Privacy preserving method based on Voronoi diagram in mobile crowd computing

With the development of mobile smartphones equipped with a large number of sensor devices, mobile crowd computing has become the hotspot of current research. In the application, the publishers use the application platform to release the task and then select the appropriate users to participate in th...

Full description

Bibliographic Details
Main Authors: Hao Long, Shukui Zhang, Jin Wang, Cheng-Kuan Lin, Jia-Jun Cheng
Format: Article
Language:English
Published: SAGE Publishing 2017-10-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1177/1550147717739156
Description
Summary:With the development of mobile smartphones equipped with a large number of sensor devices, mobile crowd computing has become the hotspot of current research. In the application, the publishers use the application platform to release the task and then select the appropriate users to participate in the task by bidding and collect their data, in which the users’ identity, location, and other private information face the risk of disclosure. To solve the problem of privacy disclosure in mobile crowd computing, we propose a privacy preserving method based on Voronoi Polygon (PP - Voronoi). The users construct the Voronoi diagram to form a cloaked region hiding users identity and then calculate the anchor point of the cloaked region, by which the users communicate with the task publisher to achieve privacy protection of the cloaked region and K anonymity. The experimental results show that compared with other privacy preserving methods, PP-Voronoi method has better effectiveness of privacy protection and lower network traffic.
ISSN:1550-1477