Skip to main content

Advertisement

Log in

Multimodal data privacy protection and completeness verification method for mobile crowd sensing

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Most privacy-preserving approaches for mobile crowd sensing systems consider the privacy of single-modal data, while the data that sensing equipment may be sensing is frequently multimodal. Therefore, this paper proposes a multimodal data privacy protection and completeness verification method for mobile crowd sensing. Firstly, a cross-attention mechanism is utilized to fusion multimodal data to facilitate access to data information across various modes, improving the accuracy and reliability of data encryption. Secondly, a scalable superincreasing sequence is applied to store the multimodal data gathered by each sensing user, and the multimodal data is encrypted using an upgraded Paillier algorithm to prevent malicious attackers from obtaining the data information. Then, each ciphertext provides a validator using the Boneh-Lynn-Shacham signature algorithm. The sensing platform can apply a verification code to validate the completeness of the aggregated ciphertext data to ensure that the encrypted multimodal data has not been changed before being decrypted. Finally, experimental results demonstrate that the method proposed in this article not only effectively protects the privacy of multimodal data but also minimizes Communication costs and computational overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Algorithm 1
Algorithm 2
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Data availability

The datasets generated during the current study are available from the corresponding author on reasonable request.

References

  1. Wang Y, Yan Z, Feng W et al (2020) Privacy protection in mobile crowd sensing: a survey. World Wide Web 23(1):421–452

    Article  MATH  Google Scholar 

  2. Liu J, Cao H, Li Q et al (2018) A large-scale concurrent data anonymous batch verification scheme for mobile healthcare crowd sensing. IEEE Internet Things J 6(2):1321–1330

    Article  MATH  Google Scholar 

  3. Abdelrahman A, El-Wakeel AS, Noureldin A et al (2020) Crowdsensing-based personalized dynamic route planning for smart vehicles. IEEE Network 34(3):216–223

    Article  MATH  Google Scholar 

  4. Cecilia JM, Cano JC, Hernández-Orallo E et al (2020) Mobile crowdsensing approaches to address the COVID-19 pandemic in Spain. IET Smart Cities 2(2):58–63

    Article  MATH  Google Scholar 

  5. Khorshidi S, Carter J, Mohler G et al (2021) Explaining crime diversity with google street view. J Quant Criminol 37:361–391

    Article  MATH  Google Scholar 

  6. Gupta S, Tanwar S, Gupta N (2022) A systematic review on internet of things (IoT): applications & challenges. In: Proceedings of the 10th international conference on reliability, infocom technologies and optimization (Trends and Future Directions) (ICRITO). IEEE, Noida, India, pp 1–7

  7. Sciancalepore S, Alhazbi S, Di Pietro R (2021) Receivers location privacy in avionic crowdsourced networks: issues and countermeasures. J Netw Comput Appl 174(1):102892.1-102892.17

    Google Scholar 

  8. Lirong M, Xiaoli G, Xiaoqiong Z (2022) Research on password-based data security protection system. Inf Secur Commun Secrecy 346(09):48–56

    MATH  Google Scholar 

  9. Wang Z, Qin J, Xiang X et al (2023) A privacy-preserving cross-media retrieval on encrypted data in cloud computing. J Inf Secur Appl 73:103440

    MATH  Google Scholar 

  10. Wang D, Wang Q, An Y et al (2020) Online collective matrix factorization hashing for large-scale cross-media retrieval. In: Proceedings of the 43rd international ACM SIGIR conference on research and development in information retrieval (SIGIR’20). Association for Computing Machinery, New York, NY, USA, pp 1409–1418

  11. Peng Y, Huang X, Zhao Y (2017) An overview of cross-media retrieval: concepts, methodologies, benchmarks, and challenges. IEEE Trans Circuits Syst Video Technol 28(9):2372–2385

    Article  MATH  Google Scholar 

  12. Song Y, Soleymani M (2019) Polysemous visual-semantic embedding for cross-modal retrieval. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition (CVPR). IEEE Computer Society, Long Beach, CA, USA, pp 1979–1988

  13. Qian Y, Ma Y, Chen J et al (2021) Optimal location privacy preserving and service quality guaranteed task allocation in vehicle-based crowdsensing networks. IEEE Trans Intell Transp Syst 22(7):4367–4375

    Article  MATH  Google Scholar 

  14. Nkenyereye L, Islam SMR, Bilal M et al (2021) Secure crowd-sensing protocol for fog-based vehicular cloud. Futur Gener Comput Syst 120:61–75

    Article  Google Scholar 

  15. Xiao M, Gao G, Wu J et al (2020) Privacy-preserving user recruitment protocol for mobile crowdsensing. IEEE/ACM Trans Networking 28(2):519–532

    Article  MATH  Google Scholar 

  16. Arulprakash M, Jebakumar R (2021) People-centric collective intelligence: decentralized and enhanced privacy mobile crowd sensing based on blockchain. J Supercomput 77(11):1–27

    Article  MATH  Google Scholar 

  17. Liu T, Wang Y, Cai Z et al (2020) A dynamic privacy protection mechanism for spatiotemporal crowdsourcing. Secur Commun Netw 2020:1–13

    Article  MATH  Google Scholar 

  18. Zhang S, Li X, Tan Z et al (2019) A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services. Futur Gener Comput Syst 94:40–50

    Article  MATH  Google Scholar 

  19. Liu T, Yan G, Cai G et al (2020) User personalized location k anonymity privacy protection scheme with controllable service quality. In: Proceedings of the machine learning for cyber security (ML4CS). Guangzhou, China. SpringerInternational Publishing, pp 484–499

  20. Zhang S, Hu B, Liang W et al (2023) A caching-based dual k-anonymous location privacy-preserving scheme for edge computing. IEEE Internet Things J 10(11):9768–9781

  21. Zhang Q, Wang T, Tao Y et al (2024) Location privacy protection method based on differential privacy in crowdsensing task allocation. Ad Hoc Netw 158:103464

    Article  MATH  Google Scholar 

  22. Zhang J, Yang F, Ma Z et al (2020) A decentralized location privacy-preserving spatial crowdsourcing for Internet of vehicles. IEEE Trans Intell Transp Syst 22(4):2299–2313

    Article  MATH  Google Scholar 

  23. Zou S, Xi J, Xu G et al (2021) CrowdHB: A decentralized location privacy-preserving crowdsensing system based on a hybrid blockchain network. IEEE Internet Things J 9(16):14803–14817

    Article  MATH  Google Scholar 

  24. Wang L, Zhang D, Yang D et al (2020) Sparse mobile crowdsensing with differential and distortion location privacy. IEEE Trans Inf Forensics Secur 15:2735–2749

    Article  MATH  Google Scholar 

  25. Li S, Zhang G (2020) A differentially private data aggregation method based on worker partition and location obfuscation for mobile crowdsensing. Comput Mater Continua 63(1):223–241

    Article  MATH  Google Scholar 

  26. Zhang C, Zhao M, Zhu L et al (2022) Enabling efficient and strong privacy-preserving truth discovery in mobile crowdsensing. IEEE Trans Inf Forensics Secur 17:3569–3581

    Article  MATH  Google Scholar 

  27. Zheng Y, Lu R, Yang X et al (2019) Achieving efficient and privacy-preserving top-k query over vertically distributed data sources. In: Proceedings of the 2019 IEEE international conference on communications (ICC). IEEE, Shanghai, China, pp 1–6

  28. Xiong P, Li G, Liu H et al (2023) Decentralized privacy-preserving truth discovery for crowd sensing. Inf Sci 632:730–741

    Article  MATH  Google Scholar 

  29. Liu Y, Liu F, Wu HT et al (2022) RPTD: Reliability-enhanced Privacy-preserving Truth Discovery for Mobile Crowdsensing. J Netw Comput Appl 207:68–78

    Article  MATH  Google Scholar 

  30. Li Y, Xiao H, Qin Z et al (2020) Towards differentially private truth discovery for crowd sensing systems. In: Proceedings of the IEEE 40th international conference on distributed computing systems (ICDCS). IEEE, Singapore, Singapore, pp 1156–1166

  31. Lin Y, Mao Y, Zhang Y et al (2022) Secure deduplication schemes for content delivery in mobile edge computing. Comput Secur 114:102602

    Article  MATH  Google Scholar 

  32. Anderson P, He X, Buehler C et al (2018) Bottom-up and top-down attention for image captioning and visual question answering. In: Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR). IEEE Computer Society, Salt Lake City, UT, USA, pp 6077–6086

  33. Devlin J, Chang M W, Lee K et al (2019) Bert: pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 4171–4186.

  34. Vaswani A, Shazeer N, Parmar N et al (2017) Attention is all you need. Advances in neural information processing systems, p 30

  35. Fang W, Zamani M, Chen Z (2021) Secure and privacy preserving consensus for second-order systems based on paillier encryption[J]. Syst Control Lett 148:104869

    Article  MathSciNet  MATH  Google Scholar 

  36. Li S, Xue K, Yang Q et al (2017) PPMA: privacy-preserving multisubset data aggregation in smart grid[J]. IEEE Trans Industr Inf 14(2):462–471

    Article  MATH  Google Scholar 

  37. Rasiwasia N, Costa Pereira J, Coviello E et al (2010) A new approach to cross-modal multimedia retrieval.In: Proceedings of the 18th ACM international conference on multimedia (MM’10). Association for Computing Machinery, New York, NY, USA, pp 251–260

  38. Wang B, Yang Y, Xu X et al (2017) Adversarial cross-modal retrieval. In: Proceedings of the 25th ACM international conference on multimedia (MM’17). Association for Computing Machinery, New York, NY, USA, pp 154–162

  39. Rupnik J, Shawe-Taylor J (2010) Multi-view canonical correlation analysis. In: Proceedings of the conference on data mining and data warehouses (SiKDD 2010). Slovenian KDD Conference on Data Mining and Data Warehouses, Ljubljana, Slovenia, pp 1–4

  40. Andrew G, Arora R, Bilmes J et al (2013) Deep canonical correlation analysis. In: Proceedings of the 30th international conference on machine learning (ICML). Atlanta, GA, USA. PMLR, pp 1247–1255

  41. Lu R, Liang X, Li X et al (2012) EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications[J]. IEEE Trans Parallel Distrib Syst 23(9):1621–1631

    Article  MATH  Google Scholar 

  42. Guan Z, Zhang Y, Wu L et al (2019) APPA: an anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT[J]. J Netw Comput Appl 125(1):82–92

    Article  MATH  Google Scholar 

  43. Zhang J, Zhao Y, Wu J et al (2020) LVPDA: a lightweight and verifiable privacy-preserving data aggregation scheme for edge-enabled IoT[J]. IEEE Internet Things J 7(5):4016–4027

    Article  MATH  Google Scholar 

  44. Trivedi HS, Patel SJ (2023) Homomorphic cryptosystem-based secure data processing model for edge-assisted IoT healthcare systems[J]. Internet of Things 22:100693

    Article  Google Scholar 

  45. Wang H, Wang Z, Domingo-Ferrer J (2018) Anonymous and secure aggregation scheme in fog-based public cloud computing[J]. Futur Gener Comput Syst 78:712–719

    Article  MATH  Google Scholar 

Download references

Acknowledgements

All the authors listed have approved the manuscript that is enclosed.

Funding

This present research work was supported by the National Natural Science Foundation of China (61403109, 61202458), the Specialized Research Fund for the Doctoral Program of Higher Education of China (20112303120007) and the Heilongjiang Natural Science Foundation (LH2020F034).

Author information

Authors and Affiliations

Authors

Contributions

Jian Wang, Fanfan Meng, Jia Liu, Guanzhi He and Guosheng Zhao wrote and revised the manuscript together.

Corresponding authors

Correspondence to Jian Wang or Guanzhi He.

Ethics declarations

Ethical approval and consent to participate

I would like to declare on behalf of my co-authors that the work described was original research that has not been published previously, and not under consideration for publication elsewhere, in whole or in part.

Human and animal ethics

Not applicable.

Consent for publication

We would like to submit the manuscript entitled “Multimodal Data Privacy Protection and Completeness Verification Method for Mobile Crowd Sensing”, which we wish to be considered for publication in “Peer-to-Peer Networking and Applications”.

Competing interests

The authors declare no competing interests.

Additional information

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, J., Meng, F., Liu, J. et al. Multimodal data privacy protection and completeness verification method for mobile crowd sensing. Peer-to-Peer Netw. Appl. 18, 39 (2025). https://doi.org/10.1007/s12083-024-01850-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12083-024-01850-4

Keyword