scispace - formally typeset
Journal ArticleDOI

Privacy-Preserving Task Recommendation Services for Crowdsourcing

Reads0
Chats0
TLDR
A privacy-preserving task recommendation scheme (PPTR) for crowdsourcing is proposed, which achieves the task-worker matching while preserving both task privacy and worker privacy.
Abstract
Crowdsourcing is a distributed computing paradigm that utilizes human intelligence or resources from a crowd of workers. Existing solutions of task recommendation in crowdsourcing may leak private and sensitive information about both tasks and workers. To protect privacy, information about tasks and workers should be encrypted before being outsourced to the crowdsourcing platform, which makes the task recommendation a challenging problem. In this paper, we propose a privacy-preserving task recommendation scheme (PPTR) for crowdsourcing, which achieves the task-worker matching while preserving both task privacy and worker privacy. In PPTR, we first exploit the polynomial function to express multiple keywords of task requirements and worker interests. Then, we design a key derivation method based on matrix decomposition, to realize the multi-keyword matching between multiple requesters and multiple workers. Through PPTR, user accountability and user revocation are achieved effectively and efficiently. Extensive privacy analysis and performance evaluation show that PPTR is secure and efficient.

read more

Citations
More filters
Journal ArticleDOI

Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-Assisted Industrial IoT

TL;DR: It is demonstrated that the CLS scheme fails to achieve the claimed security properties by presenting four types of signature forgery attacks, and a robust certificateless signature (RCLS) scheme is proposed to address the aforementioned challenges.
Journal ArticleDOI

Privacy-Aware Cross-Platform Service Recommendation Based on Enhanced Locality-Sensitive Hashing

TL;DR: The classic Locality-Sensitive Hashing (LSH) technique is enhanced, after which an approach based on enhanced LSH is proposed for accurate and less-sensitive cross-platform recommendation decision-makings.
Journal ArticleDOI

Collaborative Intrusion Detection for VANETs: A Deep Learning-Based Distributed SDN Approach

TL;DR: Deep learning with generative adversarial networks is utilized and distributed SDN is explored to design a collaborative intrusion detection system (CIDS) for VANETs, which enables multiple SDN controllers jointly train a global intrusion detection model for the entire network without directly exchanging their sub-network flows.
Journal ArticleDOI

Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things

TL;DR: This paper introduces SSH, a Secure Smart Health system with privacy-aware aggregate authentication and access control in IoT, and formal security proofs indicate that SSH achieves batch authentication and non-repudiation under the Computational Diffie-Hellman assumption.
Journal ArticleDOI

Healthchain: A novel framework on privacy preservation of electronic health records using blockchain technology.

TL;DR: The proposed model shows that the healthcare records are not traceable to unauthorized access as the model stores only the encrypted hash of the records that proves effectiveness in terms of data security, enhanced data privacy, improved data scalability, interoperability and data integrity while sharing and accessing medical records among stakeholders across the healthchain network.
References
More filters
Proceedings ArticleDOI

Practical techniques for searches on encrypted data

TL;DR: This work describes the cryptographic schemes for the problem of searching on encrypted data and provides proofs of security for the resulting crypto systems, and presents simple, fast, and practical algorithms that are practical to use today.
Book ChapterDOI

Public Key Encryption with Keyword Search

TL;DR: This work defines and construct a mechanism that enables Alice to provide a key to the gateway that enables the gateway to test whether the word “urgent” is a keyword in the email without learning anything else about the email.
Proceedings ArticleDOI

Searchable symmetric encryption: improved definitions and efficient constructions

TL;DR: In this paper, the authors proposed a searchable symmetric encryption (SSE) scheme for the multi-user setting, where queries to the server can be chosen adaptively during the execution of the search.
Book ChapterDOI

Collusion resistant broadcast encryption with short ciphertexts and private keys

TL;DR: In this paper, the authors describe two new public key broadcast encryption systems for stateless receivers, which are fully secure against any number of colluders and provide a tradeoff between ciphertext size and public key size.
Journal ArticleDOI

Searchable symmetric encryption: Improved definitions and efficient constructions

TL;DR: This paper begins by reviewing existing notions of security and proposes new and stronger security definitions, and presents two constructions that show secure under these new definitions and are more efficient than all previous constructions.
Related Papers (5)