Skip to main content
Log in

SCRPM: securing crowdsourcing-based road pavement monitoring system with location privacy

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

To provide privacy protection, security protocols for crowdsourcing-based systems typically encrypt data before uploading it to the server. However, current security protocols cannot provide protection for real identities, resulting in the location privacy issue. Moreover, current security protocols for crowdsourcing-based systems are mainly based on bilinear map, which is quite time-consuming. To address the above security and efficiency issues, we propose a novel security protocol with location privacy called SCRPM. Similar to protocols of this field, SCRPM can provide privacy protection for uploaded data. However, different from other well-known approaches, SCRPM uses pseudonyms instead of real identities, which can provide location privacy protection for cars. At the same time, to avoid using bilinear pairing, we introduce the algebraic signature technique to SCRPM and design novel signcryption algorithms, which is quite light weight. By doing so, SCRPM can provide location privacy protection for cars while still enjoying high efficiency. Experimental results show SCRPM is feasible for real world applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Yi, C. W., Chuang, Y. T., & Nian, C. S. (2015). Toward crowdsourcing-based road pavement monitoring by mobile sensing technologies. IEEE Transactions on Intelligent Transportation Systems, 16(4), 1905–1917.

    Article  Google Scholar 

  2. Yang, K., Zhang, K., Ren, J., & Shen, X. (2015). Security and privacy in mobile crowdsourcing networks: Challenges and opportunities. IEEE Communications Magazine, 53(8), 75–81.

    Article  Google Scholar 

  3. Lu, R., Lin, X., & Shen, X. (2013). SPOC: A secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. IEEE Transactions on Parallel and Distributed Systems, 24(3), 614–624.

    Article  Google Scholar 

  4. Yang, K., Jia, X., Ren, K., Zhang, B., & Xie, R. (2013). DAC-MACS: Effective data access control for multiauthority cloud storage systems. IEEE Transactions on Information Forensics and Security, 8(11), 1790–1801.

    Article  Google Scholar 

  5. Christina, D., Reinhardtb, A., Kanherec, S. S., & Hollicka, M. (2011). A survey on privacy in mobile participatory sensing applications. The Journal of Systems and Software, 84(11), 19281946.

    Google Scholar 

  6. Wang, Y., Cai, Z., Yin, G., Gao, Y., Tong, X., & Guanying, W. (2016). An incentive mechanism with privacy protection in mobile crowdsourcing systems. Computer Networks, 102, 157–171.

    Article  Google Scholar 

  7. Figuerola Salas, O., Adzic, V.,, Kalva, H., & Shah, A. (2013, October). Assessing internet video quality using crowdsourcing. In Proceedings of the 2nd ACM international workshop on crowdsourcing for multimedia, Barcelona (pp. 23–28).

  8. Goyal, V., Pandey, O., Sahai, A., Omkant, & Waters, B. (2006, November). Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM conference on Computer and communications security, Alexandria, USA (pp. 89–98).

  9. Nandan, N., Pursche, A., & Zhe, X. (2014, July). Challenges in crowdsourcing real-time information for public transportation. In 2014 IEEE 15th international conference on mobile data management (pp. 67–72).

  10. Motta, G., You, L., Sacco, D., & Ma, T. (2014, April). City Feed: A crowdsourcing system for city governance. In 2014 IEEE 8th International Symposium on Service Oriented System Engineering (pp. 439–445).

  11. Zhou, H., Chen, J., Fan, J., Yuan, D., & Das, S. K. (2013). ConSub: Incentive-based content subscribing in selsh opportunistic mobile networks. IEEE Journal on Selected Areas in Communications/Supplement, 31(9), 669–679.

    Article  Google Scholar 

  12. Tamilin, A., Carreras, I., Ssebaggala, E., Opira, A., & Conci, N. (2012, September). Context-aware mobile crowdsourcing. In Proceedings of the 2012 ACM conference on ubiquitous computing, Pittsburgh (pp. 717–720).

  13. Parshotam, K. (2013, October). Crowd computing: A literature review and definition. In Proceedings of the South African Institute for Computer Scientists and Information Technologists conference, East London, South Africa (pp. 121–130).

  14. Do, N., Hsu, C.-H., & Venkatasubramanian, N. (2012, December). CrowdMAC: A crowdsourcing system for mobile access. In Proceedings of the 13th international middleware conference, Ontreal, Quebec, Canada (pp. 1–20).

  15. Aubry, E., Silverston, T., Lahmadi, A., & Festor, O. (2014, May). CrowdOut: A mobile crowdsourcing service for road safety in digital cities. In The first international workshop on crowdsensing methods, techniques, and applications (pp. 86–91).

  16. Yan, T., Hoh, B., Ganesan, D., Tracton, K., Iwuchukwu, T., & Lee, J.-S. (2011). CrowdPark: A Crowdsourcing-based parking reservation system for mobile phones, pp. 1–14. University of Massachusetts at Amherst Technical Report.

  17. Shi, J., Guan, Z., Qiao, C., Melodia, T., Koutsonikolas, D., & Challen, G. (2014, October ). Crowdsourcing access network spectrum allocation using smartphones. In Proceedings of the 13th ACM workshop on hot topics in networks, Los Angeles, USA (pp. 1–7).

  18. Vukovic, M. (2009). Crowdsourcing for enterprises. In 2009 congress on services-I (pp. 686–692). IEEE.

  19. Chatzimilioudis, G., & Zeinalipour-Yazti, D. (2013). Crowdsourcing for mobile data management. In 2013 IEEE 14th international conference on mobile data management (Vol. 2, pp. 3–4). IEEE.

  20. Chen, X., Santos-Neto, E., & Ripeanu, M. (2012). Crowdsourcing for on-street smart parking. In Proceedings of the second ACM International Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications (pp. 1–8). ACM.

  21. Yang, D., Xue, G., Fang, X., et al. (2012). Crowdsourcing to smartphones: Incentive mechanism design for mobile phone sensing. In Proceedings of the 18th annual international conference on mobile computing and networking (pp. 173–184). ACM.

  22. Chatzimilioudis, G., Konstantinidis, A., Laoudias, C., et al. (2012). Crowdsourcing with smartphones. IEEE Internet Computing, 16(5), 36–44.

    Article  Google Scholar 

  23. Kim, K. H., Nam, H., & Singh, V. et al. (2014). DYSWIS: Crowdsourcing a home network diagnosis. In 2014 23rd international conference on computer communication and networks (ICCCN). IEEE (pp. 1–10).

  24. Teo, C. L. V. (2012). Hyrax: Crowdsourcing mobile devices to develop proximity-based mobile clouds. Pittsburgh, PA: Carnegie Mellon University.

    Google Scholar 

  25. Alt, F., Shirazi, A. S., & Schmidt, A. et al. (2010). Location-based crowdsourcing: extending crowdsourcing to the real world. In Proceedings of the 6th Nordic conference on human–computer interaction: Extending boundaries (pp. 13–22). ACM.

  26. Boutsis, I., & Kalogeraki, V. (2014). On task assignment for real-time reliable crowdsourcing. In 2014 IEEE 34th international conference on distributed computing systems (ICDCS) (pp. 1–10). IEEE.

  27. Faggiani, A., Gregori, E., Lenzini, L., et al. (2014). Smartphone-based crowdsourcing for network monitoring: Opportunities, challenges, and a case study. IEEE Communications Magazine, 52(1), 106–113.

    Article  Google Scholar 

  28. Ganti, R. K., et al. (2011). Mobile crowdsensing: Current state and future challenges. IEEE Communications Magazine, 49(11), 3239.

    Article  Google Scholar 

  29. Schwarz, T. J. E., & Miller, E. L. (2006). Store, forget, and check: using algebraic signatures to check remotely administered storage. In Proceedings of the ICDCS (Vol. 6, pp. 12).

  30. Openssl.org, openssl-1.0.1e.tar.gz Feb 2013. [Online]. http://www.openssl.org/source/.

  31. Ben Lynn, PBC Library Manual 0.5.11.2006. [Online]. http://crypto.stanford.edu/pbc/manual/.

  32. Cheng, B., Zhai, Z., Zhao, S., et al. (2017). LSMP: A lightweight service mashup platform for ordinary users. IEEE Communications Magazine, 55(4), 116–123.

    Article  Google Scholar 

  33. Cheng, B., Wang, M., Zhao, S., et al. (2017). Situation-aware dynamic service coordination in an IoT environment. IEEE/ACM Transactions on Networking, 25(4), 2082–2095.

    Article  Google Scholar 

Download references

Acknowledgements

This paper is supported by the NSFC (Nos. 71402070, 61101088), the NSF of jiangsu province (No. BK20161099), and the Opening Project of Key Lab of Information Network Security of Ministry of Public Security (No. C16604).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Changsheng Wan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wan, C., Zhang, J. SCRPM: securing crowdsourcing-based road pavement monitoring system with location privacy. Wireless Netw 26, 1139–1149 (2020). https://doi.org/10.1007/s11276-018-1858-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-018-1858-1

Keywords

Navigation