Skip to main content
Log in

SALT cryptography for privacy in mobile crowdsourcing

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

Smart phones have advanced at a very fast pace in recent years. These advancement leads to the concern of exploitation of users’ personal information due to non-restricted usage of data by any third party applications. Mobile crowdsourcing has evolved as an appropriate method for collecting the data or finding solution of a broadcasted task where the mobile phone users can perform the task anytime and anywhere as they wish. However, sensitive information like location, contact details etc. are provided by mobile users for validation which may results in the privacy breach as the data could be misused. There have been many researches to find some tools for ensuring privacy of the mobile phone users. However, the appropriateness of these tools may not be identified by the users which require additional protection of the data to maintain the confidentiality. The motive of this research is to provide secure environment for the users or workers of crowd sourcing by protecting their personal and sensitive information. Therefore, SALT cryptography is used in proposed solution for ensuring the privacy. SALT is used as a noise with the user’s personal information so that only the valid users will be able to access the information. The obtained results are in well support of the proposed solution.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Mao K, Capra L, Harman M, Jia Y (2017) A survey of the use of crowd sourcing in software engineering. J Syst Softw 126:57–84

    Article  Google Scholar 

  2. Mavandadi S, Dimitrov S, Feng S, Yu F, Sikora U, Yaglidere O, Padmanabhan S, Nielson K, Ozcan A (2012) Distributed medical image analysis and diagnosis through crowd-sourced games: a malaria case study. PLoS One 7(5):e37245

    Article  Google Scholar 

  3. Wang Y, Jia X, Jin Q, Ma J (2015) Mobile crowd sourcing: architecture, applications, and challenges. In: Proceedings of UIC-ATC-ScalCom-CBDCom-IoP, IEEE, pp 1127–1132

  4. Sharma N, Rathi R, Jain V, Saifi MW (2012) A novel technique for secure information transmission in videos using salt cryptography. In: Engineering (NUiCONE), 2012 Nirma University international conference on IEEE, pp 1–6

  5. Churi PP, Ghate V, Ghag K (2015) Jumbling-salting: an improvised approach for password encryption. In: Science and technology (TICST), 2015 international conference on IEEE, pp 236–242

  6. Gong Y, Guo Y, Fang Y (2014) A privacy-preserving task recommendation framework for mobile crowd sourcing. In: Global communications conference (GLOBECOM), 2014 IEEE, pp 588–593

  7. Gong Y, Wei L, Guo Y, Zhang C, Fang Y (2016) Optimal task recommendation for mobile crowd sourcing with privacy control. IEEE Internet Things J 3(5):745–756

    Article  Google Scholar 

  8. Liu R, Cao J, Yang L, Zhang K (2015) Priwe: recommendation for privacy settings of mobile apps based on crowd sourced users' expectations. In: mobile services (MS), 2015 IEEE international conference on IEEE, pp 150–157.

  9. Tseng CM, Chau CK (2016) On the privacy of crowd-sourced data collection for distance-to-empty prediction and eco-routing. In: Proceedings of the workshop on electric vehicle systems, data, and applications ACM, pp 1–3

  10. Wang Y, Cai Z, Yin G, Gao Y, Tong X, Wu G (2016) An incentive mechanism with privacy protection in mobile crowdsourcing systems. Comput Netw 102:157–171

    Article  Google Scholar 

  11. Zhang B, Liu CH, Lu J, Song Z, Ren Z, Ma J, Wang W (2016) Privacy-preserving QoI-aware participant coordination for mobile crowdsourcing. Comput Netw 101:29–41

    Article  Google Scholar 

  12. Kandappu T, Misra A, Cheng SF, Lau HC (2017) Privacy in context-aware mobile crowd sourcing systems. In: Pervasive computing and communications workshops (PerCom workshops), 2017 IEEE international conference on IEEE, pp 231–236

  13. Ziegeldorf JH, Henze M, Bavendiek J, Wehrle K (2017) TraceMixer: privacy-preserving crowd-sensing sans trusted third party. In: Wireless on-demand network systems and services (WONS), 2017 13th annual conference on IEEE, pp 17–24

  14. Zhang LL, Liang CJM, Li ZL, Liu Y, Zhao F, Chen E (2018) Characterizing privacy risks of mobile apps with sensitivity analysis. IEEE Trans Mob Comput 17(2):279–292

    Article  Google Scholar 

  15. Myers AC, Liskov B (2000) Protecting privacy using the decentralized label model. ACM Trans Softw Eng Methodol (TOSEM) 9(4):410–442

    Article  Google Scholar 

  16. Enck W, Gilbert P, Han S, Tendulkar V, Chun BG, Cox LP, Jung J, McDaniel P, Sheth AN (2014) TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans Comput Syst (TOCS) 32(2):5

    Article  Google Scholar 

  17. Beresford AR, Rice A, Skehin N, Sohan R (2011) Mockdroid: trading privacy for application functionality on smartphones. In: Proceedings of the 12th workshop on mobile computing systems and applications ACM. https://doi.org/10.1145/2184489.2184500

  18. Agarwal Y, Hall M (2013) ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing. In: Proceeding of the 11th annual international conference on mobile systems, applications, and services ACM, pp 97–110

  19. Lin J, Amini S, Hong JI, Sadeh N, Lindqvist J, Zhang J (2012) Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing. In: Proceedings of the 2012 ACM conference on ubiquitous computing ACM, pp 501–510

  20. Chen X, Wu X, Li XY, He Y, Liu Y (2014) Privacy-preserving high-quality map generation with participatory sensing. In: INFOCOM, 2014 Proceedings IEEE, pp 2310–2318

  21. Yao Y, Yang LT, Xiong NN (2015) Anonymity-based privacy-preserving data reporting for participatory sensing. IEEE Internet Things J 2(5):381–390

    Article  Google Scholar 

  22. Gisdakis S, Giannetsos T, Papadimitratos P (2016) Security, privacy, and incentive provision for mobile crowd sensing systems. IEEE Internet Things J 3(5):839–853

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shailja Joshi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Joshi, S., Saini, H. & Rathee, G. SALT cryptography for privacy in mobile crowdsourcing. Int. j. inf. tecnol. 12, 585–591 (2020). https://doi.org/10.1007/s41870-019-00281-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41870-019-00281-2

Keywords

Navigation