WISTP 2015: Information Security Theory and Practice pp 20-35 | Cite as
Privacy-Respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing
Abstract
In many mobile crowdsensing scenarios it is desirable to give micro-payments to contributors as an incentive for their participation. However, to further encourage participants to use the system, one important requirement is protection of user privacy. In this work we present a reverse auction mechanism as an efficient way to offer incentives to users by allowing them to determine their own price for the data they provide, but also as a way to motivate them to submit better quality data. At the same time our auction protocol guarantees bidders’ anonymity and suggests a new rewarding mechanism that enables winners to claim their reward without being linked to the data they contributed. Our protocol is scalable, can be applied to a large class of auctions and remains both computation- and communication-efficient so that it can be run to the mobile devices of users.
Keywords
Mobile crowd sensing Multi-attribute auctions Incentive mechanisms Security and privacyPreview
Unable to display preview. Download preview PDF.
References
- 1.Guo, B., Yu, Z., Zhou, X., Zhang, D.: From participatory sensing to mobile crowd sensing. In: Proceedings of the IEEE PERCOM Workshops, pp. 593–598, March 2014Google Scholar
- 2.Chatzimilioudis, G., Konstantinidis, A., Laoudias, C., Zeinalipour-Yazti, D.: Crowdsourcing with smartphones. IEEE Internet Computing 16(5), 36–44 (2012)CrossRefGoogle Scholar
- 3.Yang, D., Xue, G., Fang, X., Tang, J.: Crowdsourcing to smartphones: incentive mechanism design for mobile phone sensing. In: Mobicom 2012, Istanbul, Turkey, pp. 173–184 (2012)Google Scholar
- 4.Di, B., Wang, T., Song, L., Han, Z.: Incentive mechanism for collaborative smartphone sensing using overlapping coalition formation games. In: IEEE Globe Communication Conference (Globecom), Atlanta, USA, pp. 1705–1710 (2013)Google Scholar
- 5.Zaman, S., Abrar, N., Iqbal, A.: Incentive model design for participatory sensing: technologies and challenges. In: International Conference on Networking Systems and Security (NSysS), pp. 1–6 (2015)Google Scholar
- 6.Reddy, S., Estrin, D., Hansen, M., Srivastava, M.: Examining micro-payments for participatory sensing data collections. In: Proceedings of the 12th ACM International Conference on Ubiquitous Computing (UbiComp), pp. 33–36 (2010)Google Scholar
- 7.Rula, J.P., Navda, V., Bustamante, F.E., Bhagwan, R., Guha, S.: No “one-size fits all”: towards a principled approach for incentives in mobile crowdsourcing. In: Proceedings of the 15th Workshop on Mobile Computing Systems and Applications (HotMobile), pp. 3:1–3:5 (2014)Google Scholar
- 8.Krontiris, I., Albers, A.: Monetary incentives in participatory sensing using multi-attributive auctions. International Journal of Parallel, Emergent and Distributed Systems 27(4) (2012)Google Scholar
- 9.Lee, J.S., Hoh, B.: Sell your experiences: a market mechanism based incentive for participatory sensing. In: Proceedings of the IEEE International Conference on Pervasive Computing and Communications (PerCom), pp. 60–68 (2010)Google Scholar
- 10.Christin, D., Reinhardt, A., Kanhere, S.S., Hollick, M.: A survey on privacy in mobile participatory sensing applications. Journal of Systems and Software 84(11) (2011)Google Scholar
- 11.Wang, Y., Huang, Y., Louis, C.: Respecting user privacy in mobile crowdsourcing. ASE Science Journal 2(2) (2013)Google Scholar
- 12.Shin, M., Cornelius, C., Peebles, D., Kapadia, A., Kotz, D., Triandopoulos, N.: AnonySense: A system for anonymous opportunistic sensing. Journal of Pervasive and Mobile Computing 7(1), 16–30 (2010)CrossRefGoogle Scholar
- 13.Zhang, X., Yang, Z., Zhou, Z., Cai, H., Chen, L., Li, X.: Free market of crowdsourcing: Incentive mechanism design for mobile sensing. IEEE Transactions on Parallel and Distributed Systems 25(12), 3190–3200 (2014)CrossRefGoogle Scholar
- 14.Koutsopoulos, I.: Optimal incentive-driven design of participatory sensing systems. In: Proceedings of IEEE INFOCOM, pp. 14–19 (2013)Google Scholar
- 15.Pham, L., Teich, J., Wallenius, H., Wallenius, J.: Multi-attribute online reverse auctions: Recent research trends. European J. of Oper. Research 242(1), 1–9 (2015)MathSciNetCrossRefMATHGoogle Scholar
- 16.Shi, W.: A sealed-bid multi-attribute auction protocol with strong bid privacy and bidder privacy. Security and Communication Networks 6(10), 1281–1289 (2013)Google Scholar
- 17.Peng, K., Boyd, C., Dawson, E.: Optimization of electronic first-bid sealed-bid auction based on homomorphic secret sharing. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol. 3715, pp. 84–98. Springer, Heidelberg (2005) CrossRefGoogle Scholar
- 18.Brandt, F.: How to obtain full privacy in auctions. Intern. Journal of Information Security 5(4), 201–216 (2006)CrossRefMATHGoogle Scholar
- 19.Zheng, S., McAven, L., Mu, Y.: First price sealed bid auction without auctioneers. In: Proceedings of the International Conference on Wireless Communications and Mobile Computing (IWCMC), pp. 127–131 (2007)Google Scholar
- 20.Nojoumian, M., Stinson, D.R.: Efficient sealed-bid auction protocols using verifiable secret sharing. In: Huang, X., Zhou, J. (eds.) ISPEC 2014. LNCS, vol. 8434, pp. 302–317. Springer, Heidelberg (2014) CrossRefGoogle Scholar
- 21.Gisdakis, S., Giannetsos, T., Papadimitratos, P.: SPPEAR: security & privacy-preserving architecture for participatory-sensing applications. In: Proc. of the 7th ACM Conf. on Security and Privacy in Wireless and Mobile Networks (WiSec), pp. 39–50 (2014)Google Scholar
- 22.Li, Q., Cao, G.: Providing efficient privacy-aware incentives for mobile sensing. In: Proceedings of the 34th IEEE International Conference on Distributed Computing Systems (ICDCS), pp. 208–217 (2014)Google Scholar
- 23.Krontiris, I., Dimitriou, T.: A platform for privacy protection of data requesters and data providers in mobile sensing. Computer Communications 11, 43–54 (2015)CrossRefGoogle Scholar
- 24.Christin, D., Rosskopf, C., Hollick, M., Martucci, L.A., Kanhere, S.S.: Incognisense: an anonymity-preserving reputation framework for participatory sensing applications. In: Proceedings of the IEEE PerCom, pp. 135–143 (2012)Google Scholar
- 25.Cohen, J.D., Fischer, M.J.: A robust and verifiable cryptographically secure election scheme. In: Proceedings of the 26th Annual Symposium on Foundations of Computer Science (SFCS), pp. 372–382 (1985)Google Scholar
- 26.Rial, A., Preneel, B.: Optimistic fair priced oblivious transfer. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol. 6055, pp. 131–147. Springer, Heidelberg (2010) CrossRefGoogle Scholar
- 27.Chaum, D., Fiat, A., Naor, M.: Untraceable electronic cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 319–327. Springer, Heidelberg (1990) CrossRefGoogle Scholar
- 28.Dimitriou, T., Krontiris, I., Sabouri, A.: PEPPeR: A querier’s privacy enhancing protocol for PaRticipatory sensing. In: Schmidt, A.U., Russello, G., Krontiris, I., Lian, S. (eds.) MobiSec 2012. LNICST, vol. 107, pp. 93–106. Springer, Heidelberg (2012) CrossRefGoogle Scholar
- 29.Schnorr, C.P.: Efficient signature generation by smart cards. Journal of Cryptology 4(3), 161–174 (1991)CrossRefMATHGoogle Scholar
- 30.Chaum, D.: Blind signatures for untraceable payments. In: Advances in Cryptology Proceedings of Crypto. no. 3, pp. 199–203 (1982)Google Scholar
- 31.Lauter, K.: The advantages of elliptic curve cryptography for wireless security. IEEE Wireless Communications 11(1), 62–67 (2004)MathSciNetCrossRefGoogle Scholar