, performs operations in the decentralized setup, and considers the trust weights of participants in a private and secure way. The system ensures privacy of participants under the malicious and honest-but-curious adversarial models. We evaluated the performance of the system by developing a prototype and applying it to different real data from different online social networks.

[1]  Feng Hao,et al.  privy: Privacy Preserving Collaboration Across Multiple Service Providers to Combat Telecom Spams , 2020, IEEE Transactions on Emerging Topics in Computing.

[2]  Ponnurangam Kumaraguru,et al.  Mining YouTube to Discover Extremist Videos, Users and Hidden Communities , 2010, AIRS.

[3]  Munindar P. Singh,et al.  Evidence-based trust: A mathematical model geared for multiagent systems , 2010, TAAS.

[4]  Feng Hao,et al.  Every Vote Counts: Ensuring Integrity in Large-Scale Electronic Voting , 2014, EVT/WOTE.

[5]  Xiaodong Lin,et al.  Anonymous Reputation System for IIoT-Enabled Retail Marketing Atop PoS Blockchain , 2019, IEEE Transactions on Industrial Informatics.

[6]  Feng Hao,et al.  Anonymous voting by two-round public discussion , 2010, IET Inf. Secur..

[7]  Feng Hao,et al.  TrustVote: Privacy-Preserving Node Ranking in Vehicular Networks , 2019, IEEE Internet of Things Journal.

[8]  Andrei Broder,et al.  Network Applications of Bloom Filters: A Survey , 2004, Internet Math..

[9]  Jong Wook Kim,et al.  Application of Local Differential Privacy to Collection of Indoor Positioning Data , 2018, IEEE Access.

[10]  Wenliang Du,et al.  Privacy-preserving collaborative filtering using randomized perturbation techniques , 2003, Third IEEE International Conference on Data Mining.

[11]  Liangmin Wang,et al.  Privacy-Aware Task Allocation and Data Aggregation in Fog-Assisted Spatial Crowdsourcing , 2020, IEEE Transactions on Network Science and Engineering.

[12]  Xuemin Shen,et al.  Security and privacy in mobile crowdsourcing networks: challenges and opportunities , 2015, IEEE Communications Magazine.

[13]  Sharifa Alghowinem A Safer YouTube Kids: An Extra Layer of Content Filtering Using Automated Multimodal Analysis , 2018, IntelliSys.

[14]  Xiaocong Jin,et al.  Privacy-preserving crowdsourced spectrum sensing , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[15]  Jiming Chen,et al.  REAP: An Efficient Incentive Mechanism for Reconciling Aggregation Accuracy and Individual Privacy in Crowdsensing , 2017, IEEE Transactions on Information Forensics and Security.

[16]  Saurabh Bagchi,et al.  Spam detection in voice-over-IP calls through semi-supervised clustering , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.

[17]  Ashish Sureka,et al.  Mining YouTube metadata for detecting privacy invading harassment and misdemeanor videos , 2014, 2014 Twelfth Annual International Conference on Privacy, Security and Trust.

[18]  Cynthia Dwork,et al.  Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.

[19]  Chenglin Miao,et al.  Privacy-Preserving Truth Discovery in Crowd Sensing Systems , 2019, ACM Trans. Sens. Networks.

[20]  Vaclav Petricek,et al.  Recommender System for Online Dating Service , 2007, ArXiv.

[21]  Michael Sirivianos,et al.  SocialFilter: Introducing social trust to collaborative spam mitigation , 2010, 2011 Proceedings IEEE INFOCOM.

[22]  Guoliang Li,et al.  PriRadar: A Privacy-Preserving Framework for Spatial Crowdsourcing , 2020, IEEE Transactions on Information Forensics and Security.

[23]  Michael Backes,et al.  Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[24]  Man Ho Au,et al.  Decentralized Blacklistable Anonymous Credentials with Reputation , 2018, IACR Cryptol. ePrint Arch..

[25]  Krishna P. Gummadi,et al.  Equality of Voice: Towards Fair Representation in Crowdsourced Top-K Recommendations , 2018, FAT.

[26]  Steven Myers,et al.  ANONIZE: A Large-Scale Anonymous Survey System , 2014, 2014 IEEE Symposium on Security and Privacy.

[27]  Sergios Theodoridis,et al.  A Multimodal Approach to Violence Detection in Video Sharing Sites , 2010, 2010 20th International Conference on Pattern Recognition.

[28]  Ingemar J. Cox,et al.  Privacy-Preserving Crowd-Sourcing of Web Searches with Private Data Donor , 2019, WWW.

[29]  Somesh Jha,et al.  Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing , 2014, USENIX Security Symposium.

[30]  Dan Boneh,et al.  Prio: Private, Robust, and Scalable Computation of Aggregate Statistics , 2017, NSDI.

[31]  Oscar Déniz-Suárez,et al.  Fast violence detection in video , 2015, 2014 International Conference on Computer Vision Theory and Applications (VISAPP).

[32]  Elisa Bertino,et al.  Android User Privacy Preserving Through Crowdsourcing , 2018, IEEE Transactions on Information Forensics and Security.

[33]  Zekeriya Erkin,et al.  Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing , 2012, IEEE Transactions on Information Forensics and Security.

[34]  Hsinchun Chen,et al.  Identification of extremist videos in online video sharing sites , 2009, 2009 IEEE International Conference on Intelligence and Security Informatics.

[35]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[36]  Yehuda Lindell,et al.  Secure Computation on the Web: Computing without Simultaneous Interaction , 2011, IACR Cryptol. ePrint Arch..

[37]  Aaron Roth,et al.  Take It or Leave It: Running a Survey When Privacy Comes at a Cost , 2012, WINE.

[38]  Sarvar Patel,et al.  Practical Secure Aggregation for Privacy-Preserving Machine Learning , 2017, IACR Cryptol. ePrint Arch..

[39]  Ernesto Damiani,et al.  P2P-based collaborative spam detection and filtering , 2004, Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings..

[40]  Kaoru Kurosawa,et al.  Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption , 2010, SCN.

[41]  Moni Naor,et al.  Differential privacy under continual observation , 2010, STOC '10.

[42]  Hairong Qi,et al.  Privacy-Preserving Crowd-Sourced Statistical Data Publishing with An Untrusted Server , 2019, IEEE Transactions on Mobile Computing.

[43]  Aaron Roth,et al.  Conducting truthful surveys, cheaply , 2012, EC '12.

[44]  Úlfar Erlingsson,et al.  RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response , 2014, CCS.

[45]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[46]  Emiliano De Cristofaro,et al.  Efficient Private Statistics with Succinct Sketches , 2015, NDSS.

[47]  Cong Wang,et al.  Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery , 2020, IEEE Transactions on Dependable and Secure Computing.