Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Crowdsourcing Mechanism for Trust Evaluation in CPCS Based on Intelligent Mobile Edge Computing

Published: 24 October 2019 Publication History
  • Get Citation Alerts
  • Abstract

    Both academia and industry have directed tremendous interest toward the combination of Cyber Physical Systems and Cloud Computing, which enables a new breed of applications and services. However, due to the relative long distance between remote cloud and end nodes, Cloud Computing cannot provide effective and direct management for end nodes, which leads to security vulnerabilities. In this article, we first propose a novel trust evaluation mechanism using crowdsourcing and Intelligent Mobile Edge Computing. The mobile edge users with relatively strong computation and storage ability are exploited to provide direct management for end nodes. Through close access to end nodes, mobile edge users can obtain various information of the end nodes and determine whether the node is trustworthy. Then, two incentive mechanisms, i.e., Trustworthy Incentive and Quality-Aware Trustworthy Incentive Mechanisms, are proposed for motivating mobile edge users to conduct trust evaluation. The first one aims to motivate edge users to upload their real information about their capability and costs. The purpose of the second one is to motivate edge users to make trustworthy effort to conduct tasks and report results. Detailed theoretical analysis demonstrates the validity of Quality-Aware Trustworthy Incentive Mechanism from data trustfulness, effort trustfulness, and quality trustfulness, respectively. Extensive experiments are carried out to validate the proposed trust evaluation and incentive mechanisms. The results corroborate that the proposed mechanisms can efficiently stimulate mobile edge users to perform evaluation task and improve the accuracy of trust evaluation.

    References

    [1]
    Venkat Balakrishnan, Vijay Varadharajan, and Uday Tupakula. 2008. Subjective logic based trust model for mobile ad hoc networks. In Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks. ACM, 30:1--30:11.
    [2]
    Md Zakirul Alam Bhuiyan, Guojun Wang, Jie Wu, Jiannong Cao, Xuefeng Liu, and Tian Wang. 2017. Dependable structural health monitoring using wireless sensor networks. IEEE Trans. Depend. Sec. Comput. 14, 4 (2017), 363--376.
    [3]
    Wenwen Gong, Lianyong Qi, and Yanwei Xu. 2018. Privacy-aware multidimensional mobile service quality prediction and recommendation in distributed fog environment. Wirel. Commun. Mobile Comput. (2018).
    [4]
    Xiaowen Gong and Ness Shroff. 2018. Incentivizing truthful data quality for quality-aware mobile data crowdsourcing. In Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing. ACM, 161--170.
    [5]
    Zhitao Guan, Jing Li, Longfei Wu, Yue Zhang, Jun Wu, and Xiaojiang Du. 2017. Achieving efficient and secure data acquisition for cloud-supported internet of things in smart grid. IEEE Int. Things J. 4, 6 (2017), 1934--1944.
    [6]
    An He, Kyung Kyoon Bae, Timothy R. Newman, Joseph Gaeddert, Kyouwoong Kim, Rekha Menon, Lizdabel Morales-Tirado, Youping Zhao, Jeffrey H. Reed, William H. Tranter, et al. 2010. A survey of artificial intelligence for cognitive radios. IEEE Trans. Vehic. Technol. 59, 4 (2010), 1578--1592.
    [7]
    Hao Hu, Rongxing Lu, Zonghua Zhang, and Jun Shao. 2017. REPLACE: A reliable trust-based platoon service recommendation scheme in VANET. IEEE Trans. Vehic. Technol. 66, 2 (2017), 1786--1797.
    [8]
    Baixiang Huang, Wei Liu, Tian Wang, Xiong Li, Houbing Song, and Anfeng Liu. 2019. Deployment optimization of data centers in vehicular networks. IEEE Access 7 (2019), 20644--20663.
    [9]
    Mingfeng Huang, Anfeng Liu, Neal N. Xiong, Tian Wang, and Athanasios V. Vasilakos. 2018. A low-latency communication scheme for mobile wireless sensor control systems. IEEE Trans. Syst., Man, Cyber.: Syst.99 (2018), 1--16.
    [10]
    Mingfeng Huang, Wei Liu, Tian Wang, Houbing Song, Xiong Li, and Anfeng Liu. 2019. A queuing delay utilization scheme for on-path service aggregation in services-oriented computing networks. IEEE Access 7 (2019), 23816--23833.
    [11]
    Jinfang Jiang, Guangjie Han, Feng Wang, Lei Shu, and Mohsen Guizani. 2015. An efficient distributed trust model for wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 26, 5 (2015), 1228--1237.
    [12]
    Haiming Jin, Lu Su, Houping Xiao, and Klara Nahrstedt. 2016. Inception: Incentivizing privacy-preserving data aggregation for mobile crowd sensing systems. In Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing. ACM, 341--350.
    [13]
    Jin Li, Wei Liu, Tian Wang, Houbing Song, Xiong Li, Fang Liu, and Anfeng Liu. 2019. Battery-friendly relay selection scheme for prolonging the lifetimes of sensor nodes in the Internet of Things. IEEE Access 7 (2019), 33180--33201.
    [14]
    Ting Li, Kaoru Ota, Tian Wang, Xiong Li, Zhiping Cai, and Anfeng Liu. 2019. Optimizing the coverage via the UAVs with lower costs for information-centric Internet of Things. IEEE Access 7 (2019), 15292--15309.
    [15]
    Qin Liu, Yuhong Guo, Jie Wu, and Guojun Wang. 2017. Effective query grouping strategy in clouds. J. Comput. Sci. Technol. 32, 6 (2017), 1231--1249.
    [16]
    Qin Liu, Guojun Wang, Feng Li, Shuhui Yang, and Jie Wu. 2017. Preserving privacy with probabilistic indistinguishability in weighted social networks. IEEE Trans. Parallel Distrib. Syst. 28, 5 (2017), 1417--1429.
    [17]
    Yang Liu and Yiling Chen. 2017. Sequential peer prediction: Learning to elicit effort using posted prices. In Proceedings of the 31st AAAI Conference on Artificial Intelligence. Retrieved from: https://www.aaai.org/ocs/index.php/AAAI/AAAI17/paper/view/14970/13819.
    [18]
    Yang Liu, Wei Quan, Tian Wang, and Yu Wang. 2018. Delay-constrained utility maximization for video ads push in mobile opportunistic D2D networks. IEEE Int. Things J. 5, 5 (2018), 4088--4099.
    [19]
    Lianyong Qi, Peiqiang Dai, Jiguo Yu, Zhili Zhou, and Yanwei Xu. 2017. “Time--Location--Frequency”--aware Internet of things service selection based on historical records. Int. J. Distrib. Sens. Netw. 13, 1 (2017), 1--9.
    [20]
    Lianyong Qi, Wanchun Dou, and Jinjun Chen. 2016. Weighted principal component analysis-based service selection method for multimedia services in cloud. Computing 98, 1--2 (2016), 195--214.
    [21]
    Lianyong Qi, Wanchun Dou, Wenping Wang, Guangshun Li, Hairong Yu, and Shaohua Wan. 2018. Dynamic mobile crowdsourcing selection for electricity load forecasting. IEEE Access 6 (2018), 46926--46937.
    [22]
    Lianyong Qi, Xuyun Zhang, Wanchun Dou, Chunhua Hu, Chi Yang, and Jinjun Chen. 2018. A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment. Fut. Gen. Comput. Syst. 88 (2018), 636--643.
    [23]
    Lianyong Qi, Xuyun Zhang, Wanchun Dou, and Qiang Ni. 2017. A distributed locality-sensitive hashing-based approach for cloud service recommendation from multi-source data. IEEE J. Select. Areas Commun. 35, 11 (2017), 2616--2624.
    [24]
    Yingying Ren, Wei Liu, Tian Wang, Xiong Li, Neal N. Xiong, and Anfeng Liu. 2019. A collaboration platform for effective task and data reporter selection in crowdsourcing network. IEEE Access 7 (2019), 19238--19257.
    [25]
    Jiawei Tan, Wei Liu, Tian Wang, Neal N. Xiong, Houbing Song, Anfeng Liu, and Zhiwen Zeng. 2019. An adaptive collection scheme-based matrix completion for data gathering in energy-harvesting wireless sensor networks. IEEE Access 7 (2019), 6703--6723.
    [26]
    Haojun Teng, Wei Liu, Tian Wang, Anfeng Liu, Xuxun Liu, and Shaobo Zhang. 2019. A cost-efficient greedy code dissemination scheme through vehicle to sensing devices (V2SD) communication in smart city. IEEE Access 7 (2019), 16675--16694.
    [27]
    Tian Wang, Md Zakirul Alam Bhuiyan, Guojun Wang, Md Arafatur Rahman, Jie Wu, and Jiannong Cao. 2018. Big data reduction for a smart city’s critical infrastructural health monitoring. IEEE Commun. Mag. 56, 3 (2018), 128--133.
    [28]
    Tian Wang, Yang Li, Weiwei Fang, Wenzheng Xu, Junbin Liang, Yewang Chen, and Xuxun Liu. 2018. A comprehensive trustworthy data collection approach in sensor-cloud system. IEEE Trans. Big Data (2018).
    [29]
    Tian Wang, Yang Li, Guojun Wang, Jiannong Cao, Md Zakirul Alam Bhuiyan, and Weijia Jia. 2019. Sustainable and efficient data collection from WSNs to cloud. IEEE Trans. Sustain. Comput. 4, 2 (2019), 252--262.
    [30]
    Tian Wang, Yuzhu Liang, Weijia Jia, Muhammad Arif, Anfeng Liu, and Mande Xie. 2019. Coupling resource management based on fog computing in smart city systems. J. Netw. Comput. Appl. 135 (2019), 11--19.
    [31]
    Tian Wang, Zhen Peng, Sheng Wen, Yongxuan Lai, Weijia Jia, Yiqiao Cai, Hui Tian, and Yonghong Chen. 2017. Reliable wireless connections for fast-moving rail users based on a chained fog structure. Inf. Sci. 379 (2017), 160--176.
    [32]
    Tian Wang, Jiandian Zeng, Yongxuan Lai, Yiqiao Cai, Hui Tian, Yonghong Chen, and Baowei Wang. 2017. Data collection from WSNs to the cloud based on mobile Fog elements. Fut. Gen. Comput. Syst. (2017).
    [33]
    Tian Wang, Guangxue Zhang, Md Zakirul Alam Bhuiyan, Anfeng Liu, Weijia Jia, and Mande Xie. 2018. A novel trust mechanism based on fog computing in sensor-cloud system. Fut. Gen. Comput. Syst. (2018).
    [34]
    Tian Wang, Guangxue Zhang, Anfeng Liu, Md Zakirul Alam Bhuiyan, and Qun Jin. 2019. A secure IoT service architecture with an efficient balance dynamics based on cloud and edge computing. IEEE Int. Things J. 6, 3 (2019), 4831--4843.
    [35]
    Tian Wang, Jiyuan Zhou, Anfeng Liu, Md Zakirul Alam Bhuiyan, Guojun Wang, and Weijia Jia. 2019. Fog-based computing and storage offloading for data synchronization in IoT. IEEE Int. Things J. 6, 3 (2019), 4272--4282.
    [36]
    Guangxue Zhang, Tian Wang, Guojun Wang, Anfeng Liu, and Weijia Jia. 2018. Detection of hidden data attacks combined fog computing, and trust evaluation method in sensor-cloud system. Concur. Comput.: Pract. Exper. (2018).
    [37]
    Zhihua Zhang, Hongliang Zhu, Shoushan Luo, Yang Xin, and Xiaoming Liu. 2017. Intrusion detection based on state context and hierarchical trust in wireless sensor networks. IEEE Access 5 (2017), 12088--12102.
    [38]
    Chao Zhu, Giancarlo Pastor, Yu Xiao, and Antti Ylajaaski. 2018. Vehicular fog computing for video crowdsourcing: Applications, feasibility, and challenges. IEEE Commun. Mag. 56, 10 (2018), 58--63.

    Cited By

    View all
    • (2024)A Novel Spatiotemporal Periodic Polynomial Model for Predicting Road Traffic SpeedSymmetry10.3390/sym1605053716:5(537)Online publication date: 30-Apr-2024
    • (2024)Route Planning under Mobility Restrictions in the Palestinian TerritoriesSustainability10.3390/su1602066016:2(660)Online publication date: 11-Jan-2024
    • (2024)Urban Origin–Destination Travel Time Estimation Using K-Nearest-Neighbor-Based MethodsMathematics10.3390/math1208125512:8(1255)Online publication date: 20-Apr-2024
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Intelligent Systems and Technology
    ACM Transactions on Intelligent Systems and Technology  Volume 10, Issue 6
    Special Section on Intelligent Edge Computing for Cyber Physical and Cloud Systems and Regular Papers
    November 2019
    267 pages
    ISSN:2157-6904
    EISSN:2157-6912
    DOI:10.1145/3368406
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 24 October 2019
    Accepted: 01 April 2019
    Revised: 01 March 2019
    Received: 01 December 2018
    Published in TIST Volume 10, Issue 6

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Crowdsourcing
    2. artificial intelligence
    3. mobile edge computing
    4. trust evaluation

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Funding Sources

    • Fujian Provincial Outstanding Youth Scientific Research Personnel Training Program
    • National Natural Science Foundation of China (NSFC)
    • Scientific Research of Huaqiao University, China
    • Social Science Foundation of Fujian Province of China
    • Natural Science Foundation of Fujian Province of China

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)62
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 09 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A Novel Spatiotemporal Periodic Polynomial Model for Predicting Road Traffic SpeedSymmetry10.3390/sym1605053716:5(537)Online publication date: 30-Apr-2024
    • (2024)Route Planning under Mobility Restrictions in the Palestinian TerritoriesSustainability10.3390/su1602066016:2(660)Online publication date: 11-Jan-2024
    • (2024)Urban Origin–Destination Travel Time Estimation Using K-Nearest-Neighbor-Based MethodsMathematics10.3390/math1208125512:8(1255)Online publication date: 20-Apr-2024
    • (2024)Predicting Bus Travel Time in Cheonan City Through Deep Learning Utilizing Digital Tachograph DataElectronics10.3390/electronics1309177113:9(1771)Online publication date: 3-May-2024
    • (2024)A Distributed Scheme for the Taxi Cruising Route Recommendation Problem Using a Graph Neural NetworkElectronics10.3390/electronics1303057413:3(574)Online publication date: 31-Jan-2024
    • (2024)Performance Assessment of ChatGPT versus Bard in Detecting Alzheimer’s DementiaDiagnostics10.3390/diagnostics1408081714:8(817)Online publication date: 15-Apr-2024
    • (2024)SqliGPT: Evaluating and Utilizing Large Language Models for Automated SQL Injection Black-Box DetectionApplied Sciences10.3390/app1416692914:16(6929)Online publication date: 7-Aug-2024
    • (2024)Data-Quality Aware Incentive Mechanism Based on Stackelberg Game in Mobile Edge ComputingIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences10.1587/transfun.2023EAP1022E107.A:6(873-880)Online publication date: 1-Jun-2024
    • (2024)Learning a global underwater geolocalization model with sectoral transformerOptics Express10.1364/OE.51519232:12(20706)Online publication date: 21-May-2024
    • (2024)Congestion-aware Spatio-Temporal Graph Convolutional Network Based A* Search Algorithm for Fastest Route SearchACM Transactions on Knowledge Discovery from Data10.1145/3657640Online publication date: 11-Apr-2024
    • Show More Cited By

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media