|
|
Enhancing Privacy Preserving for Crowdsourced Monitoring A Game Theoretic Analysis Based Approach |
HE Yunhua①② SUN Limin①② YANG Weidong② LI Hong② |
①(School of Computer Science, Xidian University, Xi’an 710071, China)
②(Beijing Key Laboratory of Internet of Things Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China) |
|
|
Abstract Crowdsourcing traffic monitoring is a promising application, which exploits ubiquitous mobile devices to upload GPS samples to obtain live road traffic. However, uploading the sensitive location information raises significant privacy issues. By analyzing the upload behavior of mobile users, this paper designs a privacy preserving traffic data collection mechanism. Using the relationships among the traffic service quality, privacy loss and the upload behavior, an incomplete information game is built to analyze the upload behavior of users. Based on the existence and uniqueness of Nash equilibrium in this game, a user-centric privacy preserving traffic data collection mechanism is proposed, which can maximize the utilities of users, and this mechanism has a feature of incentive compatible. Finally, the experimental results on real world traffic data confirm the effectiveness of privacy protecting and the feature of incentive compatible.
|
Received: 15 June 2015
Published: 19 November 2015
|
|
Fund: The National Natural Science Foundation of China (61472418, 61202099), The Strategic Priority Research Program of the Chinese Academy of Sciences (XDA06040100) |
Corresponding Authors:
SUN Limin
E-mail: sunlimin@iie.ac.cn
|
|
|
|
[1] |
YANG D J, XUE G L, FANG X, et al. Incentive mechanisms for crowdsensing: crowdsourcing with smartphones[J]. IEEE/ACM Transactions on Networking, 2015, 99: 1-13.
|
[2] |
GAO S, MA J F, SHI W S, et al. TrPF: A trafectory privacy-preserving framework for participatory sensing[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(6): 874-887.
|
[3] |
MOHAN P, PADMANABHAN V N, and RAMJEE R. Nericell: rich monitoring of road and traffic conditions using mobile smartphones[C]. Proceedings of the ACM Conference on Embedded Networked Sensor Systems, North Carolina, 2008: 323-336.
|
[4] |
MONTJOYE Y A, HIDALGO C A, VERLEYSEN M, et al. Unique in the crowd: The privacy bounds of human mobility[R]. Nature Science Report, Cambridge, 2013.
|
[5] |
CHRIS M, DAVID Y, and NUNG Y. Privacy vulnerability of published anonymous mobility traces[J]. IEEE Transactions on Networking, 2013, 21(3): 720-733.
|
[6] |
孙利民, 李红, 王笑寒, 等. 物联网位置隐私保护综述[J]. 软件学报, 2014, 25(s1): 1-10.
|
|
SUN Limin, LI Hong, WANG Xiaohan, et al. Survey on the location privacy preservation in the internet of things[J]. Journal of Software, 2014, 25(s1): 1-10.
|
[7] |
SHI E, CHAN T H, RIEFFEL E, et al. Privacy-preserving aggregation of time-series data[C]. Proceedings of 18th Network & Distributed System Security Symposium, California, 2011: 1-17.
|
[8] |
HOH B, GRUTESER M, XIONG H, et al. Achieving guaranteed anonymity in gps traces via uncertainty-aware path cloaking [J]. IEEE Transactions on Mobile Computing, 2010, 9(8): 1089-1107.
|
[9] |
PALANISAMY B and LIU L. Attack-resilient mix-zones over road networks: architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2015, 14(3): 495-508.
|
[10] |
LIU X X, ZHAO H, PAN M, et al. Traffic-aware multiple mix zone placement for protecting location privacy[C]. Proceedings of the 31rd Annual IEEE International Conference on Computer Communications, Florida, 2012: 972-980.
|
[11] |
HOH B, IWUCHUKWU T, JACOBSON Q, et al. Enhancing privacy and accuracy in probe vehicle based traffic monitoring via virtual trip lines[J]. IEEE Transactions on Mobile Computing, 2012, 11(5): 849-864.
|
[12] |
DATATANG Company. Taxi GPS data of one city in north of china (200903)[OL]. http://dx.doi.org/10.1287/mnsc.1040. 0270.2014.12.
|
[13] |
SHOKRI R, THEODORAKOPOULOS G, BOUDEC J L, et al. Quantifying location privacy[C]. Proceedings of IEEE Symposium on Security and Privacy, California, 2011: 247-262.
|
[14] |
FREUDIGER J, MANSHAEI M H, HUBAUX J P, et al. Non-cooperative location privacy[J]. IEEE Transactions on Dependable and Secure Computing, 2013, 10(2): 84-98.
|
[15] |
葛国栋, 郭云飞, 刘彩霞, 等. 内容中心网络中面向隐私保护的协作缓存策略[J]. 电子与信息学报, 2015, 37(5): 1220-1226. doi: 10.11999/JEIT140874.
|
|
GE Guodong, GUO Yunfei, LIU Caixia, et al. A collaborative caching strategy for privacy protection in content centric networking[J]. Journal of Electronics & Information Technology, 2015, 37(5): 1220-1226. doi: 10.11999/JEIT- 140874.
|
[16] |
黄开枝, 洪颖, 罗文宇, 等. 基于演化博弈机制的物理层安全协作方法[J]. 电子与信息学报, 2015, 37(1): 193-199. doi:10. 11999/JEIT140309.
|
|
HUANG Kaizhi, HONG Ying, LUO Wenyu, et al. A method for physical layer security cooperation based on evolutionary game[J]. Journal of Electronics & Information Technology, 2015, 37(1): 193-199. doi:10.11999/JEIT140309.
|
[17] |
SHOKRI R, THEODORAKOPOULOS G, TRONCOSO C, et al. Protecting location privacy: Optimal strategy against localization attacks[C]. Proceedings of 19th ACM Conference on Computer and Communications Security, California, 2012: 617-627.
|
|
|
|