Abstract
Smart phones have advanced at a very fast pace in recent years. These advancement leads to the concern of exploitation of users’ personal information due to non-restricted usage of data by any third party applications. Mobile crowdsourcing has evolved as an appropriate method for collecting the data or finding solution of a broadcasted task where the mobile phone users can perform the task anytime and anywhere as they wish. However, sensitive information like location, contact details etc. are provided by mobile users for validation which may results in the privacy breach as the data could be misused. There have been many researches to find some tools for ensuring privacy of the mobile phone users. However, the appropriateness of these tools may not be identified by the users which require additional protection of the data to maintain the confidentiality. The motive of this research is to provide secure environment for the users or workers of crowd sourcing by protecting their personal and sensitive information. Therefore, SALT cryptography is used in proposed solution for ensuring the privacy. SALT is used as a noise with the user’s personal information so that only the valid users will be able to access the information. The obtained results are in well support of the proposed solution.
Similar content being viewed by others
References
Mao K, Capra L, Harman M, Jia Y (2017) A survey of the use of crowd sourcing in software engineering. J Syst Softw 126:57–84
Mavandadi S, Dimitrov S, Feng S, Yu F, Sikora U, Yaglidere O, Padmanabhan S, Nielson K, Ozcan A (2012) Distributed medical image analysis and diagnosis through crowd-sourced games: a malaria case study. PLoS One 7(5):e37245
Wang Y, Jia X, Jin Q, Ma J (2015) Mobile crowd sourcing: architecture, applications, and challenges. In: Proceedings of UIC-ATC-ScalCom-CBDCom-IoP, IEEE, pp 1127–1132
Sharma N, Rathi R, Jain V, Saifi MW (2012) A novel technique for secure information transmission in videos using salt cryptography. In: Engineering (NUiCONE), 2012 Nirma University international conference on IEEE, pp 1–6
Churi PP, Ghate V, Ghag K (2015) Jumbling-salting: an improvised approach for password encryption. In: Science and technology (TICST), 2015 international conference on IEEE, pp 236–242
Gong Y, Guo Y, Fang Y (2014) A privacy-preserving task recommendation framework for mobile crowd sourcing. In: Global communications conference (GLOBECOM), 2014 IEEE, pp 588–593
Gong Y, Wei L, Guo Y, Zhang C, Fang Y (2016) Optimal task recommendation for mobile crowd sourcing with privacy control. IEEE Internet Things J 3(5):745–756
Liu R, Cao J, Yang L, Zhang K (2015) Priwe: recommendation for privacy settings of mobile apps based on crowd sourced users' expectations. In: mobile services (MS), 2015 IEEE international conference on IEEE, pp 150–157.
Tseng CM, Chau CK (2016) On the privacy of crowd-sourced data collection for distance-to-empty prediction and eco-routing. In: Proceedings of the workshop on electric vehicle systems, data, and applications ACM, pp 1–3
Wang Y, Cai Z, Yin G, Gao Y, Tong X, Wu G (2016) An incentive mechanism with privacy protection in mobile crowdsourcing systems. Comput Netw 102:157–171
Zhang B, Liu CH, Lu J, Song Z, Ren Z, Ma J, Wang W (2016) Privacy-preserving QoI-aware participant coordination for mobile crowdsourcing. Comput Netw 101:29–41
Kandappu T, Misra A, Cheng SF, Lau HC (2017) Privacy in context-aware mobile crowd sourcing systems. In: Pervasive computing and communications workshops (PerCom workshops), 2017 IEEE international conference on IEEE, pp 231–236
Ziegeldorf JH, Henze M, Bavendiek J, Wehrle K (2017) TraceMixer: privacy-preserving crowd-sensing sans trusted third party. In: Wireless on-demand network systems and services (WONS), 2017 13th annual conference on IEEE, pp 17–24
Zhang LL, Liang CJM, Li ZL, Liu Y, Zhao F, Chen E (2018) Characterizing privacy risks of mobile apps with sensitivity analysis. IEEE Trans Mob Comput 17(2):279–292
Myers AC, Liskov B (2000) Protecting privacy using the decentralized label model. ACM Trans Softw Eng Methodol (TOSEM) 9(4):410–442
Enck W, Gilbert P, Han S, Tendulkar V, Chun BG, Cox LP, Jung J, McDaniel P, Sheth AN (2014) TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans Comput Syst (TOCS) 32(2):5
Beresford AR, Rice A, Skehin N, Sohan R (2011) Mockdroid: trading privacy for application functionality on smartphones. In: Proceedings of the 12th workshop on mobile computing systems and applications ACM. https://doi.org/10.1145/2184489.2184500
Agarwal Y, Hall M (2013) ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing. In: Proceeding of the 11th annual international conference on mobile systems, applications, and services ACM, pp 97–110
Lin J, Amini S, Hong JI, Sadeh N, Lindqvist J, Zhang J (2012) Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing. In: Proceedings of the 2012 ACM conference on ubiquitous computing ACM, pp 501–510
Chen X, Wu X, Li XY, He Y, Liu Y (2014) Privacy-preserving high-quality map generation with participatory sensing. In: INFOCOM, 2014 Proceedings IEEE, pp 2310–2318
Yao Y, Yang LT, Xiong NN (2015) Anonymity-based privacy-preserving data reporting for participatory sensing. IEEE Internet Things J 2(5):381–390
Gisdakis S, Giannetsos T, Papadimitratos P (2016) Security, privacy, and incentive provision for mobile crowd sensing systems. IEEE Internet Things J 3(5):839–853
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Joshi, S., Saini, H. & Rathee, G. SALT cryptography for privacy in mobile crowdsourcing. Int. j. inf. tecnol. 12, 585–591 (2020). https://doi.org/10.1007/s41870-019-00281-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41870-019-00281-2