Privacy-Aware Trust-Based Recruitment in Social Participatory Sensing

نویسندگان

  • Haleh Amintoosi
  • Salil S. Kanhere
چکیده

The main idea behind social participatory sensing is to leverage social networks as the underlying infrastructure for recruiting social friends to participate in a sensing campaign. Such recruitment requires the transmission of messages (i.e., tasks and contributions) between the requester and participants via routes consisting of social links. When selecting the routes, the recruitment scheme should consider two fundamental factors. The first factor is the level of trustworthiness of a route, which evaluates its reliability to ensure that the integrity of the message is preserved. The second factor is the privacy level of the route, which measures information leakage in the form of disclosure of private information contained in the message by intermediate nodes. The best route will be the route with maximum credibility, i.e., highest trust score and lowest likelihood of privacy breach. In this paper, we propose a privacypreserving trust-based recruitment framework which is aimed at finding the best route from the requester to the selected participants. We propose to quantify the privacy score of a route by utilising the concept of entropy to measure the level of privacy breach in each intermediate node along the route. The trust score of the route is obtained by multiplying the mutual trust rates of all links along the route. Simulation results demonstrate the efficacy of our framework in terms of recruiting suitable participants through the most secure and trustable routes.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Trust-based privacy-aware participant selection in social participatory sensing

Themain idea behind social participatory sensing is to leverage social friends to participate in mobile sensing tasks. A main challenge, however, is the identification and recruitment of sufficient number of well-suited participants. This becomes especially more challenging for large-scale online social networks with unknown network topology and complex friendship relations. Moreover, the poten...

متن کامل

PEPPeR: A Querier's Privacy Enhancing Protocol for PaRticipatory Sensing

In this work we study the problem of querier privacy in the Participatory Sensing domain. While prior work has attempted to protect the privacy of people contributing sensing data from their mobile phones, little or no work has focused on the problem of querier privacy. Motivated by a novel communication model in which clients may directly query participatory sensing networks operated by potent...

متن کامل

A Self-Adaptive Behavior-Aware Recruitment Scheme for Participatory Sensing

Participatory sensing services utilizing the abundant social participants with sensor-enabled handheld smart device resources are gaining high interest nowadays. One of the challenges faced is the recruitment of participants by fully utilizing their daily activity behavior with self-adaptiveness toward the realistic application scenarios. In the paper, we propose a self-adaptive behavior-aware ...

متن کامل

User Controlled Privacy in Participatory Sensing

Most of the sensor network applications in military and civilian use are surreptitious. If these are used for the benefit of society in addition to the individual needs a new set of applications can be developed. This paper describes infrastructure monitoring based on collaboration between sensor networks. The solution provides a reputation based hybrid network where collaborative trust is esta...

متن کامل

Profile Privacy Aware Framework for Static objects Participatory Sensing

Mobile devices users in Participatory Sensing Systems (PSS) are required to collect information from their nearby data collection points (DCs). A query normally reveals the identity (id), location, and user profile (e.g., race domain). This information facilitates an adversary PS server to infer over time a comprehensive user location summary with a high degree of precision. Some privacy techni...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013