Privacy-Respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9311)

Abstract

In many mobile crowdsensing scenarios it is desirable to give micro-payments to contributors as an incentive for their participation. However, to further encourage participants to use the system, one important requirement is protection of user privacy. In this work we present a reverse auction mechanism as an efficient way to offer incentives to users by allowing them to determine their own price for the data they provide, but also as a way to motivate them to submit better quality data. At the same time our auction protocol guarantees bidders’ anonymity and suggests a new rewarding mechanism that enables winners to claim their reward without being linked to the data they contributed. Our protocol is scalable, can be applied to a large class of auctions and remains both computation- and communication-efficient so that it can be run to the mobile devices of users.

Keywords

Mobile crowd sensing Multi-attribute auctions Incentive mechanisms Security and privacy 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Guo, B., Yu, Z., Zhou, X., Zhang, D.: From participatory sensing to mobile crowd sensing. In: Proceedings of the IEEE PERCOM Workshops, pp. 593–598, March 2014Google Scholar
  2. 2.
    Chatzimilioudis, G., Konstantinidis, A., Laoudias, C., Zeinalipour-Yazti, D.: Crowdsourcing with smartphones. IEEE Internet Computing 16(5), 36–44 (2012)CrossRefGoogle Scholar
  3. 3.
    Yang, D., Xue, G., Fang, X., Tang, J.: Crowdsourcing to smartphones: incentive mechanism design for mobile phone sensing. In: Mobicom 2012, Istanbul, Turkey, pp. 173–184 (2012)Google Scholar
  4. 4.
    Di, B., Wang, T., Song, L., Han, Z.: Incentive mechanism for collaborative smartphone sensing using overlapping coalition formation games. In: IEEE Globe Communication Conference (Globecom), Atlanta, USA, pp. 1705–1710 (2013)Google Scholar
  5. 5.
    Zaman, S., Abrar, N., Iqbal, A.: Incentive model design for participatory sensing: technologies and challenges. In: International Conference on Networking Systems and Security (NSysS), pp. 1–6 (2015)Google Scholar
  6. 6.
    Reddy, S., Estrin, D., Hansen, M., Srivastava, M.: Examining micro-payments for participatory sensing data collections. In: Proceedings of the 12th ACM International Conference on Ubiquitous Computing (UbiComp), pp. 33–36 (2010)Google Scholar
  7. 7.
    Rula, J.P., Navda, V., Bustamante, F.E., Bhagwan, R., Guha, S.: No “one-size fits all”: towards a principled approach for incentives in mobile crowdsourcing. In: Proceedings of the 15th Workshop on Mobile Computing Systems and Applications (HotMobile), pp. 3:1–3:5 (2014)Google Scholar
  8. 8.
    Krontiris, I., Albers, A.: Monetary incentives in participatory sensing using multi-attributive auctions. International Journal of Parallel, Emergent and Distributed Systems 27(4) (2012)Google Scholar
  9. 9.
    Lee, J.S., Hoh, B.: Sell your experiences: a market mechanism based incentive for participatory sensing. In: Proceedings of the IEEE International Conference on Pervasive Computing and Communications (PerCom), pp. 60–68 (2010)Google Scholar
  10. 10.
    Christin, D., Reinhardt, A., Kanhere, S.S., Hollick, M.: A survey on privacy in mobile participatory sensing applications. Journal of Systems and Software 84(11) (2011)Google Scholar
  11. 11.
    Wang, Y., Huang, Y., Louis, C.: Respecting user privacy in mobile crowdsourcing. ASE Science Journal 2(2) (2013)Google Scholar
  12. 12.
    Shin, M., Cornelius, C., Peebles, D., Kapadia, A., Kotz, D., Triandopoulos, N.: AnonySense: A system for anonymous opportunistic sensing. Journal of Pervasive and Mobile Computing 7(1), 16–30 (2010)CrossRefGoogle Scholar
  13. 13.
    Zhang, X., Yang, Z., Zhou, Z., Cai, H., Chen, L., Li, X.: Free market of crowdsourcing: Incentive mechanism design for mobile sensing. IEEE Transactions on Parallel and Distributed Systems 25(12), 3190–3200 (2014)CrossRefGoogle Scholar
  14. 14.
    Koutsopoulos, I.: Optimal incentive-driven design of participatory sensing systems. In: Proceedings of IEEE INFOCOM, pp. 14–19 (2013)Google Scholar
  15. 15.
    Pham, L., Teich, J., Wallenius, H., Wallenius, J.: Multi-attribute online reverse auctions: Recent research trends. European J. of Oper. Research 242(1), 1–9 (2015)MathSciNetCrossRefMATHGoogle Scholar
  16. 16.
    Shi, W.: A sealed-bid multi-attribute auction protocol with strong bid privacy and bidder privacy. Security and Communication Networks 6(10), 1281–1289 (2013)Google Scholar
  17. 17.
    Peng, K., Boyd, C., Dawson, E.: Optimization of electronic first-bid sealed-bid auction based on homomorphic secret sharing. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol. 3715, pp. 84–98. Springer, Heidelberg (2005) CrossRefGoogle Scholar
  18. 18.
    Brandt, F.: How to obtain full privacy in auctions. Intern. Journal of Information Security 5(4), 201–216 (2006)CrossRefMATHGoogle Scholar
  19. 19.
    Zheng, S., McAven, L., Mu, Y.: First price sealed bid auction without auctioneers. In: Proceedings of the International Conference on Wireless Communications and Mobile Computing (IWCMC), pp. 127–131 (2007)Google Scholar
  20. 20.
    Nojoumian, M., Stinson, D.R.: Efficient sealed-bid auction protocols using verifiable secret sharing. In: Huang, X., Zhou, J. (eds.) ISPEC 2014. LNCS, vol. 8434, pp. 302–317. Springer, Heidelberg (2014) CrossRefGoogle Scholar
  21. 21.
    Gisdakis, S., Giannetsos, T., Papadimitratos, P.: SPPEAR: security & privacy-preserving architecture for participatory-sensing applications. In: Proc. of the 7th ACM Conf. on Security and Privacy in Wireless and Mobile Networks (WiSec), pp. 39–50 (2014)Google Scholar
  22. 22.
    Li, Q., Cao, G.: Providing efficient privacy-aware incentives for mobile sensing. In: Proceedings of the 34th IEEE International Conference on Distributed Computing Systems (ICDCS), pp. 208–217 (2014)Google Scholar
  23. 23.
    Krontiris, I., Dimitriou, T.: A platform for privacy protection of data requesters and data providers in mobile sensing. Computer Communications 11, 43–54 (2015)CrossRefGoogle Scholar
  24. 24.
    Christin, D., Rosskopf, C., Hollick, M., Martucci, L.A., Kanhere, S.S.: Incognisense: an anonymity-preserving reputation framework for participatory sensing applications. In: Proceedings of the IEEE PerCom, pp. 135–143 (2012)Google Scholar
  25. 25.
    Cohen, J.D., Fischer, M.J.: A robust and verifiable cryptographically secure election scheme. In: Proceedings of the 26th Annual Symposium on Foundations of Computer Science (SFCS), pp. 372–382 (1985)Google Scholar
  26. 26.
    Rial, A., Preneel, B.: Optimistic fair priced oblivious transfer. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol. 6055, pp. 131–147. Springer, Heidelberg (2010) CrossRefGoogle Scholar
  27. 27.
    Chaum, D., Fiat, A., Naor, M.: Untraceable electronic cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 319–327. Springer, Heidelberg (1990) CrossRefGoogle Scholar
  28. 28.
    Dimitriou, T., Krontiris, I., Sabouri, A.: PEPPeR: A querier’s privacy enhancing protocol for PaRticipatory sensing. In: Schmidt, A.U., Russello, G., Krontiris, I., Lian, S. (eds.) MobiSec 2012. LNICST, vol. 107, pp. 93–106. Springer, Heidelberg (2012) CrossRefGoogle Scholar
  29. 29.
    Schnorr, C.P.: Efficient signature generation by smart cards. Journal of Cryptology 4(3), 161–174 (1991)CrossRefMATHGoogle Scholar
  30. 30.
    Chaum, D.: Blind signatures for untraceable payments. In: Advances in Cryptology Proceedings of Crypto. no. 3, pp. 199–203 (1982)Google Scholar
  31. 31.
    Lauter, K.: The advantages of elliptic curve cryptography for wireless security. IEEE Wireless Communications 11(1), 62–67 (2004)MathSciNetCrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2015

Authors and Affiliations

  1. 1.Computer Engineering DepartmentKuwait UniversityKuwait CityKuwait
  2. 2.Research Academic Computer Technology InstitutePatrasGreece
  3. 3.Huawei Technologies Duesseldorf GmbHMunichGermany

Personalised recommendations