PPTA: Privacy-Preserving Task Assignment Based on Inner Product Functional Encryption in SAM

被引:4
|
作者
Xu, Zihui [1 ]
Wu, Lei [2 ,3 ]
Qin, Chengyi [1 ]
Li, Su [1 ]
Zhang, Songnian [4 ]
Lu, Rongxing
机构
[1] Shandong Normal Univ, Sch Informat Sci & Engn, Jinan, Peoples R China
[2] Shandong Normal Univ, Sch Informat Sci & Engn, Shandong Prov Key Lab Novel Distributed Comp Softw, Jinan 250358, Peoples R China
[3] Henan Key Lab Network Cryptog Technol, Zhengzhou 450001, Peoples R China
[4] Univ New Brunswick, Fac Comp Sci, Fredericton, NB, Canada
来源
IEEE INTERNET OF THINGS JOURNAL | 2023年 / 10卷 / 01期
基金
中国国家自然科学基金;
关键词
Inner product functional encryption; privacy preservation; range query; searchable encryption (SE); task assignment; LOCATION PRIVACY; COMPUTATION; FRAMEWORK; SEARCH; SCHEME; WORKER;
D O I
10.1109/JIOT.2022.3199200
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The explosions of mobile communications and the Internet of Things (IoT) have spawned a new distributed computing paradigm-spatial crowdsourcing, in which workers actively participate in spatiotemporal computing tasks for earning commissions, facilitating the development of urban sharing economic services. Furthermore, to reduce users' storage space and computational overhead, the server assignment model (SAM) is widely used, which means that crowdsourcing platforms collect sensitive information about tasks and workers, e.g., locations and interests, to perform task assignments accurately. However, in the real world, crowdsourcing platforms are not fully trustworthy and may reveal sensitive information about workers and tasks, which can reduce users' motivation to use crowdsourcing services. Therefore, how to assign tasks efficiently and securely is still an urgent problem to be solved. In this article, we propose a privacy-preserving task assignment scheme (PPTA), in which the crowdsourcing platform efficiently implements the nearest task assignments without revealing sensitive information about tasks and workers. In PPTA, we utilize inner product functional encryption to achieve circular range queries and multikeyword queries. Considering that workers usually prefer to query the nearest tasks for reducing travel costs, we use the grid location intersection to enable the nearest task assignment. In particular, we design a SAM algorithm, which can improve task assignment rates in multitask and multiworker scenarios. In addition, our scheme can implement user accountability and user revocation, which enhances the security and practicality of the scheme. Finally, we demonstrate the privacy preservation through security theoretical proofs and show the efficiency by constructing extensive comparative experiments, which respectively illustrate the security and the effectiveness of our scheme.
引用
收藏
页码:254 / 267
页数:14
相关论文
共 50 条
  • [1] Privacy-Preserving Decentralized Functional Encryption for Inner Product
    Han, Jinguang
    Chen, Liqun
    Hu, Aiqun
    Chen, Liquan
    Li, Jiguo
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 1680 - 1694
  • [2] Privacy-Preserving Edge Computing from Pairing-Based Inner Product Functional Encryption
    Banerjee, Utsav
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 2184 - 2189
  • [3] PPTA: A location privacy-preserving and flexible task assignment service for spatial crowdsourcing
    Zhou, Menglun
    Zheng, Yifeng
    Wang, Songlei
    Hua, Zhongyun
    Huang, Hejiao
    Gao, Yansong
    Jia, Xiaohua
    COMPUTER NETWORKS, 2023, 224
  • [4] Privacy-Preserving WiFi Localization Based on Inner Product Encryption in a Cloud Environment
    Wang, Zhiheng
    Xu, Yanyan
    Yan, Yuejing
    Ouyang, Xue
    Zhang, Bo
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (10): : 17264 - 17282
  • [5] Privacy-preserving indoor localization based on inner product encryption in a cloud environment
    Wang, Zhiheng
    Xu, Yanyan
    Yan, Yuejing
    Zhang, Yiran
    Rao, Zheheng
    Ouyang, Xue
    KNOWLEDGE-BASED SYSTEMS, 2022, 239
  • [6] Privacy-preserving tax calculations in smart cities by means of Inner-Product Functional Encryption
    Stan, Oana
    Sirdey, Renaud
    Gouy-Pailler, Cedric
    Blanchart, Pierre
    Ben Hamida, Amira
    Zayani, Mohamed-Haykel
    2018 2ND CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2018,
  • [7] A secure and privacy-preserving word vector training scheme based on functional encryption with inner-product predicates
    Zhang, Mingwu
    Li, Zhen-An
    Zhang, Peiheng
    COMPUTER STANDARDS & INTERFACES, 2023, 86
  • [8] Privacy-Preserving Task Assignment in Spatial Crowdsourcing
    An Liu
    Zhi-Xu Li
    Guan-Feng Liu
    Kai Zheng
    Min Zhang
    Qing Li
    Xiangliang Zhang
    Journal of Computer Science and Technology, 2017, 32 : 905 - 918
  • [9] Privacy-Preserving Task Assignment in Spatial Crowdsourcing
    Liu, An
    Li, Zhi-Xu
    Liu, Guan-Feng
    Zheng, Kai
    Zhang, Min
    Li, Qing
    Zhang, Xiangliang
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2017, 32 (05) : 905 - 918
  • [10] Heal the Privacy: Functional Encryption and Privacy-Preserving Analytics
    Bakas, Alexandros
    Michalas, Antonis
    2022 IEEE 21ST MEDITERRANEAN ELECTROTECHNICAL CONFERENCE (IEEE MELECON 2022), 2022, : 120 - 125