Skip to main content
Log in

An anonymous data reporting strategy with ensuring incentives for mobile crowd-sensing

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

To address the challenges of privacy preserving and incentive mechanisms, the paper proposes a system and a strategy to ensure anonymous data reporting while ensuring incentives simultaneously. The envisioned system model consists of four main entities: service provider, data collector, credit authority and participants, which interact through a specific protocol. The proposed protocol is arranged in five stages that mainly leverage three concepts: (1) slot reservation based on shuffle, (2) data submission based on bulk transfer and multi-player dc-nets, and (3) incentive mechanism based on blind signature. Slot reservation aims to establish a submission schedule by anonymously assigning a slot in a vector to each member in a group of participants. The assigned slot is distributed in a fashion where every member and system entities are oblivious of other members’ slots. Similarly, bulk transfer (data submission) allows group members to transmit encoded data to service provider within their reserved slots in an encoded vector. Service provider then combines members’ vectors to get the data without ability to link any data to a specific member and thus, reporting anonymity is preserved. Finally, blind signature ensures the incentive mechanism via anonymous micro-payments transferred by the help of the Credit authority. Theoretical analysis of the protocol is conducted, proving the integrity, anonymity and efficiency of the protocol. We implemented and tested the protocol on Android phones. Experimental results shows that the protocol is efficient for high latency application which is the case for most of crowd-sensing applications. The results shows also the advantage of our optimization over similar anonymous data reporting protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  • Bettini C, Riboni D (2015) Privacy protection in pervasive systems: state of the art and technical challenges. Perv Mob Comput 17(B):159–174

    Article  Google Scholar 

  • Brickell J, Shmatikov V (2006) Efficient anonymity-preserving data collection. In: The 12th ACM SIGKDD international conference on knowledge discovery and data Mining, Philadelphia, USA, pp 76–85

  • Christin D (2015) Privacy in mobile participatory sensing: current trends and future challenges. J Syst Softw 116:57–68

    Article  Google Scholar 

  • Christin D, Guillemet J, Reinhardt A, Hollick M, Kanhere S (2011a) Privacy-preserving collaborative path hiding for participatory sensing applications. In: IEEE eighth international conference on mobile ad-hoc and sensor systems, pp 341–350

  • Christin D, Reinhardt A, Kanhere S, Hollick M (2011b) A survey on privacy in mobile participatory sensing applications. J Syst Softw 84:1928–1946

    Article  Google Scholar 

  • Christin D, Bub D, Moerov A, Kasem-Madani S (2015) A distributed privacy-preserving mechanism for mobile urban sensing applications. In: IEEE tenth international conference on intelligent sensors, sensor networks and information processing IEEE, pp 1–6

  • Cornelius C, Kapadia A, Kotz, Peebles D, Shin M, Triandopoulos N (2008) Anonysense: privacy-aware people-centric sensing. In: The 6th international conference on mobile systems, applications, and services, pp 211–224

  • Corrigangibbs H, Ford B (2010) Accountable anonymous group messaging. In: The 17th ACM conference on computer and communications security, pp 340–350

  • Corrigangibbs H, Wolinsky DI, Ford B (2013) Proactively accountable anonymous messaging in verdict.In: The 22nd USENIX conference on security, Washington DC, USA, pp 147–162

  • Cristofaro E, Soriente C (2013) Extended capabilities for a privacy-enhanced participatory sensing infrastructure (pepsi). IEEE Trans Inf Forensics Secur 8(12):2021–2033

    Article  Google Scholar 

  • Das D, Mohan P, Padmanabhan V, Ramjee R, Sharma A (2010) Prism: platform for remote sensing using smartphones. In: The 8th international conference on mobile systems, applications, and services, pp 63–76

  • Gisdakis S, Giannetsos T, Papadimitratos P (2014) Sppear: security and privacy-preserving architecture for participatory-sensing applications. In: The 2014 ACM conference on security and privacy in wireless and mobile networks, pp 39–50

  • Goldwasser S, Micali S (1982) Probabilistic encryption how to play mental poker keeping secret all partial information. The fourteenth annual ACM symposium on theory of computing, pp 365–377

  • Huang Z, Du W, Chen B (2002) Deriving private information from randomized data. In: The 2005 ACM SIGMOD international conference on management of data, Baltimore, Maryland, pp 37–48

  • Laurie B (2006) Lucre: anonymous electronic tokens. http://citeseerx.ist.psu.edu/viewdoc/download;jsessionid=90F5A5D1F07340A314BB493534C50866?doi=10.1.1.112.7291&rep=rep1&type=pdf

  • Li Q, Cao G (2013) Providing privacy-aware incentives for mobile sensing. IEEE international conference on pervasive computing and communications, San Diego, CA, USA, pp 76–84

  • Li Q, Cao G (2014) Providing efficient privacy-aware incentives for mobile sensing. IEEE Int Conf Distrib Comput Syst 15(6):208–217

    Google Scholar 

  • Meeker M (2012) 2012 internet trends. Tech. rep, KPCB

  • Qiu F, Wu F, Chen G (2013) Slicer: a slicing-based k-anonymous privacy preserving scheme for participatory sensing. IEEE 10th international conference on mobile ad-hoc and sensor systems, vol 33, pp 113–121

  • Shokri R, Theodorakopoulos G, Papadimitratos P, Kazemi E, Hubaux J (2014) Hiding in the mobile crowd: locationprivacy through collaboration. IEEE Trans Dependable Secure Comput 11:266–279

    Article  Google Scholar 

  • Son J, Kim D, Hussainy R, Tokuta A, Kwon SS, Seo JT (2015) Privacy aware incentive mechanism to collect mobile data while preventing duplication. In: Military communications conference, Milcom 2015, Tampa, FL, USA, pp 1242–1247

  • Stofega W, Llamas R (2012) Worldwide smartphone 2012–2016 forecast and analysis. Tech. rep., IDC Corporate USA, Tech. Rep

  • Wang X, Reeves D (2015) Traceback and anonymity. Springer Publishing Company, Incorporated

    Book  Google Scholar 

  • Wolinsky D, Corrigangibbs H, Ford B, Johnson A (2012) Dissent in numbers: Making strong anonymity scale. In: The 10th USENIX conference on operating systems design and implementation, pp 179–192

  • Yao Y, Yang L, Xiong N (2015) Anonymity-based privacy-preserving data reporting for participatory sensing. IEEE Internet Things J 2(5):381–390

    Article  Google Scholar 

  • Zhang F, He L, He W, Liu X (2012) Data perturbation with state-dependent noise for participatory sensing. IEEE INFOCOM, 2012, Orlando, Florida, USA, pp 2246–2254

  • Zhao X, Li L, Xue G, Silva G (2012) Efficient anonymous message submission. IEEE INFOCOM, 2012, Orlando, Florida, USA, pp 228–2236

Download references

Acknowledgements

This research was supported by Harbin Scientific and Technological Achievement Transformation Project under Grant No. 2014DB1AG022, The Youth Foundation of Heilongjiang Province of China under Grant No. QC2016083, and The Fundamental Research Funds for the Central Universities under Grant No. HEUCF160612.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yunlong Zhao.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, Y., Zhao, Y., Ishak, S. et al. An anonymous data reporting strategy with ensuring incentives for mobile crowd-sensing. J Ambient Intell Human Comput 9, 2093–2107 (2018). https://doi.org/10.1007/s12652-017-0529-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-017-0529-x

Keywords

Navigation