Advertisement

SALT cryptography for privacy in mobile crowdsourcing

  • Shailja JoshiEmail author
  • Hemraj Saini
  • Geetanjali Rathee
Original Research
  • 14 Downloads

Abstract

Smart phones have advanced at a very fast pace in recent years. These advancement leads to the concern of exploitation of users’ personal information due to non-restricted usage of data by any third party applications. Mobile crowdsourcing has evolved as an appropriate method for collecting the data or finding solution of a broadcasted task where the mobile phone users can perform the task anytime and anywhere as they wish. However, sensitive information like location, contact details etc. are provided by mobile users for validation which may results in the privacy breach as the data could be misused. There have been many researches to find some tools for ensuring privacy of the mobile phone users. However, the appropriateness of these tools may not be identified by the users which require additional protection of the data to maintain the confidentiality. The motive of this research is to provide secure environment for the users or workers of crowd sourcing by protecting their personal and sensitive information. Therefore, SALT cryptography is used in proposed solution for ensuring the privacy. SALT is used as a noise with the user’s personal information so that only the valid users will be able to access the information. The obtained results are in well support of the proposed solution.

Keywords

Mobile crowd sourcing Privacy issue SALT and noise 

References

  1. 1.
    Mao K, Capra L, Harman M, Jia Y (2017) A survey of the use of crowd sourcing in software engineering. J Syst Softw 126:57–84CrossRefGoogle Scholar
  2. 2.
    Mavandadi S, Dimitrov S, Feng S, Yu F, Sikora U, Yaglidere O, Padmanabhan S, Nielson K, Ozcan A (2012) Distributed medical image analysis and diagnosis through crowd-sourced games: a malaria case study. PLoS One 7(5):e37245CrossRefGoogle Scholar
  3. 3.
    Wang Y, Jia X, Jin Q, Ma J (2015) Mobile crowd sourcing: architecture, applications, and challenges. In: Proceedings of UIC-ATC-ScalCom-CBDCom-IoP, IEEE, pp 1127–1132Google Scholar
  4. 4.
    Sharma N, Rathi R, Jain V, Saifi MW (2012) A novel technique for secure information transmission in videos using salt cryptography. In: Engineering (NUiCONE), 2012 Nirma University international conference on IEEE, pp 1–6Google Scholar
  5. 5.
    Churi PP, Ghate V, Ghag K (2015) Jumbling-salting: an improvised approach for password encryption. In: Science and technology (TICST), 2015 international conference on IEEE, pp 236–242Google Scholar
  6. 6.
    Gong Y, Guo Y, Fang Y (2014) A privacy-preserving task recommendation framework for mobile crowd sourcing. In: Global communications conference (GLOBECOM), 2014 IEEE, pp 588–593Google Scholar
  7. 7.
    Gong Y, Wei L, Guo Y, Zhang C, Fang Y (2016) Optimal task recommendation for mobile crowd sourcing with privacy control. IEEE Internet Things J 3(5):745–756CrossRefGoogle Scholar
  8. 8.
    Liu R, Cao J, Yang L, Zhang K (2015) Priwe: recommendation for privacy settings of mobile apps based on crowd sourced users' expectations. In: mobile services (MS), 2015 IEEE international conference on IEEE, pp 150–157.Google Scholar
  9. 9.
    Tseng CM, Chau CK (2016) On the privacy of crowd-sourced data collection for distance-to-empty prediction and eco-routing. In: Proceedings of the workshop on electric vehicle systems, data, and applications ACM, pp 1–3Google Scholar
  10. 10.
    Wang Y, Cai Z, Yin G, Gao Y, Tong X, Wu G (2016) An incentive mechanism with privacy protection in mobile crowdsourcing systems. Comput Netw 102:157–171CrossRefGoogle Scholar
  11. 11.
    Zhang B, Liu CH, Lu J, Song Z, Ren Z, Ma J, Wang W (2016) Privacy-preserving QoI-aware participant coordination for mobile crowdsourcing. Comput Netw 101:29–41CrossRefGoogle Scholar
  12. 12.
    Kandappu T, Misra A, Cheng SF, Lau HC (2017) Privacy in context-aware mobile crowd sourcing systems. In: Pervasive computing and communications workshops (PerCom workshops), 2017 IEEE international conference on IEEE, pp 231–236Google Scholar
  13. 13.
    Ziegeldorf JH, Henze M, Bavendiek J, Wehrle K (2017) TraceMixer: privacy-preserving crowd-sensing sans trusted third party. In: Wireless on-demand network systems and services (WONS), 2017 13th annual conference on IEEE, pp 17–24Google Scholar
  14. 14.
    Zhang LL, Liang CJM, Li ZL, Liu Y, Zhao F, Chen E (2018) Characterizing privacy risks of mobile apps with sensitivity analysis. IEEE Trans Mob Comput 17(2):279–292CrossRefGoogle Scholar
  15. 15.
    Myers AC, Liskov B (2000) Protecting privacy using the decentralized label model. ACM Trans Softw Eng Methodol (TOSEM) 9(4):410–442CrossRefGoogle Scholar
  16. 16.
    Enck W, Gilbert P, Han S, Tendulkar V, Chun BG, Cox LP, Jung J, McDaniel P, Sheth AN (2014) TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans Comput Syst (TOCS) 32(2):5CrossRefGoogle Scholar
  17. 17.
    Beresford AR, Rice A, Skehin N, Sohan R (2011) Mockdroid: trading privacy for application functionality on smartphones. In: Proceedings of the 12th workshop on mobile computing systems and applications ACM. https://doi.org/10.1145/2184489.2184500
  18. 18.
    Agarwal Y, Hall M (2013) ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing. In: Proceeding of the 11th annual international conference on mobile systems, applications, and services ACM, pp 97–110Google Scholar
  19. 19.
    Lin J, Amini S, Hong JI, Sadeh N, Lindqvist J, Zhang J (2012) Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing. In: Proceedings of the 2012 ACM conference on ubiquitous computing ACM, pp 501–510Google Scholar
  20. 20.
    Chen X, Wu X, Li XY, He Y, Liu Y (2014) Privacy-preserving high-quality map generation with participatory sensing. In: INFOCOM, 2014 Proceedings IEEE, pp 2310–2318Google Scholar
  21. 21.
    Yao Y, Yang LT, Xiong NN (2015) Anonymity-based privacy-preserving data reporting for participatory sensing. IEEE Internet Things J 2(5):381–390CrossRefGoogle Scholar
  22. 22.
    Gisdakis S, Giannetsos T, Papadimitratos P (2016) Security, privacy, and incentive provision for mobile crowd sensing systems. IEEE Internet Things J 3(5):839–853CrossRefGoogle Scholar

Copyright information

© Bharati Vidyapeeth's Institute of Computer Applications and Management 2019

Authors and Affiliations

  • Shailja Joshi
    • 1
    Email author
  • Hemraj Saini
    • 1
  • Geetanjali Rathee
    • 1
  1. 1.Department of Computer Science and EngineeringJaypee University of Information TechnologySolanIndia

Personalised recommendations