Loading [MathJax]/extensions/MathZoom.js
A Personalized Privacy Protection Framework for Mobile Crowdsensing in IIoT | IEEE Journals & Magazine | IEEE Xplore

A Personalized Privacy Protection Framework for Mobile Crowdsensing in IIoT


Abstract:

With the rapid digitalization of various industries, mobile crowdsensing (MCS), an intelligent data collection and processing paradigm of the industrial Internet of Thing...Show More

Abstract:

With the rapid digitalization of various industries, mobile crowdsensing (MCS), an intelligent data collection and processing paradigm of the industrial Internet of Things, has provided a promising opportunity to construct powerful industrial systems and provide industrial services. The existing unified privacy strategy for all sensing data results in excessive or insufficient protection and low quality of crowdsensing services (QoCS) in MCS. To tackle this issue, in this article we propose a personalized privacy protection (PERIO) framework based on game theory and data encryption. Initially, we design a personalized privacy measurement algorithm to calculate users' privacy level, which is then combined with game theory to construct a rational uploading strategy. Furthermore, we propose a privacy-preserving data aggregation scheme to ensure data confidentiality, integrity, and real-timeness. Theoretical analysis and ample simulations with real trajectory dataset indicate that the PERIO scheme is effective and makes a reasonable balance between retaining high QoCS and privacy.
Published in: IEEE Transactions on Industrial Informatics ( Volume: 16, Issue: 6, June 2020)
Page(s): 4231 - 4241
Date of Publication: 17 October 2019

ISSN Information:

Funding Agency:

Author image of Jinbo Xiong
Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Mathematics and Informatics, Fujian Normal University, Fuzhou, China
Jinbo Xiong (M’13) received the Ph.D. degree in computer system architecture from Xidian University, Xi’an, China, in 2013.
He is currently working as an Associate Professor with the Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Mathematics and Informatics, Fujian Normal University, Fujian, China. His research interests include mobile crowdsensing, privacy protection, and Internet of Thing...Show More
Jinbo Xiong (M’13) received the Ph.D. degree in computer system architecture from Xidian University, Xi’an, China, in 2013.
He is currently working as an Associate Professor with the Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Mathematics and Informatics, Fujian Normal University, Fujian, China. His research interests include mobile crowdsensing, privacy protection, and Internet of Thing...View more
Author image of Rong Ma
Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Mathematics and Informatics, Fujian Normal University, Fuzhou, China
Rong Ma received the M.S. degree in computer applications from the College of Mathematics and Informatics, Fujian Normal University, Fuzhou, China, in 2019.
Her research interests include mobile crowdsensing security and privacy protection.
Rong Ma received the M.S. degree in computer applications from the College of Mathematics and Informatics, Fujian Normal University, Fuzhou, China, in 2019.
Her research interests include mobile crowdsensing security and privacy protection.View more
Author image of Lei Chen
College of Engineering and Computing, Georgia Southern University, Statesboro, USA
Lei Chen (M’05–SM’19) received the Ph.D. degree in computer science and software engineering from Auburn University, Auburn, AL, USA, in 2007.
He is currently a tenured Associate Professor and the Graduate Program Director with the Department of Information Technology, Georgia Southern University, Georgia, USA. His research interests include network, information, cloud, and big data security, digital forensics, mobile, han...Show More
Lei Chen (M’05–SM’19) received the Ph.D. degree in computer science and software engineering from Auburn University, Auburn, AL, USA, in 2007.
He is currently a tenured Associate Professor and the Graduate Program Director with the Department of Information Technology, Georgia Southern University, Georgia, USA. His research interests include network, information, cloud, and big data security, digital forensics, mobile, han...View more
Author image of Youliang Tian
State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, China
Youliang Tian (M’18) received the B.Sc. degree in mathematics and applied mathematics, the M.Sc. degree in applied mathematics from GuiZhou University, Guizhou, China, in 2004 and 2009, respectively, and the Ph.D. degree in cryptography from Xi'dian University of Electronic Science nad Technology, Xi'an, China, in 2012.
From 2012 and 2015, he was a Postdoctoral Associate with the State Key Laboratory, Chinese Academy of Sc...Show More
Youliang Tian (M’18) received the B.Sc. degree in mathematics and applied mathematics, the M.Sc. degree in applied mathematics from GuiZhou University, Guizhou, China, in 2004 and 2009, respectively, and the Ph.D. degree in cryptography from Xi'dian University of Electronic Science nad Technology, Xi'an, China, in 2012.
From 2012 and 2015, he was a Postdoctoral Associate with the State Key Laboratory, Chinese Academy of Sc...View more
Author image of Qi Li
School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China
Qi Li received the Ph.D. degree in computer system architecture from Xidian University, Xi’an, China, in 2014.
He is currently a Lecturer with the School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China. His research interests include cloud security, information security, and applied cryptography.
Qi Li received the Ph.D. degree in computer system architecture from Xidian University, Xi’an, China, in 2014.
He is currently a Lecturer with the School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China. His research interests include cloud security, information security, and applied cryptography.View more
Author image of Ximeng Liu
Fujian Provincial Key Laboratory of Information Security of Network Systems, College of Mathematics and Computer Science, Fuzhou University, Fuzhou, China
Ximeng Liu (M’16) received the B.Sc. degree in electronic engineering and the Ph.D. degree in cryptography from Xidian University, Xi'an, China, in 2010 and 2015, respectively.
He is currently a Professor with the Key Laboratory of Information Security of Network Systems, College of Mathematics and Computer Science, Fuzhou University, Fuzhou, China. His research interests include applied cryptography and big data security.
Ximeng Liu (M’16) received the B.Sc. degree in electronic engineering and the Ph.D. degree in cryptography from Xidian University, Xi'an, China, in 2010 and 2015, respectively.
He is currently a Professor with the Key Laboratory of Information Security of Network Systems, College of Mathematics and Computer Science, Fuzhou University, Fuzhou, China. His research interests include applied cryptography and big data security.View more
Author image of Zhiqiang Yao
Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Mathematics and Informatics, Fujian Normal University, Fuzhou, China
Zhiqiang Yao received the Ph.D. degree in computer system architecture from Xidian University, Xi’an, China, in 2014.
He is currently a Professor and a Ph.D. Supervisor with Fujian Normal University, Fuzhou, China. He has authored and coauthored more than 80 research papers and ten patents. His current research interests include security in cloud computing, multimedia security.
Prof. Yao is a professional member of the Asso...Show More
Zhiqiang Yao received the Ph.D. degree in computer system architecture from Xidian University, Xi’an, China, in 2014.
He is currently a Professor and a Ph.D. Supervisor with Fujian Normal University, Fuzhou, China. He has authored and coauthored more than 80 research papers and ten patents. His current research interests include security in cloud computing, multimedia security.
Prof. Yao is a professional member of the Asso...View more

I. Introduction

With the rapid digitalization of various industries, unlike the conventional manual recording of all kinds of industrial data, modern industry requires various industrial data be quickly recorded in real time by as many intelligent terminals as possible to provide accurate industrial services [1]. Mobile crowdsensing (MCS) refers to an interactive, participatory, and sensing mechanism over a wireless network formed by up to billions of Internet-based mobile sensing devices with various sensors, including GPS locators, accelerometers, environmental sensors, gyroscopes, among others [2]–[4]. Consequently, MCS is recognized as a typical intelligent data collection and processing paradigm, and has provided a promising opportunity to construct powerful industrial systems and provide industrial services, where industrial sensing tasks are distributed to individuals or groups for data collection [5], information analysis, and knowledge sharing [6]. Therefore, MCS is highly suitable for the industrial Internet of Things (IIoT) [7], [8]. MCS services utilize existing mobile devices and the IoT [9] to perform large-scale and fine-grained sensing tasks at high efficiency and low costs, and therefore, are widely used in the following innovative industrial applications: intelligent transportation systems, smart urban management, health monitoring, manufacturing systems, environmental monitoring, and social security surveillance, and many others [10], [11]. MCS renders many superiorities for the intelligent transportation system in IIoT, which mainly consists of autonomous vehicles, road-side units, traffic infrastructure, and GPS service [12]. It provides real-time traffic monitoring and navigation service through real-time road condition and vehicle condition monitoring. Combining MCS with connected vehicles [13], [14] to construct vehicular crowdsensing facilitates users with more personalized, coordinated, and safer services [15], [16]. Real-time traffic monitoring in vehicular crowdsensing authorizes the cloud service provider (CSP) to continuously collect real-time driving and vehicle information and acquire traffic conditions. To reduce the transmission latency and heavy bandwidth consumption associated with remote CSPs, fog computing [17] is employed to provide location-sensitive and latency-aware data processing in vehicular crowdsensing [18], [19].

Author image of Jinbo Xiong
Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Mathematics and Informatics, Fujian Normal University, Fuzhou, China
Jinbo Xiong (M’13) received the Ph.D. degree in computer system architecture from Xidian University, Xi’an, China, in 2013.
He is currently working as an Associate Professor with the Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Mathematics and Informatics, Fujian Normal University, Fujian, China. His research interests include mobile crowdsensing, privacy protection, and Internet of Things.
Jinbo Xiong (M’13) received the Ph.D. degree in computer system architecture from Xidian University, Xi’an, China, in 2013.
He is currently working as an Associate Professor with the Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Mathematics and Informatics, Fujian Normal University, Fujian, China. His research interests include mobile crowdsensing, privacy protection, and Internet of Things.View more
Author image of Rong Ma
Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Mathematics and Informatics, Fujian Normal University, Fuzhou, China
Rong Ma received the M.S. degree in computer applications from the College of Mathematics and Informatics, Fujian Normal University, Fuzhou, China, in 2019.
Her research interests include mobile crowdsensing security and privacy protection.
Rong Ma received the M.S. degree in computer applications from the College of Mathematics and Informatics, Fujian Normal University, Fuzhou, China, in 2019.
Her research interests include mobile crowdsensing security and privacy protection.View more
Author image of Lei Chen
College of Engineering and Computing, Georgia Southern University, Statesboro, USA
Lei Chen (M’05–SM’19) received the Ph.D. degree in computer science and software engineering from Auburn University, Auburn, AL, USA, in 2007.
He is currently a tenured Associate Professor and the Graduate Program Director with the Department of Information Technology, Georgia Southern University, Georgia, USA. His research interests include network, information, cloud, and big data security, digital forensics, mobile, handheld, and wireless security.
Lei Chen (M’05–SM’19) received the Ph.D. degree in computer science and software engineering from Auburn University, Auburn, AL, USA, in 2007.
He is currently a tenured Associate Professor and the Graduate Program Director with the Department of Information Technology, Georgia Southern University, Georgia, USA. His research interests include network, information, cloud, and big data security, digital forensics, mobile, handheld, and wireless security.View more
Author image of Youliang Tian
State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, China
Youliang Tian (M’18) received the B.Sc. degree in mathematics and applied mathematics, the M.Sc. degree in applied mathematics from GuiZhou University, Guizhou, China, in 2004 and 2009, respectively, and the Ph.D. degree in cryptography from Xi'dian University of Electronic Science nad Technology, Xi'an, China, in 2012.
From 2012 and 2015, he was a Postdoctoral Associate with the State Key Laboratory, Chinese Academy of Sciences. He is currently a Professor and a Ph.D. Supervisor with the College of Computer Science and Technology, Guizhou University. His current research interests include algorithmic game theory, cryptography, and security protocols.
Youliang Tian (M’18) received the B.Sc. degree in mathematics and applied mathematics, the M.Sc. degree in applied mathematics from GuiZhou University, Guizhou, China, in 2004 and 2009, respectively, and the Ph.D. degree in cryptography from Xi'dian University of Electronic Science nad Technology, Xi'an, China, in 2012.
From 2012 and 2015, he was a Postdoctoral Associate with the State Key Laboratory, Chinese Academy of Sciences. He is currently a Professor and a Ph.D. Supervisor with the College of Computer Science and Technology, Guizhou University. His current research interests include algorithmic game theory, cryptography, and security protocols.View more
Author image of Qi Li
School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China
Qi Li received the Ph.D. degree in computer system architecture from Xidian University, Xi’an, China, in 2014.
He is currently a Lecturer with the School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China. His research interests include cloud security, information security, and applied cryptography.
Qi Li received the Ph.D. degree in computer system architecture from Xidian University, Xi’an, China, in 2014.
He is currently a Lecturer with the School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China. His research interests include cloud security, information security, and applied cryptography.View more
Author image of Ximeng Liu
Fujian Provincial Key Laboratory of Information Security of Network Systems, College of Mathematics and Computer Science, Fuzhou University, Fuzhou, China
Ximeng Liu (M’16) received the B.Sc. degree in electronic engineering and the Ph.D. degree in cryptography from Xidian University, Xi'an, China, in 2010 and 2015, respectively.
He is currently a Professor with the Key Laboratory of Information Security of Network Systems, College of Mathematics and Computer Science, Fuzhou University, Fuzhou, China. His research interests include applied cryptography and big data security.
Ximeng Liu (M’16) received the B.Sc. degree in electronic engineering and the Ph.D. degree in cryptography from Xidian University, Xi'an, China, in 2010 and 2015, respectively.
He is currently a Professor with the Key Laboratory of Information Security of Network Systems, College of Mathematics and Computer Science, Fuzhou University, Fuzhou, China. His research interests include applied cryptography and big data security.View more
Author image of Zhiqiang Yao
Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Mathematics and Informatics, Fujian Normal University, Fuzhou, China
Zhiqiang Yao received the Ph.D. degree in computer system architecture from Xidian University, Xi’an, China, in 2014.
He is currently a Professor and a Ph.D. Supervisor with Fujian Normal University, Fuzhou, China. He has authored and coauthored more than 80 research papers and ten patents. His current research interests include security in cloud computing, multimedia security.
Prof. Yao is a professional member of the Association for Computer Machinery, senior member of the China Computer Federation.
Zhiqiang Yao received the Ph.D. degree in computer system architecture from Xidian University, Xi’an, China, in 2014.
He is currently a Professor and a Ph.D. Supervisor with Fujian Normal University, Fuzhou, China. He has authored and coauthored more than 80 research papers and ten patents. His current research interests include security in cloud computing, multimedia security.
Prof. Yao is a professional member of the Association for Computer Machinery, senior member of the China Computer Federation.View more
Contact IEEE to Subscribe

References

References is not available for this document.