Abstract
With the increasingly popularity of user-centric mobile sensing and computing devices, e.g., smart phones, in-vehicle sensing devices and wearable devices, our knowledge of the physical world is extended by opening a new door to collect and process data about social events and natural phenomena [1, 2]. This alternative has triggered the emergence of mobile crowdsensing (MCS) services [3]. In MCS, individuals cooperatively sense data for the tasks released by customers and extract information to measure and map phenomena of common interests using their mobile devices [4].
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
J. Liu, H. Shen, H. S. Narman, W. Chung, and Z. Lin, “A survey of mobile crowdsensing techniques: A critical component for the internet of things,” ACM Transactions on Cyber-Physical Systems, vol. 2, no. 3, p. 18, 2018.
A. Kamilaris and A. Pitsillides, “Mobile phone computing and the internet of things: A survey,” IEEE Internet of Things Journal, vol. 3, no. 6, pp. 885–898, 2016.
R. K. Ganti, F. Ye, and H. Lei, “Mobile crowdsensing: current state and future challenges,” IEEE Communications Magazine, vol. 49, no. 11, pp. 32–39, 2011.
Q. Xu, Z. Su, B. Han, D. Fang, Z. Xu, and X. Gan, “Analytical model with a novel selfishness division of mobile nodes to participate cooperation,” Peer-to-Peer Networking and Applications, vol. 9, no. 4, pp. 712–720, 2016.
K. Yang, K. Zhang, J. Ren, and X. Shen, “Security and privacy in mobile crowdsourcing networks: challenges and opportunities,” IEEE communications magazine, vol. 53, no. 8, pp. 75–81, 2015.
I. Krontiris, M. Langheinrich, and K. Shilton, “Trust and privacy in mobile experience sharing: future challenges and avenues for research,” IEEE Communications Magazine, vol. 52, no. 8, pp. 50–55, 2014.
J. Ni, K. Zhang, X. Lin, Q. Xia, and X. Shen, “Privacy-preserving mobile crowdsensing for located-based applications,” in Proc. of ICC, 2017, pp. 1–6.
J. Ni, “Security and privacy preservation in mobile crowdsensing,” 2018.
S. Gisdakis, T. Giannetsos, and P. Papadimitratos, “Security, privacy, and incentive provision for mobile crowd sensing systems,” IEEE Internet of Things Journal, vol. 3, no. 5, pp. 839–853, 2016.
A. Alamer, J. Ni, X. Lin, and X. Shen, “Location privacy-aware task recommendation for spatial crowdsourcing,” in Proc. of WCSP, 2017, pp. 1–6.
C. Cornelius, A. Kapadia, D. Kotz, D. Peebles, M. Shin, and N. Triandopoulos, “Anonysense: privacy-aware people-centric sensing,” in Proc. of Mobisys, 2008, pp. 211–224.
P. Gilbert, L. P. Cox, J. Jung, and D. Wetherall, “Toward trustworthy mobile sensing,” in Proc. of HotMobile, 2010, pp. 31–36.
F. Qiu, F. Wu, and G. Chen, “Privacy and quality preserving multimedia data aggregation for participatory sensing systems,” IEEE Transactions on Mobile Computing, vol. 14, no. 6, pp. 1287–1300, 2015.
K. Wang, X. Qi, L. Shu, D.-j. Deng, and J. J. Rodrigues, “Toward trustworthy crowdsourcing in the social internet of things,” IEEE Wireless Communications, vol. 23, no. 5, pp. 30–36, 2016.
J. Ren, Y. Zhang, K. Zhang, and X. Shen, “Sacrm: Social aware crowdsourcing with reputation management in mobile sensing,” Computer Communications, vol. 65, pp. 55–65, 2015.
J. Ni, X. Lin, K. Zhang, and Y. Yu, “Secure and deduplicated spatial crowdsourcing: A fog-based approach,” in Proc. of Globecom, 2016, pp. 1–6.
L. Pournajaf, L. Xiong, V. Sunderam, and S. Goryczka, “Spatial task assignment for crowd sensing with cloaked locations,” in Proc. of MDM, vol. 1, 2014, pp. 73–82.
J. Ni, K. Zhang, X. Lin, and X. Shen, “Securing fog computing for internet of things applications: Challenges and solutions,” IEEE Communications Surveys & Tutorials, vol. 20, no. 1, pp. 601–628, 2017.
J. Ni, K. Zhang, Q. Xia, X. Lin, and X. Shen, “Enabling strong privacy preservation and accurate task allocation for mobile crowdsensing,” arXiv preprint arXiv:1806.04057, 2018.
G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxy re-encryption schemes with applications to secure distributed storage,” ACM Transactions on Information and System Security (TISSEC), vol. 9, no. 1, pp. 1–30, 2006.
M. H. Au, W. Susilo, and Y. Mu, “Constant-size dynamic k-taa,” in Proc. of SCN, 2006, pp. 111–125.
D. Cash, E. Kiltz, and V. Shoup, “The twin diffie-hellman problem and applications,” in Proc. of Eurocrypt, 2008, pp. 127–145.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Lin, X., Ni, J., Shen, X.(. (2018). Location Privacy Protection in Mobile Crowdsensing. In: Privacy-Enhancing Fog Computing and Its Applications. SpringerBriefs in Electrical and Computer Engineering. Springer, Cham. https://doi.org/10.1007/978-3-030-02113-9_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-02113-9_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-02112-2
Online ISBN: 978-3-030-02113-9
eBook Packages: Computer ScienceComputer Science (R0)