메뉴 건너뛰기




Volumn 17, Issue 3, 2020, Pages 581-594

Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing

Author keywords

Fog computing; Mobile crowdsensing; Secure deduplication; Task allocation

Indexed keywords

CRYPTOGRAPHY; DATA ACQUISITION; DATA PRIVACY; EDGE COMPUTING; EFFICIENCY; FOG; HASH FUNCTIONS; INFORMATION MANAGEMENT; MOBILE TELECOMMUNICATION SYSTEMS; SENSORS;

EID: 85041186458     PISSN: 15455971     EISSN: 19410018     Source Type: Journal    
DOI: 10.1109/TDSC.2018.2791432     Document Type: Article
Times cited : (99)

References (42)
  • 1
    • 81355138524 scopus 로고    scopus 로고
    • Mobile crowdsensing: Current state and future challenges
    • Nov
    • R. K. Ganti, F. Ye, and H. Lei, "Mobile crowdsensing: Current state and future challenges," IEEE Commun. Mag., vol. 49, no. 11, pp. 32-39, Nov. 2011.
    • (2011) IEEE Commun. Mag. , vol.49 , Issue.11 , pp. 32-39
    • Ganti, R.K.1    Ye, F.2    Lei, H.3
  • 2
    • 85049754364 scopus 로고    scopus 로고
    • Realtime and spatio-temporal crowd-sourced social network data publishing with differential privacy
    • Aug
    • Q. Wang, Y. Zhang, X. Lu, Z. Wang, Z. Qin, and K. Ren, "Realtime and spatio-temporal crowd-sourced social network data publishing with differential privacy," IEEE Trans. Depend. Sec., Aug. 2016, doi: 10.1109/TDSC.2016.2599873.
    • (2016) IEEE Trans. Depend. Sec.
    • Wang, Q.1    Zhang, Y.2    Lu, X.3    Wang, Z.4    Qin, Z.5    Ren, K.6
  • 3
    • 85028394313 scopus 로고    scopus 로고
    • Mobile crowdsensing in software defined opportunistic networks
    • Jun
    • H. Li, K. Ota, M. Dong, and M. Guo, "Mobile crowdsensing in software defined opportunistic networks," IEEE Commun. Mag., vol. 55, no. 6, pp. 140-145, Jun. 2017.
    • (2017) IEEE Commun. Mag. , vol.55 , Issue.6 , pp. 140-145
    • Li, H.1    Ota, K.2    Dong, M.3    Guo, M.4
  • 5
    • 84976609538 scopus 로고    scopus 로고
    • A server-assigned spatial crowdsourcing framework
    • H. To, C. Shahabi, and L. Kazemi, "A server-assigned spatial crowdsourcing framework," ACM Trans. Spatial Algorithms Syst., vol. 1, no. 1, pp. 1-28, 2015.
    • (2015) ACM Trans. Spatial Algorithms Syst. , vol.1 , Issue.1 , pp. 1-28
    • To, H.1    Shahabi, C.2    Kazemi, L.3
  • 6
    • 84962419824 scopus 로고    scopus 로고
    • Incentives for mobile crowd sensing: A survey
    • Jan.-Mar
    • X. Zhang, et al., "Incentives for mobile crowd sensing: A survey," IEEE Commun. Surveys Tuts., vol. 18, no. 1, pp. 54-67, Jan.-Mar. 2016.
    • (2016) IEEE Commun. Surveys Tuts. , vol.18 , Issue.1 , pp. 54-67
    • Zhang, X.1
  • 8
    • 84969872497 scopus 로고    scopus 로고
    • Providing privacy-aware incentives in mobile sensing systems
    • Jun
    • Q. Li and G. Cao, "Providing privacy-aware incentives in mobile sensing systems," IEEE Trans. Mobile Comput., vol. 15, no. 6, pp. 1485-1498, Jun. 2016.
    • (2016) IEEE Trans. Mobile Comput. , vol.15 , Issue.6 , pp. 1485-1498
    • Li, Q.1    Cao, G.2
  • 11
    • 84970006994 scopus 로고    scopus 로고
    • Privacy protection for wireless medical sensor data
    • May/Jun
    • X. Yi, B. Athman, G. Dimitrios, S. Andy, and W. Jan, "Privacy protection for wireless medical sensor data," IEEE Trans. Depend. Sec., vol. 13, no. 3, pp. 369-380, May/Jun. 2016.
    • (2016) IEEE Trans. Depend. Sec. , vol.13 , Issue.3 , pp. 369-380
    • Yi, X.1    Athman, B.2    Dimitrios, G.3    Andy, S.4    Jan, W.5
  • 12
    • 85056678461 scopus 로고    scopus 로고
    • Trust based incentive scheme to allocate big data tasks with mobile social cloud
    • Oct
    • Q. Xu, Z. Su, S. Yu, and Y. Wang, "Trust based incentive scheme to allocate big data tasks with mobile social cloud," IEEE Trans. Big Data, Oct. 2017, doi: 10.1109/TBDATA.2017.2764925.
    • (2017) IEEE Trans. Big Data
    • Xu, Q.1    Su, Z.2    Yu, S.3    Wang, Y.4
  • 13
    • 84996757871 scopus 로고    scopus 로고
    • Finding your way in the fog: Towards a comprehensive definition of fog computing
    • L. M. Vaquero and L. Rodero-merino, "Finding your way in the fog: Towards a comprehensive definition of fog computing," ACM SIGCOMMComput. Commun. Rev., vol. 44, no. 5, pp. 27-32, 2014.
    • (2014) ACM SIGCOMMComput. Commun. Rev. , vol.44 , Issue.5 , pp. 27-32
    • Vaquero, L.M.1    Rodero-Merino, L.2
  • 14
    • 85042096235 scopus 로고    scopus 로고
    • Securing fog computing for internet of things applications: Challenges and solutions
    • Oct
    • J. Ni, K. Zhang, X. Lin, and X. Shen, "Securing fog computing for internet of things applications: Challenges and solutions," IEEE Commun. Surveys Tuts.,Oct. 2017, doi: 10.1109/COMST.2017.2762345.
    • (2017) IEEE Commun. Surveys Tuts.
    • Ni, J.1    Zhang, K.2    Lin, X.3    Shen, X.4
  • 20
    • 84908518704 scopus 로고    scopus 로고
    • Enabling reputation and trust in privacy-preserving mobile sensing
    • Dec
    • X. O. Wang, W. Cheng, P. Mohapatra, and T. Abdelzaher, "Enabling reputation and trust in privacy-preserving mobile sensing," IEEE Trans. Mobile Comput., vol. 13, no. 12, pp. 2777-2790, Dec. 2014.
    • (2014) IEEE Trans. Mobile Comput. , vol.13 , Issue.12 , pp. 2777-2790
    • Wang, X.O.1    Cheng, W.2    Mohapatra, P.3    Abdelzaher, T.4
  • 24
    • 84960857721 scopus 로고    scopus 로고
    • CCS-TA: Quality-guaranteed online task allocation in compressive crowdsensing
    • L. Wang, et al., "CCS-TA: Quality-guaranteed online task allocation in compressive crowdsensing," in Proc. ACM Int. Joint Conf. Pervasive Ubiquitous Comput., 2015, pp. 683-694.
    • (2015) Proc. ACM Int. Joint Conf. Pervasive Ubiquitous Comput. , pp. 683-694
    • Wang, L.1
  • 25
    • 84929152831 scopus 로고    scopus 로고
    • EEMC: Enabling energy-efficient mobile crowdsensing with anonymous participants
    • H. Xiong, D. Zhang, L. Wang, J. P. Gibson, and J. Zhu, "EEMC: Enabling energy-efficient mobile crowdsensing with anonymous participants," ACM Trans. Intell. Syst. Technol., vol. 6, no. 3, 2015, Art. no. 39.
    • (2015) ACM Trans. Intell. Syst. Technol. , vol.6 , Issue.3
    • Xiong, H.1    Zhang, D.2    Wang, L.3    Gibson, J.P.4    Zhu, J.5
  • 26
    • 85030453076 scopus 로고    scopus 로고
    • Energy-aware participant selection for smartphone-enabled mobile crowd sensing
    • Sep
    • C. Liu, B. Zhang, X. Su, J. Ma, W. Wang, and K. K. Leung, "Energy-aware participant selection for smartphone-enabled mobile crowd sensing," IEEE Syst. J., vol. 11, no. 3, pp. 1435-1446, Sep. 2017.
    • (2017) IEEE Syst. J. , vol.11 , Issue.3 , pp. 1435-1446
    • Liu, C.1    Zhang, B.2    Su, X.3    Ma, J.4    Wang, W.5    Leung, K.K.6
  • 29
    • 84927584035 scopus 로고    scopus 로고
    • A hybrid cloud approach for secure authorized deduplication
    • May
    • J. Li, Y. K. Li, X. Chen, P. Lee, and W. Lou, "A hybrid cloud approach for secure authorized deduplication," IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 5, pp. 1206-1216, May 2015.
    • (2015) IEEE Trans. Parallel Distrib. Syst. , vol.26 , Issue.5 , pp. 1206-1216
    • Li, J.1    Li, Y.K.2    Chen, X.3    Lee, P.4    Lou, W.5
  • 30
    • 84901032811 scopus 로고    scopus 로고
    • Secure deduplication with efficient and reliable convergent key management
    • Jun
    • J. Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou, "Secure deduplication with efficient and reliable convergent key management," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 6, pp. 1615-1625, Jun. 2014.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.6 , pp. 1615-1625
    • Li, J.1    Chen, X.2    Li, M.3    Li, J.4    Lee, P.5    Lou, W.6
  • 31
    • 84957709790 scopus 로고    scopus 로고
    • Secure data deduplication with reliable key management for dynamic updates in CPSs
    • Dec
    • M. Wen, K. Ota, H. Li, J. Lei, C. Gu, and Z. Su, "Secure data deduplication with reliable key management for dynamic updates in CPSs," IEEE Trans. Comput. Social Syst., vol. 2, no. 4, pp. 137-147, Dec. 2015.
    • (2015) IEEE Trans. Comput. Social Syst. , vol.2 , Issue.4 , pp. 137-147
    • Wen, M.1    Ota, K.2    Li, H.3    Lei, J.4    Gu, C.5    Su, Z.6
  • 32
    • 84954136616 scopus 로고    scopus 로고
    • Secure deduplication of encrypted data without additional independent servers
    • J. Liu, N. Asokan, and B. Pinkas, "Secure deduplication of encrypted data without additional independent servers," in Proc. ACM SIGSAC Conf. Comput. Commun. Secur., 2015, pp. 874-885.
    • (2015) Proc. ACM SIGSAC Conf. Comput. Commun. Secur. , pp. 874-885
    • Liu, J.1    Asokan, N.2    Pinkas, B.3
  • 33
    • 84983247032 scopus 로고    scopus 로고
    • Enabling secure and effective near-duplicate detection over encrypted in-network storage
    • H. Cui, X. Yuan, Y. Zheng, and C. Wang, "Enabling secure and effective near-duplicate detection over encrypted in-network storage," in Proc. IEEE INFOCOM, 2016, pp. 1-9.
    • (2016) Proc. IEEE INFOCOM , pp. 1-9
    • Cui, H.1    Yuan, X.2    Zheng, Y.3    Wang, C.4
  • 34
    • 85027489346 scopus 로고    scopus 로고
    • Toward encrypted cloud media center with secure deduplication
    • Feb
    • Y. Zheng, X. Yuan, X. Wang, J. Jiang, C. Wang, and X. Gui, "Toward encrypted cloud media center with secure deduplication," IEEE Trans. Multimedia, vol. 19, no. 2, pp. 251-265, Feb. 2017.
    • (2017) IEEE Trans. Multimedia , vol.19 , Issue.2 , pp. 251-265
    • Zheng, Y.1    Yuan, X.2    Wang, X.3    Jiang, J.4    Wang, C.5    Gui, X.6
  • 35
    • 85015396702 scopus 로고    scopus 로고
    • Secure and deduplicated spatial crowdsourcing: A fog-based approach
    • J. Ni, X. Lin, K. Zhang, and Y. Yu, "Secure and deduplicated spatial crowdsourcing: A fog-based approach," in Proc. IEEE Global Commun. Conf., 2016, pp. 1-6.
    • (2016) Proc. IEEE Global Commun. Conf. , pp. 1-6
    • Ni, J.1    Lin, X.2    Zhang, K.3    Yu, Y.4
  • 36
    • 84975226279 scopus 로고    scopus 로고
    • Protecting mobile crowd sensing against Sybil attacks using cloud based trust management system
    • S. Chang and Z. Chen, "Protecting mobile crowd sensing against Sybil attacks using cloud based trust management system," Mobile Inf. Syst., vol. 2016, 2016, pp. 1-9.
    • (2016) Mobile Inf. Syst. , vol.2016 , pp. 1-9
    • Chang, S.1    Chen, Z.2
  • 37
    • 84893397951 scopus 로고    scopus 로고
    • Smartphone-based crowdsourcing for network monitoring: Opportunities, challenges, and a case study
    • Jan
    • A. Faggiani, E. Gregori, L. Lenzini, V. Luconi, and A. Vecchio, "Smartphone-based crowdsourcing for network monitoring: Opportunities, challenges, and a case study," IEEE Commun. Mag., vol. 52, no. 1, pp. 106-113, Jan. 2014.
    • (2014) IEEE Commun. Mag. , vol.52 , Issue.1 , pp. 106-113
    • Faggiani, A.1    Gregori, E.2    Lenzini, L.3    Luconi, V.4    Vecchio, A.5
  • 40
    • 84958612917 scopus 로고    scopus 로고
    • Efficient group signature schemes for large group (extended abstract)
    • J. Camenisch and M. Stadler, "Efficient group signature schemes for large group (extended abstract)," in Proc. Annu. Int. Cryptology Conf., 1997, pp. 410-424.
    • (1997) Proc. Annu. Int. Cryptology Conf. , pp. 410-424
    • Camenisch, J.1    Stadler, M.2
  • 42
    • 85049749368 scopus 로고    scopus 로고
    • Exploiting social network to enhance human-to-human infection analysis without privacy leakage
    • Nov
    • K. Zhang, X. Liang, J. Ni, K. Yang, and X. Shen, "Exploiting social network to enhance human-to-human infection analysis without privacy leakage," IEEE Trans. Depend. Sec., Nov. 2016, doi: 10.1109/TDSC.2016.2626288
    • (2016) IEEE Trans. Depend. Sec.
    • Zhang, K.1    Liang, X.2    Ni, J.3    Yang, K.4    Shen, X.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.