Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing

Mobile crowdsensing enables a crowd of individuals to cooperatively collect data for special interest customers using their mobile devices. The success of mobile crowdsensing largely depends on the participating mobile users. The broader participation, the more sensing data are collected; nevertheless, the more replicate data may be generated, thereby bringing unnecessary heavy communication overhead. Hence it is critical to eliminate duplicate data to improve communication efficiency, a.k.a., data deduplication. Unfortunately, sensing data is usually protected, making its deduplication challenging. In this paper, we propose a fog-assisted mobile crowdsensing framework, enabling fog nodes to allocate tasks based on user mobility for improving the accuracy of task assignment. Further, a fog-assisted secure data deduplication scheme (Fo-SDD) is introduced to improve communication efficiency while guaranteeing data confidentiality. Specifically, a BLS-oblivious pseudo-random function is designed to enable fog nodes to detect and remove replicate data in sensing reports without exposing the content of reports. To protect the privacy of mobile users, we further extend the Fo-SDD to hide users’ identities during data collection. In doing so, Chameleon hash function is leveraged to achieve contribution claim and reward retrieval for anonymous mobile users. Finally, we demonstrate that both schemes achieve secure, efficient data deduplication.

[1]  Xiaodong Lin,et al.  Secure and Deduplicated Spatial Crowdsourcing: A Fog-Based Approach , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[2]  Lei Chen,et al.  GeoTruCrowd: trustworthy query answering with spatial crowdsourcing , 2013, SIGSPATIAL/GIS.

[3]  Yi Mu,et al.  Constant-Size Dynamic k-TAA , 2006, SCN.

[4]  Cyrus Shahabi,et al.  A Server-Assigned Spatial Crowdsourcing Framework , 2015, ACM Trans. Spatial Algorithms Syst..

[5]  Wen Hu,et al.  A privacy-preserving reputation system for participatory sensing , 2012, 37th Annual IEEE Conference on Local Computer Networks.

[6]  Fan Ye,et al.  Mobile crowdsensing: current state and future challenges , 2011, IEEE Communications Magazine.

[7]  Wei Cheng,et al.  Enabling Reputation and Trust in Privacy-Preserving Mobile Sensing , 2014, IEEE Transactions on Mobile Computing.

[8]  Yehuda Lindell,et al.  Introduction to Modern Cryptography , 2004 .

[9]  Mihir Bellare,et al.  Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.

[10]  Daqing Zhang,et al.  CCS-TA: quality-guaranteed online task allocation in compressive crowdsensing , 2015, UbiComp.

[11]  Mihir Bellare,et al.  Interactive Message-Locked Encryption and Secure Deduplication , 2015, Public Key Cryptography.

[12]  Ying Wang,et al.  Trust Based Incentive Scheme to Allocate Big Data Tasks with Mobile Social Cloud , 2017, IEEE Transactions on Big Data.

[13]  Vaidy S. Sunderam,et al.  Spatial Task Assignment for Crowd Sensing with Cloaked Locations , 2014, 2014 IEEE 15th International Conference on Mobile Data Management.

[14]  Jin Li,et al.  Secure Deduplication with Efficient and Reliable Convergent Key Management , 2014, IEEE Transactions on Parallel and Distributed Systems.

[15]  Yi Mu,et al.  Asymmetric Group Key Agreement , 2009, EUROCRYPT.

[16]  Enrico Gregori,et al.  Smartphone-based crowdsourcing for network monitoring: Opportunities, challenges, and a case study , 2014, IEEE Communications Magazine.

[17]  Benny Pinkas,et al.  Secure Deduplication of Encrypted Data without Additional Independent Servers , 2015, CCS.

[18]  Kaoru Ota,et al.  Secure Data Deduplication With Reliable Key Management for Dynamic Updates in CPSS , 2015, IEEE Transactions on Computational Social Systems.

[19]  Daqing Zhang,et al.  iCrowd: Near-Optimal Task Allocation for Piggyback Crowdsensing , 2016, IEEE Transactions on Mobile Computing.

[20]  Mihir Bellare,et al.  DupLESS: Server-Aided Encryption for Deduplicated Storage , 2013, USENIX Security Symposium.

[21]  Cong Wang,et al.  Toward Encrypted Cloud Media Center With Secure Deduplication , 2017, IEEE Transactions on Multimedia.

[22]  Jin Li,et al.  A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.

[23]  Yael Tauman Kalai,et al.  Improved Online/Offline Signature Schemes , 2001, CRYPTO.

[24]  Jan Camenisch,et al.  Efficient Group Signature Schemes for Large Groups (Extended Abstract) , 1997, CRYPTO.

[25]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[26]  Lu Li,et al.  Towards Preserving Worker Location Privacy in Spatial Crowdsourcing , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[27]  Shih-Hao Chang,et al.  Protecting Mobile Crowd Sensing against Sybil Attacks Using Cloud Based Trust Management System , 2016, Mob. Inf. Syst..

[28]  Jan Willemson,et al.  Privacy Protection for Wireless Medical Sensor Data , 2016, IEEE Transactions on Dependable and Secure Computing.

[29]  Minyi Guo,et al.  Mobile Crowdsensing in Software Defined Opportunistic Networks , 2017, IEEE Communications Magazine.

[30]  Yunhao Liu,et al.  Incentives for Mobile Crowd Sensing: A Survey , 2016, IEEE Communications Surveys & Tutorials.

[31]  Xiaohui Liang,et al.  Exploiting Social Network to Enhance Human-to-Human Infection Analysis without Privacy Leakage , 2018, IEEE Transactions on Dependable and Secure Computing.

[32]  Cyrus Shahabi,et al.  GeoCrowd: enabling query answering with spatial crowdsourcing , 2012, SIGSPATIAL/GIS.

[33]  Cong Wang,et al.  Enabling secure and effective near-duplicate detection over encrypted in-network storage , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[34]  Matthew Green,et al.  Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.

[35]  Xuemin Shen,et al.  Securing Fog Computing for Internet of Things Applications: Challenges and Solutions , 2018, IEEE Communications Surveys & Tutorials.

[36]  Xiao Lu,et al.  Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing with Differential Privacy , 2018, IEEE Transactions on Dependable and Secure Computing.

[37]  Kin K. Leung,et al.  Energy-Aware Participant Selection for Smartphone-Enabled Mobile Crowd Sensing , 2017, IEEE Systems Journal.

[38]  Jie Zhu,et al.  EEMC , 2015, ACM Trans. Intell. Syst. Technol..

[39]  Luis Rodero-Merino,et al.  Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing , 2014, CCRV.

[40]  Qinghua Li,et al.  Providing Privacy-Aware Incentives in Mobile Sensing Systems , 2016, IEEE Transactions on Mobile Computing.