Abstract
Most privacy-preserving approaches for mobile crowd sensing systems consider the privacy of single-modal data, while the data that sensing equipment may be sensing is frequently multimodal. Therefore, this paper proposes a multimodal data privacy protection and completeness verification method for mobile crowd sensing. Firstly, a cross-attention mechanism is utilized to fusion multimodal data to facilitate access to data information across various modes, improving the accuracy and reliability of data encryption. Secondly, a scalable superincreasing sequence is applied to store the multimodal data gathered by each sensing user, and the multimodal data is encrypted using an upgraded Paillier algorithm to prevent malicious attackers from obtaining the data information. Then, each ciphertext provides a validator using the Boneh-Lynn-Shacham signature algorithm. The sensing platform can apply a verification code to validate the completeness of the aggregated ciphertext data to ensure that the encrypted multimodal data has not been changed before being decrypted. Finally, experimental results demonstrate that the method proposed in this article not only effectively protects the privacy of multimodal data but also minimizes Communication costs and computational overhead.















Similar content being viewed by others
Data availability
The datasets generated during the current study are available from the corresponding author on reasonable request.
References
Wang Y, Yan Z, Feng W et al (2020) Privacy protection in mobile crowd sensing: a survey. World Wide Web 23(1):421–452
Liu J, Cao H, Li Q et al (2018) A large-scale concurrent data anonymous batch verification scheme for mobile healthcare crowd sensing. IEEE Internet Things J 6(2):1321–1330
Abdelrahman A, El-Wakeel AS, Noureldin A et al (2020) Crowdsensing-based personalized dynamic route planning for smart vehicles. IEEE Network 34(3):216–223
Cecilia JM, Cano JC, Hernández-Orallo E et al (2020) Mobile crowdsensing approaches to address the COVID-19 pandemic in Spain. IET Smart Cities 2(2):58–63
Khorshidi S, Carter J, Mohler G et al (2021) Explaining crime diversity with google street view. J Quant Criminol 37:361–391
Gupta S, Tanwar S, Gupta N (2022) A systematic review on internet of things (IoT): applications & challenges. In: Proceedings of the 10th international conference on reliability, infocom technologies and optimization (Trends and Future Directions) (ICRITO). IEEE, Noida, India, pp 1–7
Sciancalepore S, Alhazbi S, Di Pietro R (2021) Receivers location privacy in avionic crowdsourced networks: issues and countermeasures. J Netw Comput Appl 174(1):102892.1-102892.17
Lirong M, Xiaoli G, Xiaoqiong Z (2022) Research on password-based data security protection system. Inf Secur Commun Secrecy 346(09):48–56
Wang Z, Qin J, Xiang X et al (2023) A privacy-preserving cross-media retrieval on encrypted data in cloud computing. J Inf Secur Appl 73:103440
Wang D, Wang Q, An Y et al (2020) Online collective matrix factorization hashing for large-scale cross-media retrieval. In: Proceedings of the 43rd international ACM SIGIR conference on research and development in information retrieval (SIGIR’20). Association for Computing Machinery, New York, NY, USA, pp 1409–1418
Peng Y, Huang X, Zhao Y (2017) An overview of cross-media retrieval: concepts, methodologies, benchmarks, and challenges. IEEE Trans Circuits Syst Video Technol 28(9):2372–2385
Song Y, Soleymani M (2019) Polysemous visual-semantic embedding for cross-modal retrieval. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition (CVPR). IEEE Computer Society, Long Beach, CA, USA, pp 1979–1988
Qian Y, Ma Y, Chen J et al (2021) Optimal location privacy preserving and service quality guaranteed task allocation in vehicle-based crowdsensing networks. IEEE Trans Intell Transp Syst 22(7):4367–4375
Nkenyereye L, Islam SMR, Bilal M et al (2021) Secure crowd-sensing protocol for fog-based vehicular cloud. Futur Gener Comput Syst 120:61–75
Xiao M, Gao G, Wu J et al (2020) Privacy-preserving user recruitment protocol for mobile crowdsensing. IEEE/ACM Trans Networking 28(2):519–532
Arulprakash M, Jebakumar R (2021) People-centric collective intelligence: decentralized and enhanced privacy mobile crowd sensing based on blockchain. J Supercomput 77(11):1–27
Liu T, Wang Y, Cai Z et al (2020) A dynamic privacy protection mechanism for spatiotemporal crowdsourcing. Secur Commun Netw 2020:1–13
Zhang S, Li X, Tan Z et al (2019) A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services. Futur Gener Comput Syst 94:40–50
Liu T, Yan G, Cai G et al (2020) User personalized location k anonymity privacy protection scheme with controllable service quality. In: Proceedings of the machine learning for cyber security (ML4CS). Guangzhou, China. SpringerInternational Publishing, pp 484–499
Zhang S, Hu B, Liang W et al (2023) A caching-based dual k-anonymous location privacy-preserving scheme for edge computing. IEEE Internet Things J 10(11):9768–9781
Zhang Q, Wang T, Tao Y et al (2024) Location privacy protection method based on differential privacy in crowdsensing task allocation. Ad Hoc Netw 158:103464
Zhang J, Yang F, Ma Z et al (2020) A decentralized location privacy-preserving spatial crowdsourcing for Internet of vehicles. IEEE Trans Intell Transp Syst 22(4):2299–2313
Zou S, Xi J, Xu G et al (2021) CrowdHB: A decentralized location privacy-preserving crowdsensing system based on a hybrid blockchain network. IEEE Internet Things J 9(16):14803–14817
Wang L, Zhang D, Yang D et al (2020) Sparse mobile crowdsensing with differential and distortion location privacy. IEEE Trans Inf Forensics Secur 15:2735–2749
Li S, Zhang G (2020) A differentially private data aggregation method based on worker partition and location obfuscation for mobile crowdsensing. Comput Mater Continua 63(1):223–241
Zhang C, Zhao M, Zhu L et al (2022) Enabling efficient and strong privacy-preserving truth discovery in mobile crowdsensing. IEEE Trans Inf Forensics Secur 17:3569–3581
Zheng Y, Lu R, Yang X et al (2019) Achieving efficient and privacy-preserving top-k query over vertically distributed data sources. In: Proceedings of the 2019 IEEE international conference on communications (ICC). IEEE, Shanghai, China, pp 1–6
Xiong P, Li G, Liu H et al (2023) Decentralized privacy-preserving truth discovery for crowd sensing. Inf Sci 632:730–741
Liu Y, Liu F, Wu HT et al (2022) RPTD: Reliability-enhanced Privacy-preserving Truth Discovery for Mobile Crowdsensing. J Netw Comput Appl 207:68–78
Li Y, Xiao H, Qin Z et al (2020) Towards differentially private truth discovery for crowd sensing systems. In: Proceedings of the IEEE 40th international conference on distributed computing systems (ICDCS). IEEE, Singapore, Singapore, pp 1156–1166
Lin Y, Mao Y, Zhang Y et al (2022) Secure deduplication schemes for content delivery in mobile edge computing. Comput Secur 114:102602
Anderson P, He X, Buehler C et al (2018) Bottom-up and top-down attention for image captioning and visual question answering. In: Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR). IEEE Computer Society, Salt Lake City, UT, USA, pp 6077–6086
Devlin J, Chang M W, Lee K et al (2019) Bert: pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 4171–4186.
Vaswani A, Shazeer N, Parmar N et al (2017) Attention is all you need. Advances in neural information processing systems, p 30
Fang W, Zamani M, Chen Z (2021) Secure and privacy preserving consensus for second-order systems based on paillier encryption[J]. Syst Control Lett 148:104869
Li S, Xue K, Yang Q et al (2017) PPMA: privacy-preserving multisubset data aggregation in smart grid[J]. IEEE Trans Industr Inf 14(2):462–471
Rasiwasia N, Costa Pereira J, Coviello E et al (2010) A new approach to cross-modal multimedia retrieval.In: Proceedings of the 18th ACM international conference on multimedia (MM’10). Association for Computing Machinery, New York, NY, USA, pp 251–260
Wang B, Yang Y, Xu X et al (2017) Adversarial cross-modal retrieval. In: Proceedings of the 25th ACM international conference on multimedia (MM’17). Association for Computing Machinery, New York, NY, USA, pp 154–162
Rupnik J, Shawe-Taylor J (2010) Multi-view canonical correlation analysis. In: Proceedings of the conference on data mining and data warehouses (SiKDD 2010). Slovenian KDD Conference on Data Mining and Data Warehouses, Ljubljana, Slovenia, pp 1–4
Andrew G, Arora R, Bilmes J et al (2013) Deep canonical correlation analysis. In: Proceedings of the 30th international conference on machine learning (ICML). Atlanta, GA, USA. PMLR, pp 1247–1255
Lu R, Liang X, Li X et al (2012) EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications[J]. IEEE Trans Parallel Distrib Syst 23(9):1621–1631
Guan Z, Zhang Y, Wu L et al (2019) APPA: an anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT[J]. J Netw Comput Appl 125(1):82–92
Zhang J, Zhao Y, Wu J et al (2020) LVPDA: a lightweight and verifiable privacy-preserving data aggregation scheme for edge-enabled IoT[J]. IEEE Internet Things J 7(5):4016–4027
Trivedi HS, Patel SJ (2023) Homomorphic cryptosystem-based secure data processing model for edge-assisted IoT healthcare systems[J]. Internet of Things 22:100693
Wang H, Wang Z, Domingo-Ferrer J (2018) Anonymous and secure aggregation scheme in fog-based public cloud computing[J]. Futur Gener Comput Syst 78:712–719
Acknowledgements
All the authors listed have approved the manuscript that is enclosed.
Funding
This present research work was supported by the National Natural Science Foundation of China (61403109, 61202458), the Specialized Research Fund for the Doctoral Program of Higher Education of China (20112303120007) and the Heilongjiang Natural Science Foundation (LH2020F034).
Author information
Authors and Affiliations
Contributions
Jian Wang, Fanfan Meng, Jia Liu, Guanzhi He and Guosheng Zhao wrote and revised the manuscript together.
Corresponding authors
Ethics declarations
Ethical approval and consent to participate
I would like to declare on behalf of my co-authors that the work described was original research that has not been published previously, and not under consideration for publication elsewhere, in whole or in part.
Human and animal ethics
Not applicable.
Consent for publication
We would like to submit the manuscript entitled “Multimodal Data Privacy Protection and Completeness Verification Method for Mobile Crowd Sensing”, which we wish to be considered for publication in “Peer-to-Peer Networking and Applications”.
Competing interests
The authors declare no competing interests.
Additional information
Publisher's note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Wang, J., Meng, F., Liu, J. et al. Multimodal data privacy protection and completeness verification method for mobile crowd sensing. Peer-to-Peer Netw. Appl. 18, 39 (2025). https://doi.org/10.1007/s12083-024-01850-4
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s12083-024-01850-4