Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

ETBP-TD: An Efficient and Trusted Bilateral Privacy-Preserving Truth Discovery Scheme for Mobile Crowdsensing

Published: 31 October 2024 Publication History

Abstract

Mobile Crowdsensing (MCS) has emerged as a promising sensing paradigm for accomplishing large-scale tasks by leveraging ubiquitously distributed mobile workers. Due to the variability in sensory data provided by different workers, identifying truth values from them has garnered wide attention. However, existing truth discovery schemes either offer limited privacy protection or incur high participation costs and lower data aggregation quality due to malicious workers. In this paper, we propose an Efficient and Trusted Bilateral Privacy-preserving Truth Discovery scheme (ETBP-TD) to obtain high-quality truth values while preventing privacy leakage from both workers and the data requester. Specifically, a matrix encryption-based protocol is introduced to the whole truth discovery process, which keeps locations and data related to tasks and workers secret from other entries. Additionally, trust-based worker recruitment and trust update mechanisms are first integrated within a privacy-preserving truth discovery scheme to enhance truth value accuracy and reduce unnecessary participation costs. Our theoretical analyses on the security and regret of ETBP-TD, along with extensive simulations on real-world datasets, demonstrate that ETBP-TD effectively preserves workers’ and tasks’ privacy while reducing the estimated error by up to 84.40% and participation cost by 54.72%.

References

[1]
H. Teng, Z. Li, K. Cao, S. Long, S. Guo, and A. Liu, “Game theoretical task offloading for profit maximization in mobile edge computing,” IEEE Trans. Mobile Comput., vol. 22, no. 9, pp. 5313–5329, Sep. 2023.
[2]
J. Bai et al., “A lowcost UAV task offloading scheme based on trustable and trackable data routing,” IEEE Trans. Intell. Veh., early access, Oct. 02, 2023.
[3]
M. Huang, A. Liu, N. N. Xiong, and J. Wu, “A UAV-assisted ubiquitous trust communication system in 5G and beyond networks,” IEEE J. Sel. Areas Commun., vol. 39, no. 11, pp. 3444–3458, Nov. 2021.
[4]
J. Bai, J. Gui, G. Huang, S. Zhang, and A. Liu, “UAV-supported intelligent truth discovery to achieve low-cost communications in mobile crowd sensing,” Digit. Commun. Netw., vol. 10, no. 4, pp. 837–852, 2024.
[5]
J. Tang et al., “BTV-CMAB: A bi-directional trust verification-based combinatorial multiarmed bandit scheme for mobile crowdsourcing,” IEEE Internet Things J., vol. 11, no. 2, pp. 1925–1938, Jan. 2024.
[6]
J. Tang et al., “Q-BLPP: A quality-enabled bilateral location privacy-preserving service construction scheme in mobile crowd sensing,” IEEE Trans. Services Comput., early access, Jul. 10, 2024.
[7]
R. Liang et al., “DTC-MDD: A spatiotemporal data acquisition technology for privacy-preserving in MCS,” Inf. Sci., vol. 658, 2024, Art. no.
[8]
G. Gao, J. Wu, M. Xiao, and G. Chen, “Combinatorial multi-armed bandit based unknown worker recruitment in heterogeneous crowdsensing,” in Proc. IEEE Conf. Comput. Commun., 2020, pp. 179–188.
[9]
C. Zhang, L. Zhu, C. Xu, and R. Lu, “PPDP: An efficient and privacy-preserving disease prediction scheme in cloud-based e-healthcare system,” Future Gener. Comput. Syst., vol. 79, pp. 16–25, 2018. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0167739X16304277
[10]
Y. Liu, M. Dong, K. Ota, and A. Liu, “Activetrust: Secure and trustable routing in wireless sensor networks,” IEEE Trans. Inf. Forensics Security, vol. 11, no. 9, pp. 2013–2027, Sep. 2016.
[11]
A. Xu et al., “QDRL: Queue-aware online DRL for computation offloading in industrial Internet of Things,” IEEE Internet Things J., vol. 11, no. 5, pp. 7772–7786, Mar. 2024.
[12]
R. Liu et al., “DRL-UTPS: DRL-based trajectory planning for unmanned aerial vehicles for data collection in dynamic IoT network,” IEEE Trans. Intell. Veh., vol. 8, no. 2, pp. 1204–1218, Feb. 2023.
[13]
Y. Zheng, G. Li, Y. Li, C. Shan, and R. Cheng, “Truth inference in crowdsourcing: Is the problem solved?,” in Proc. VLDB Endowment, vol. 10, no. 5, pp. 541–552, 2017.
[14]
C. Zhang, M. Zhao, L. Zhu, T. Wu, and X. Liu, “Enabling efficient and strong privacy-preserving truth discovery in mobile crowdsensing,” IEEE Trans. Inf. Forensics Security, vol. 17, pp. 3569–3581, 2022.
[15]
Y. Li et al., “Conflicts to harmony: A framework for resolving conflicts in heterogeneous data by truth discovery,” IEEE Trans. Knowl. Data Eng., vol. 28, no. 8, pp. 1986–1999, Aug. 2016.
[16]
Q. Li, Y. Li, J. Gao, B. Zhao, W. Fan, and J. Han, “Resolving conflicts in heterogeneous data by truth discovery and source reliability estimation,” in Proc. 2014 ACM SIGMOD Int. Conf. Manage. Data, 2014, pp. 1187–1198.
[17]
Z. Sun, A. Liu, N. N. Xiong, Q. He, and S. Zhang, “A trust and privacy-preserving intelligent Big Data collection scheme in mobile edge-cloud crowdsourcing,” Future Gener. Comput. Syst., vol. 157, pp. 145–163, 2024.
[18]
J. Bai, J. Gui, N. N. Xiong, A. Liu, and J. Wu, “L3P-DLI: A lightweight positioning-privacy protection scheme with double-layer incentives for wireless crowd sensing systems,” IEEE J. Sel. Areas Commun., vol. 42, no. 10, pp. 2938–2953, Oct. 2024.
[19]
P. Sun et al., “Towards personalized privacy-preserving incentive for truth discovery in mobile crowdsensing systems,” IEEE Trans. Mobile Comput., vol. 21, no. 1, pp. 352–365, Jan. 2022.
[20]
C. Miao et al., “Cloud-enabled privacy-preserving truth discovery in crowd sensing systems,” in Proc. 13th ACM Conf. Embedded Networked Sensor Syst., 2015, pp. 183–196.
[21]
C. Miao, L. Su, W. Jiang, Y. Li, and M. Tian, “A lightweight privacy-preserving truth discovery framework for mobile crowd sensing systems,” in Proc. IEEE Conf. Comput. Commun., 2017, pp. 1–9.
[22]
C. Zhang, L. Zhu, C. Xu, X. Liu, and K. Sharif, “Reliable and privacy-preserving truth discovery for mobile crowdsensing systems,” IEEE Trans. Dependable Secure Comput., vol. 18, no. 3, pp. 1245–1260, May/Jun. 2021.
[23]
Y. Zheng, H. Duan, and C. Wang, “Learning the truth privately and confidently: Encrypted confidence-aware truth discovery in mobile crowdsensing,” IEEE Trans. Inf. Forensics Security, vol. 13, no. 10, pp. 2475–2489, Dec. 2018.
[24]
X. Tang, C. Wang, X. Yuan, and Q. Wang, “Non-interactive privacy-preserving truth discovery in crowd sensing applications,” in Proc. IEEE Conf. Comput. Commun., 2018, pp. 1988–1996.
[25]
Y. Li et al., “Towards differentially private truth discovery for crowd sensing systems,” in Proc. IEEE 40th Int. Conf. Distrib. Comput. Syst., 2020, pp. 1156–1166.
[26]
G. Xu et al., Catch You if You Deceive Me: Verifiable and Privacy-Aware Truth Discovery in Crowdsensing Systems. New York, NY, USA: Association for Computing Machinery, 2020, pp. 178–192.
[27]
X. Pang, Z. Wang, D. Liu, J. C. S. Lui, Q. Wang, and J. Ren, “Towards personalized privacy-preserving truth discovery over crowdsourced data streams,” IEEE/ACM Trans. Netw., vol. 30, no. 1, pp. 327–340, Feb. 2022.
[28]
D. Wang, J. Ren, Z. Wang, X. Pang, Y. Zhang, and X. Shen, “Privacy-preserving streaming truth discovery in crowdsourcing with differential privacy,” IEEE Trans. Mobile Comput., vol. 21, no. 10, pp. 3757–3772, Oct. 2022.
[29]
Y. Cheng et al., “A privacy-preserving and reputation-based truth discovery framework in mobile crowdsensing,” IEEE Trans. Dependable Secure Comput., vol. 20, no. 6, pp. 5293–5311, Nov./Dec. 2023.
[30]
I. Damgård and M. Jurik, “A generalisation, a simplification and some applications of Paillier's probabilistic public-key system,” in Proc. 4th Int. Workshop Pract. Theory Public Key Cryptosystems, 2001, pp. 119–136.
[31]
X. Fu, A. Liu, N. N. Xiong, T. Wang, and S. Zhang, “ATWR-SMR: An area-constrained truthful-worker recruitment-based sensing map recovery scheme for sparse MCS in extreme-environment Internet of Things,” IEEE Internet Things J., vol. 11, no. 3, pp. 3711–3724, Feb. 2024.
[32]
J. Shu, X. Jia, K. Yang, and H. Wang, “Privacy-preserving task recommendation services for crowdsourcing,” IEEE Trans. Services Comput., vol. 14, no. 1, pp. 235–247, Jan./Feb. 2021.
[33]
E. L. Lawler, “Fast approximation algorithms for knapsack problems,” in Proc. 18th Annu. Symp. Foundations Comput. Sci., 1977, pp. 206–213.
[34]
J. Yuan et al., “T-drive: Driving directions based on taxi trajectories,” in Proc. 18th SIGSPATIAL Int. Conf. Adv. Geographic Inf. Syst., 2010, pp. 99–108.
[35]
B. C. Lab, “Parking places of beijing,” 2014. [Online]. Available: http://www.beijingcitylab.com.endplxcitation
[36]
L. Kong et al., “A6-year-long (2013–2018) high-resolution air quality reanalysis dataset in China based on the assimilation of surface observations from cnemc,” Earth Syst. Sci. Data, vol. 13, pp. 529–570, 2021.
[37]
Y. Xu, M. Xiao, J. Wu, S. Zhang, and G. Gao, “Incentive mechanism for spatial crowdsourcing with unknown social-aware workers: A three-stage stackelberg game approach,” IEEE Trans. Mobile Comput., vol. 22, no. 8, pp. 4698–4713, Aug. 2023.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE Transactions on Mobile Computing
IEEE Transactions on Mobile Computing  Volume 24, Issue 3
March 2025
1221 pages

Publisher

IEEE Educational Activities Department

United States

Publication History

Published: 31 October 2024

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 22 Feb 2025

Other Metrics

Citations

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media