2017
DOI: 10.1007/s12652-017-0529-x
|View full text |Cite
|
Sign up to set email alerts
|

An anonymous data reporting strategy with ensuring incentives for mobile crowd-sensing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 16 publications
(15 citation statements)
references
References 16 publications
0
15
0
Order By: Relevance
“…Li et al leveraged encoded vector to achieve bid privacy preservation in incentive solution in [45]. Owing to bulk transfer technique and public key cryptosystem, it successfully achieves anonymity and unlinkability.…”
Section: A) Privacy Protection In Credit-based Incentive (Cr)mentioning
confidence: 99%
“…Li et al leveraged encoded vector to achieve bid privacy preservation in incentive solution in [45]. Owing to bulk transfer technique and public key cryptosystem, it successfully achieves anonymity and unlinkability.…”
Section: A) Privacy Protection In Credit-based Incentive (Cr)mentioning
confidence: 99%
“…However, these third-party components can themselves be points of privacy vulnerability. For example, one protocol [11] relies on the use of an additional component that manages the accounts of both participants and the incentive provider. This credit management component has particular potential for inference attacks as it performs credit transfers from the incentive provider’s account to that of the participant.…”
Section: Related Workmentioning
confidence: 99%
“…There are several approaches in the state of the art that use tokens, which are mappable to a tangible monetary or non-monetary item of value, to allocate rewards. However, this is sometimes at the cost of privacy preservation through the use of third parties ([18] and [11]) and pseudonyms [18]. One credit token system ([28], also [29] and [30]) does attempt to address the challenges of anonymous reward allocation by using a Blind Signature to break the link between the credit token and what is termed the pseudo-credit to ensure that the service provider cannot make any connection with the data submission for which the credit is earned.…”
Section: Related Workmentioning
confidence: 99%
“…If the participants collude, they maybe exchange or duplicate others' pseudonyms for earning more payments. Our previous work [8] proposed a privacy protection scheme with incentive mechanism for mobile crowd-sensing. It uses slot reservation based on shuffle to establish a submission schedule by anonymously assigning a slot in a vector to each member in a group of participants.…”
Section: Introductionmentioning
confidence: 99%
“…In order to address the above issues, this paper proposes a strategy to protect participant's privacy through data reporting anonymity while providing incentives in the form of micropayments. Our contributions are as follows: (1) we present a data reporting protocol for guaranteeing anonymity based on multiplayer DC-nets and bulk transfer with an incentive strategy followed by works [9][10][11][12][13], and adapted to participatory sensing in Yao et al [14] and our previous work [8]. (2) We optimize slot reservation and data submission stage for efficiency, which uses random slot selection instead of previous multiple encryption shuffles.…”
Section: Introductionmentioning
confidence: 99%