Task allocation method for Internet of vehicles spatial crowdsourcing with privacy protection

被引:1
|
作者
Liu X.-J. [1 ]
Wang H.-M. [1 ]
Xia Y.-J. [2 ]
Zhao S.-W. [1 ]
机构
[1] Key Laboratory of Cryptography of Zhejiang Province, School of Information Science and Technology, Hangzhou Normal University, Hangzhou
[2] College of Computer Science and Technology, Zhejiang University, Hangzhou
关键词
blockchain; Internet of vehicles; privacy protection; spatial crowdsourcing; task allocation;
D O I
10.3785/j.issn.1008-973X.2022.07.001
中图分类号
学科分类号
摘要
A task allocation method for Internet of vehicles spatial crowdsourcing with privacy protection was proposed under the blockchain architecture in order to solve the problem that centralized spatial crowdsourcing server in the traditional spatial crowdsourcing of Internet of vehicles was untrusted and vulnerable to malicious attacks, which posed a great threat to users’ privacy. A distributed and trusted spatial crowdsourcing system of Internet of vehicles was designed based on the blockchain technology. The multi-key homomorphic encryption algorithm was adopted to distribute tasks, which supported task allocation of location ciphertext data of different vehicle users (keys). Then the possibility of privacy disclosure of vehicle users was reduced. The experimental results show that the proposed method can effectively protect users’ privacy information, reduce the computing overhead of task allocation by 34.3% compared with the existing methods, and improve the efficiency of task allocation. © 2022 Zhejiang University. All rights reserved.
引用
收藏
页码:1267 / 1275
页数:8
相关论文
共 30 条
  • [21] LIU A, WANG W, SHANG S, Et al., Efficient task assignment in spatial crowdsourcing with worker and task privacy protection [J], GeoInformatica, 22, 2, pp. 335-362, (2018)
  • [22] LIU B, CHEN L, ZHU X, Et al., Protecting location privacy in spatial crowdsourcing using encrypted data [C], Proceedings of the 20th International Conference on Extending Database Technology, pp. 478-481, (2017)
  • [23] ZHANG J, JIANG Z L, LI P, Et al., Privacy-preserving multi-key computing framework for encrypted data in the cloud [J], Information Sciences, 575, pp. 217-230, (2021)
  • [24] ZHANG S, RAY S, LU R, Et al., Preserving location privacy for outsourced most-frequent item query in mobile crowdsensing [J], IEEE Internet of Things Journal, 8, 11, pp. 9139-9150, (2021)
  • [25] YANG D, XUE G, FANG X, Et al., Crowdsourcing to smartphones: Incentive mechanism design for mobile phone sensing [C], Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, pp. 173-184, (2012)
  • [26] BRESSON E, CATALANO D, POINTCHEVAL D., A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications [C], International Conference on the Theory and Application of Cryptology and Information Security, pp. 37-54, (2003)
  • [27] HUANG X, ZHAO D, PENG H., Empirical study of DSRC performance based on safety pilot model deployment data [J], IEEE Transactions on Intelligent Transportation Systems, 18, 10, pp. 2619-2628, (2017)
  • [28] YANG X, YI X, KHALIL I, Et al., A lightweight authentication scheme for vehicular ad hoc networks based on MSR [J], Vehicular Communications, 15, pp. 16-27, (2019)
  • [29] ZHENG K, ZHENG Q, CHATZIMISIOS P, Et al., Heterogeneous vehicular networking: a survey on architecture, challenges, and solutions [J], IEEE Communications Surveys and Tutorials, 17, 4, pp. 2377-2396, (2015)
  • [30] HAN S, LIN J, ZHAO S, Et al., Location privacy-preserving distance computation for spatial crowdsourcing [J], IEEE Internet of Things Journal, 7, 8, pp. 7550-7563, (2020)