Privacy preserving method based on Voronoi diagram in mobile crowd computing
With the development of mobile smartphones equipped with a large number of sensor devices, mobile crowd computing has become the hotspot of current research. In the application, the publishers use the application platform to release the task and then select the appropriate users to participate in th...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi - SAGE Publishing
2017-10-01
|
Series: | International Journal of Distributed Sensor Networks |
Online Access: | https://doi.org/10.1177/1550147717739156 |
_version_ | 1797764482814967808 |
---|---|
author | Hao Long Shukui Zhang Jin Wang Cheng-Kuan Lin Jia-Jun Cheng |
author_facet | Hao Long Shukui Zhang Jin Wang Cheng-Kuan Lin Jia-Jun Cheng |
author_sort | Hao Long |
collection | DOAJ |
description | With the development of mobile smartphones equipped with a large number of sensor devices, mobile crowd computing has become the hotspot of current research. In the application, the publishers use the application platform to release the task and then select the appropriate users to participate in the task by bidding and collect their data, in which the users’ identity, location, and other private information face the risk of disclosure. To solve the problem of privacy disclosure in mobile crowd computing, we propose a privacy preserving method based on Voronoi Polygon (PP - Voronoi). The users construct the Voronoi diagram to form a cloaked region hiding users identity and then calculate the anchor point of the cloaked region, by which the users communicate with the task publisher to achieve privacy protection of the cloaked region and K anonymity. The experimental results show that compared with other privacy preserving methods, PP-Voronoi method has better effectiveness of privacy protection and lower network traffic. |
first_indexed | 2024-03-12T19:56:21Z |
format | Article |
id | doaj.art-d6cbad8b5dbf47c8b2e03bd24045372c |
institution | Directory Open Access Journal |
issn | 1550-1477 |
language | English |
last_indexed | 2024-03-12T19:56:21Z |
publishDate | 2017-10-01 |
publisher | Hindawi - SAGE Publishing |
record_format | Article |
series | International Journal of Distributed Sensor Networks |
spelling | doaj.art-d6cbad8b5dbf47c8b2e03bd24045372c2023-08-02T02:47:46ZengHindawi - SAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772017-10-011310.1177/1550147717739156Privacy preserving method based on Voronoi diagram in mobile crowd computingHao Long0Shukui Zhang1Jin Wang2Cheng-Kuan Lin3Jia-Jun Cheng4School of Information and Electrical Engineering, Xuzhou College of Industrial Technology, Xuzhou, ChinaJiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing, ChinaSchool of Computer Science and Technology, Soochow University, Suzhou, ChinaSchool of Computer Science and Technology, Soochow University, Suzhou, ChinaSchool of Computer Science and Technology, Soochow University, Suzhou, ChinaWith the development of mobile smartphones equipped with a large number of sensor devices, mobile crowd computing has become the hotspot of current research. In the application, the publishers use the application platform to release the task and then select the appropriate users to participate in the task by bidding and collect their data, in which the users’ identity, location, and other private information face the risk of disclosure. To solve the problem of privacy disclosure in mobile crowd computing, we propose a privacy preserving method based on Voronoi Polygon (PP - Voronoi). The users construct the Voronoi diagram to form a cloaked region hiding users identity and then calculate the anchor point of the cloaked region, by which the users communicate with the task publisher to achieve privacy protection of the cloaked region and K anonymity. The experimental results show that compared with other privacy preserving methods, PP-Voronoi method has better effectiveness of privacy protection and lower network traffic.https://doi.org/10.1177/1550147717739156 |
spellingShingle | Hao Long Shukui Zhang Jin Wang Cheng-Kuan Lin Jia-Jun Cheng Privacy preserving method based on Voronoi diagram in mobile crowd computing International Journal of Distributed Sensor Networks |
title | Privacy preserving method based on Voronoi diagram in mobile crowd computing |
title_full | Privacy preserving method based on Voronoi diagram in mobile crowd computing |
title_fullStr | Privacy preserving method based on Voronoi diagram in mobile crowd computing |
title_full_unstemmed | Privacy preserving method based on Voronoi diagram in mobile crowd computing |
title_short | Privacy preserving method based on Voronoi diagram in mobile crowd computing |
title_sort | privacy preserving method based on voronoi diagram in mobile crowd computing |
url | https://doi.org/10.1177/1550147717739156 |
work_keys_str_mv | AT haolong privacypreservingmethodbasedonvoronoidiagraminmobilecrowdcomputing AT shukuizhang privacypreservingmethodbasedonvoronoidiagraminmobilecrowdcomputing AT jinwang privacypreservingmethodbasedonvoronoidiagraminmobilecrowdcomputing AT chengkuanlin privacypreservingmethodbasedonvoronoidiagraminmobilecrowdcomputing AT jiajuncheng privacypreservingmethodbasedonvoronoidiagraminmobilecrowdcomputing |