Abstract
To provide privacy protection, security protocols for crowdsourcing-based systems typically encrypt data before uploading it to the server. However, current security protocols cannot provide protection for real identities, resulting in the location privacy issue. Moreover, current security protocols for crowdsourcing-based systems are mainly based on bilinear map, which is quite time-consuming. To address the above security and efficiency issues, we propose a novel security protocol with location privacy called SCRPM. Similar to protocols of this field, SCRPM can provide privacy protection for uploaded data. However, different from other well-known approaches, SCRPM uses pseudonyms instead of real identities, which can provide location privacy protection for cars. At the same time, to avoid using bilinear pairing, we introduce the algebraic signature technique to SCRPM and design novel signcryption algorithms, which is quite light weight. By doing so, SCRPM can provide location privacy protection for cars while still enjoying high efficiency. Experimental results show SCRPM is feasible for real world applications.
Similar content being viewed by others
References
Yi, C. W., Chuang, Y. T., & Nian, C. S. (2015). Toward crowdsourcing-based road pavement monitoring by mobile sensing technologies. IEEE Transactions on Intelligent Transportation Systems, 16(4), 1905–1917.
Yang, K., Zhang, K., Ren, J., & Shen, X. (2015). Security and privacy in mobile crowdsourcing networks: Challenges and opportunities. IEEE Communications Magazine, 53(8), 75–81.
Lu, R., Lin, X., & Shen, X. (2013). SPOC: A secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. IEEE Transactions on Parallel and Distributed Systems, 24(3), 614–624.
Yang, K., Jia, X., Ren, K., Zhang, B., & Xie, R. (2013). DAC-MACS: Effective data access control for multiauthority cloud storage systems. IEEE Transactions on Information Forensics and Security, 8(11), 1790–1801.
Christina, D., Reinhardtb, A., Kanherec, S. S., & Hollicka, M. (2011). A survey on privacy in mobile participatory sensing applications. The Journal of Systems and Software, 84(11), 19281946.
Wang, Y., Cai, Z., Yin, G., Gao, Y., Tong, X., & Guanying, W. (2016). An incentive mechanism with privacy protection in mobile crowdsourcing systems. Computer Networks, 102, 157–171.
Figuerola Salas, O., Adzic, V.,, Kalva, H., & Shah, A. (2013, October). Assessing internet video quality using crowdsourcing. In Proceedings of the 2nd ACM international workshop on crowdsourcing for multimedia, Barcelona (pp. 23–28).
Goyal, V., Pandey, O., Sahai, A., Omkant, & Waters, B. (2006, November). Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM conference on Computer and communications security, Alexandria, USA (pp. 89–98).
Nandan, N., Pursche, A., & Zhe, X. (2014, July). Challenges in crowdsourcing real-time information for public transportation. In 2014 IEEE 15th international conference on mobile data management (pp. 67–72).
Motta, G., You, L., Sacco, D., & Ma, T. (2014, April). City Feed: A crowdsourcing system for city governance. In 2014 IEEE 8th International Symposium on Service Oriented System Engineering (pp. 439–445).
Zhou, H., Chen, J., Fan, J., Yuan, D., & Das, S. K. (2013). ConSub: Incentive-based content subscribing in selsh opportunistic mobile networks. IEEE Journal on Selected Areas in Communications/Supplement, 31(9), 669–679.
Tamilin, A., Carreras, I., Ssebaggala, E., Opira, A., & Conci, N. (2012, September). Context-aware mobile crowdsourcing. In Proceedings of the 2012 ACM conference on ubiquitous computing, Pittsburgh (pp. 717–720).
Parshotam, K. (2013, October). Crowd computing: A literature review and definition. In Proceedings of the South African Institute for Computer Scientists and Information Technologists conference, East London, South Africa (pp. 121–130).
Do, N., Hsu, C.-H., & Venkatasubramanian, N. (2012, December). CrowdMAC: A crowdsourcing system for mobile access. In Proceedings of the 13th international middleware conference, Ontreal, Quebec, Canada (pp. 1–20).
Aubry, E., Silverston, T., Lahmadi, A., & Festor, O. (2014, May). CrowdOut: A mobile crowdsourcing service for road safety in digital cities. In The first international workshop on crowdsensing methods, techniques, and applications (pp. 86–91).
Yan, T., Hoh, B., Ganesan, D., Tracton, K., Iwuchukwu, T., & Lee, J.-S. (2011). CrowdPark: A Crowdsourcing-based parking reservation system for mobile phones, pp. 1–14. University of Massachusetts at Amherst Technical Report.
Shi, J., Guan, Z., Qiao, C., Melodia, T., Koutsonikolas, D., & Challen, G. (2014, October ). Crowdsourcing access network spectrum allocation using smartphones. In Proceedings of the 13th ACM workshop on hot topics in networks, Los Angeles, USA (pp. 1–7).
Vukovic, M. (2009). Crowdsourcing for enterprises. In 2009 congress on services-I (pp. 686–692). IEEE.
Chatzimilioudis, G., & Zeinalipour-Yazti, D. (2013). Crowdsourcing for mobile data management. In 2013 IEEE 14th international conference on mobile data management (Vol. 2, pp. 3–4). IEEE.
Chen, X., Santos-Neto, E., & Ripeanu, M. (2012). Crowdsourcing for on-street smart parking. In Proceedings of the second ACM International Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications (pp. 1–8). ACM.
Yang, D., Xue, G., Fang, X., et al. (2012). Crowdsourcing to smartphones: Incentive mechanism design for mobile phone sensing. In Proceedings of the 18th annual international conference on mobile computing and networking (pp. 173–184). ACM.
Chatzimilioudis, G., Konstantinidis, A., Laoudias, C., et al. (2012). Crowdsourcing with smartphones. IEEE Internet Computing, 16(5), 36–44.
Kim, K. H., Nam, H., & Singh, V. et al. (2014). DYSWIS: Crowdsourcing a home network diagnosis. In 2014 23rd international conference on computer communication and networks (ICCCN). IEEE (pp. 1–10).
Teo, C. L. V. (2012). Hyrax: Crowdsourcing mobile devices to develop proximity-based mobile clouds. Pittsburgh, PA: Carnegie Mellon University.
Alt, F., Shirazi, A. S., & Schmidt, A. et al. (2010). Location-based crowdsourcing: extending crowdsourcing to the real world. In Proceedings of the 6th Nordic conference on human–computer interaction: Extending boundaries (pp. 13–22). ACM.
Boutsis, I., & Kalogeraki, V. (2014). On task assignment for real-time reliable crowdsourcing. In 2014 IEEE 34th international conference on distributed computing systems (ICDCS) (pp. 1–10). IEEE.
Faggiani, A., Gregori, E., Lenzini, L., et al. (2014). Smartphone-based crowdsourcing for network monitoring: Opportunities, challenges, and a case study. IEEE Communications Magazine, 52(1), 106–113.
Ganti, R. K., et al. (2011). Mobile crowdsensing: Current state and future challenges. IEEE Communications Magazine, 49(11), 3239.
Schwarz, T. J. E., & Miller, E. L. (2006). Store, forget, and check: using algebraic signatures to check remotely administered storage. In Proceedings of the ICDCS (Vol. 6, pp. 12).
Openssl.org, openssl-1.0.1e.tar.gz Feb 2013. [Online]. http://www.openssl.org/source/.
Ben Lynn, PBC Library Manual 0.5.11.2006. [Online]. http://crypto.stanford.edu/pbc/manual/.
Cheng, B., Zhai, Z., Zhao, S., et al. (2017). LSMP: A lightweight service mashup platform for ordinary users. IEEE Communications Magazine, 55(4), 116–123.
Cheng, B., Wang, M., Zhao, S., et al. (2017). Situation-aware dynamic service coordination in an IoT environment. IEEE/ACM Transactions on Networking, 25(4), 2082–2095.
Acknowledgements
This paper is supported by the NSFC (Nos. 71402070, 61101088), the NSF of jiangsu province (No. BK20161099), and the Opening Project of Key Lab of Information Network Security of Ministry of Public Security (No. C16604).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wan, C., Zhang, J. SCRPM: securing crowdsourcing-based road pavement monitoring system with location privacy. Wireless Netw 26, 1139–1149 (2020). https://doi.org/10.1007/s11276-018-1858-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-018-1858-1