2018
DOI: 10.1109/jiot.2018.2847249
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Privacy-Aware Incentives-Based Witness Service in Social Internet of Vehicles Clouds

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 51 publications
(20 citation statements)
references
References 19 publications
0
20
0
Order By: Relevance
“…Two important issues have attracted attention in crowdsourcing: the use of incentives to attract a competent and honest workforce, and the related topic of universal privacy and security [47,52]. Several strategies for incentivizing participation in crowdsourcing have been reported in the literature [53][54][55].…”
Section: Crowdsourcing and Crowd Computingmentioning
confidence: 99%
“…Two important issues have attracted attention in crowdsourcing: the use of incentives to attract a competent and honest workforce, and the related topic of universal privacy and security [47,52]. Several strategies for incentivizing participation in crowdsourcing have been reported in the literature [53][54][55].…”
Section: Crowdsourcing and Crowd Computingmentioning
confidence: 99%
“…Therefore, the solution presented by authors is based on retrieving the ciphertext with higher efficiency. The problem associated with the privacy problem is also addressed in the work of Hussain et al [52]. An interesting solution has been presented by the author where images are captured from the site of interest by the image capturing devices of the vehicles and the information is forwarded to the cloud.…”
Section: Integration Cloud With Vehicular Networkmentioning
confidence: 99%
“…In current systems, such as those proposed in [30], trust is maintained centrally and is vulnerable to attack. Hussain et al [31] provide a solution to maintain privacy in witness services in a vehicle infrastructure. Their system implements the ElGamal encryption algorithm with elliptic curve cryptography to protect data and uses pseudonyms mechanism for the identity exchange in order to maintain anonymity.…”
Section: State Of the Artmentioning
confidence: 99%