Bilateral Privacy Protection Scheme Based on Adaptive Location Generalization and Grouping Aggregation in Mobile Crowdsourcing

被引:0
|
作者
Sun, Xuelei [1 ]
Wang, Yingjie [1 ]
Duan, Peiyong [2 ]
Zia, Qasim [3 ]
Wang, Weilong [4 ]
Cai, Zhipeng [3 ]
机构
[1] Yantai Univ, Sch Comp & Control Engn, Yantai 264005, Peoples R China
[2] Qilu Univ Technol, Shandong Acad Sci, Fac Elect Elect & Control, Jinan 250353, Peoples R China
[3] Georgia State Univ, Dept Comp Sci, Atlanta, GA 30303 USA
[4] Southeast Univ, Dept Comp Sci & Engn, Nanjing 211189, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 10期
基金
中国国家自然科学基金;
关键词
Task analysis; Privacy; Perturbation methods; Crowdsourcing; Trajectory; Differential privacy; Mobile handsets; Bilateral privacy protection; federated learning; localized differential privacy (LDP); location generalization; mobile crowdsourcing (MCS); TASK ASSIGNMENT; FRAMEWORK;
D O I
10.1109/JIOT.2024.3358799
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In mobile crowdsourcing (MCS), the task information released by task publishers and the sensed data submitted by workers may expose their privacy, while the rapid growth of MCS imposes increasing data processing pressure on cloud platforms and mobile devices. To address these challenges, a bilateral privacy protection scheme based on adaptive location generalization and grouping aggregation is presented in this article. The scheme uses federated learning as a framework and utilizes edge computing to reduce the data processing burden on cloud platforms and mobile devices. This article proposes the adaptive location generalization algorithm (KM-ALG) and a real task location release mechanism based on the RSA algorithm to protect the task location privacy of the task publisher. For workers' privacy protection, the lightweight multiple perturbation algorithm based on localized differential privacy (LDP-MP) proposed in this article is used to protect workers' data privacy. Aiming at the problem of data quality loss caused by perturbation, a perturbation elimination mechanism based on homomorphic encryption technology is proposed. In order to prevent workers' sensed data from leaking location information, a grouping aggregation mechanism is used to destroy the correspondence between workers and submitted data, thereby protecting workers' location privacy. In addition, a task allocation scheme adapted to task location privacy protection is also proposed. Finally, the effectiveness of the proposed algorithm is verified through experiments on multiple real data sets.
引用
收藏
页码:17740 / 17756
页数:17
相关论文
共 50 条
  • [21] DPLQ: Location-based service privacy protection scheme based on differential privacy
    Zhang, Qingyun
    Zhang, Xing
    Wang, Mingyue
    Li, Xiaohui
    [J]. IET INFORMATION SECURITY, 2021, 15 (06) : 442 - 456
  • [22] Semantic-Based Customizable Location Privacy Protection Scheme
    Lv, Xin
    Shi, Haitao
    Wang, Aili
    Zeng, Tao
    Wu, Zhongzhong
    [J]. 2018 17TH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS FOR BUSINESS ENGINEERING AND SCIENCE (DCABES), 2018, : 148 - 154
  • [23] Semantic-Based Customizable Location Privacy Protection Scheme
    Lv, Xin
    Shi, Haitao
    Wang, Aili
    Zeng, Tao
    Wu, Zhongzhong
    [J]. Proceedings - 2018 17th International Symposium on Distributed Computing and Applications for Business Engineering and Science, DCABES 2018, 2018, : 148 - 154
  • [24] A Gradual Sensitive Indistinguishable Based Location Privacy Protection Scheme
    Wang B.
    Zhang L.
    Zhang G.
    [J]. Zhang, Lei (8213662@163.com), 1600, Science Press (57): : 616 - 630
  • [25] Differential Privacy Location Protection Scheme Based on Hilbert Curve
    Wang, Jie
    Wang, Feng
    Li, Hongtao
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [26] A dynamic location privacy protection scheme based on Cloud storage
    Li, Li
    Lv, Zhengjuan
    Tong, Xiaohong
    Shi, Runhua
    [J]. International Journal of Network Security, 2019, 21 (05) : 828 - 834
  • [27] GLPS: A Geohash-Based Location Privacy Protection Scheme
    Liu, Bin
    Zhang, Chunyong
    Yao, Liangwei
    Xin, Yang
    [J]. ENTROPY, 2023, 25 (12)
  • [28] A two-stage privacy protection mechanism based on blockchain in mobile crowdsourcing
    Sun, Zice
    Wang, Yingjie
    Cai, Zhipeng
    Liu, Tianen
    Tong, Xiangrong
    Jiang, Nan
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2021, 36 (05) : 2058 - 2080
  • [29] Privacy Preserving Scheme for Location and Content Protection in Location-Based Services
    Peng, Tao
    Liu, Qin
    Wang, Guojun
    Xiang, Yang
    [J]. SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 26 - 38
  • [30] A Privacy Protection Mechanism for Location-based Mobile Coupons
    Kazeminia, Alireza
    Ghahfarokhi, Behrouz Shahgholi
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE 2013), 2013, : 202 - 206