Worker’s Privacy Protection in Mobile Crowdsourcing Platform
- 725 Downloads
The massive increase in smartphone devices capabilities have led to the development of mobile crowdsourcing applications (MCS). Many participants (individual workers) participates in performing different tasks, collecting data and sharing their work in a wide range of application areas. One of the most important issues in MCS applications is the privacy preservation for the participants, such as their identity and location. Most of the existing techniques and algorithms to protect the privacy of the participants focused on the identity or location as individual issues. However, in our research, we will implement an algorithm for protecting both the identity and location using RSA blind signature scheme to increase the privacy protection for the participants without using trusted third party. We demonstrated the efficiency of our approach to achieve the best performance in terms of reducing the communication overhead. Additionally, we approved our approach effectiveness in dealing with several attacks.
KeywordsPrivacy preservation Mobile crowdsourcing Worker identity Privacy
This scientific paper contains studies and research results supported by King Abdulaziz City for Science and Technology, grant No. 1-17-00-009-0029.
- 3.Wang, Y., Jia, X., Jin, Q., Ma, J.: Mobile crowdsourcing: architecture, applications, and challenges. In: 2015 IEEE 12th International Conference on Ubiquitous Intelligence and Computing and 2015 IEEE 12th International Conference on Autonomic and Trusted Computing and 2015 IEEE 15th International Conference on Scalable Computing and Communications and its Associated Workshops (UIC-ATC-ScalCom), pp. 1127–1132 (2015)Google Scholar
- 4.Kandappu, T., Sivaraman, V., Friedman, A., Boreli, R.: Loki: A privacy-conscious platform for crowdsourced surveys. In: 2014 Sixth International Conference on Communication Systems and Networks (COMSNETS), pp. 1–8 (2014)Google Scholar
- 7.Kuppuswamy, P., Al-Khalidi, S.Q.Y.: Secured blinding signature protocol based on linear block public key algorithm. Int. J. Comput. Appl. 61(14), 14–17 (2013)Google Scholar
- 11.Boutsis, I., Kalogeraki, V.: Location privacy for crowdsourcing applications. In: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, New York, NY, USA, pp. 694–705 (2016)Google Scholar
- 12.Ni, J., Zhang, K., Lin, X., Xia, Q., Shen, X.S.: Privacy-preserving mobile crowdsensing for located-based applications. In: 2017 IEEE International Conference on Communications (ICC), pp. 1–6 (2017)Google Scholar