Next Article in Journal
An Iteratively Reweighted Importance Kernel Bayesian Filtering Approach for High-Dimensional Data Processing
Previous Article in Journal
An Efficient Tour Construction Heuristic for Generating the Candidate Set of the Traveling Salesman Problem with Large Sizes
Previous Article in Special Issue
EVFL: Towards Efficient Verifiable Federated Learning via Parameter Reuse and Adaptive Sparsification
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Privacy-Preserving and Quality-Aware User Selection Scheme for IoT

1
China National Institute of Standardization, Beijing 100191, China
2
China Academy of Information and Communications Technology, Beijing 100191, China
3
School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing 100081, China
4
State Key Laboratory of Networking and Switching Technology, Beijing University of Post and Telecommunications, Beijing 100876, China
*
Author to whom correspondence should be addressed.
Mathematics 2024, 12(19), 2961; https://doi.org/10.3390/math12192961
Submission received: 30 August 2024 / Revised: 16 September 2024 / Accepted: 21 September 2024 / Published: 24 September 2024

Abstract

:
In the Internet of Things (IoT), the selection of mobile users with IoT-enabled devices plays a crucial role in ensuring the efficiency and accuracy of data collection. The reputation of these mobile users is a key indicator in selecting high-quality participants, as it directly reflects the reliability of the data they submit and their past performance. However, existing approaches often rely on a trusted centralized server, which can lead to single points of failure and increased vulnerability to attacks. Additionally, they may not adequately address the potential manipulation of reputation scores by malicious entities, leading to unreliable and potentially compromised user selection. To address these challenges, we propose PRUS, a privacy-preserving and quality-aware user selection scheme for IoT. By leveraging the decentralized and immutable nature of the blockchain, PRUS enhances the reliability of the user selection process. The scheme utilizes a public-key cryptosystem with distributed decryption to protect the privacy of users’ data and reputation, while truth discovery techniques are employed to ensure the accuracy of the collected data. Furthermore, a privacy-preserving verification algorithm using reputation commitment is developed to safeguard against the malicious tampering of reputation scores. Finally, the Dirichlet distribution is used to predict future reputation values, further improving the robustness of the selection process. Security analysis demonstrates that PRUS effectively protects user privacy, and experimental results indicate that the scheme offers significant advantages in terms of communication and computational efficiency.

1. Introduction

The Internet of Things (IoT) is an evolving concept that leverages the widespread deployment of connected devices, such as sensors, smart meters, and other IoT-enabled hardware, to collect and exchange data across various applications [1,2]. These applications span a wide range of domains, including environmental monitoring, urban planning, healthcare, and intelligent transportation systems. IoT harnesses the connectivity and ubiquity of these devices to enable the real-time collection and analysis of diverse data types. By aggregating data from a multitude of interconnected devices, IoT provides valuable insights, making it a cost-effective and scalable solution for large-scale sensing and data-driven decision-making [3,4,5,6]. For instance, in the domain of the Industrial Internet of Things (IIoT), particularly within smart grids, IoT devices are utilized to monitor and manage energy consumption, enhance grid stability, and improve the overall efficiency of power distribution networks.
However, the effectiveness of IoT systems heavily relies on the selection of users who carry devices and contribute data [7,8,9]. The quality and reliability of the collected data are directly influenced by the credibility of these users, making the selection process a critical factor in ensuring the overall efficiency and accuracy of IoT applications. For instance, in a smart grid environment, selecting users who are strategically located and have a history of accurate data reporting is crucial to obtaining reliable and actionable insights for energy management. The data collected from these users often include variables such as energy consumption levels, sensor readings (e.g., temperature, humidity, and energy flow), and device operation statuses. These data points are critical for optimizing energy distribution and improving grid efficiency [10]. Similarly, in healthcare IoT, the selection of trustworthy users is vital to ensure the accuracy of health data, which can have significant implications for patient care and public health interventions [11]. Therefore, an effective user selection mechanism is essential for maximizing the potential benefits of IoT systems while minimizing the risks associated with inaccurate or unreliable data.
Given the critical role of user selection in IoT systems, the reputation of users who carry IoT-enabled devices such as smartphones, environmental sensors, smart meters, and wearable devices is a fundamental criterion for identifying participants capable of providing high-quality data [12]. Reputation values are crucial because they directly reflect a user’s reliability, which in turn impacts the quality of the data they contribute. These values are typically derived from factors such as the accuracy of the data provided, the user’s consistency in participation, and their adherence to task requirements [13]. By prioritizing users with higher reputation scores, IoT systems can significantly improve the overall quality and reliability of the data collected, ensuring that only trustworthy users are selected for critical tasks. Consequently, integrating a reputation-based user selection mechanism is essential for optimizing both the effectiveness and credibility of IoT applications.
Some user selection works have been proposed. For instance, Refs. [14,15,16] select users by maximizing the quality of sensor data or minimizing the maintenance cost. However, these solutions are centralized in nature and are prone to single-point failures and other issues. Moreover, certain studies [17,18,19] employ blockchain technology to utilize reputation as a screening metric for assessing user dependability. Specifically, they store the user’s reputation value on the blockchain to uphold credibility. However, the transparency of the blockchain could potentially result in privacy issues as reputations may be leaked. Furthermore, state-of-the-art work [7] ensures the credibility of the employee selection process while protecting the privacy of user reputation by leveraging the decentralization, transparency, and immutability of the blockchain and selects top-ranked employees through a secret minimum heap sorting scheme to provide high-quality perception services. However, this work ignores the fact that reputations may be forged. Therefore, determining reliable users for IoT, safeguarding user privacy, and preventing malicious users from manipulating reputation are crucial challenges that need addressing.
To address the aforementioned challenges, we propose a privacy-preserving and quality-aware user selection scheme for IoT environments. In our scheme, quality-aware user selection involves evaluating participants based on their reputation scores, which are calculated from multiple factors such as data accuracy and consistency in reporting. Only users who meet a certain quality threshold are selected to ensure the reliability and quality of the collected data. Our approach leverages the inherent advantages of blockchain technology, such as decentralization, transparency, and immutability, to ensure a reliable user selection process. To guarantee the provision of high-quality data, we introduce a truth discovery technique that accurately computes the true data from the information provided by users. Additionally, to protect against the risk of malicious tampering with user reputations [20], we design a privacy-preserving verification algorithm based on reputation commitment, ensuring the integrity of reputation scores before user selection. Finally, recognizing that user reputation may evolve over time due to changes in behavior [21], we employ the Dirichlet distribution to forecast future reputation based on historical truth values. Our key contributions are as follows:
  • We designed a privacy-preserving and quality-aware user selection (PRUS) scheme, which uses a public-key cryptosystem with distributed decryption to protect perceived data privacy and reputation privacy and uses blockchain technology to achieve reliable user selection.
  • To ensure the reliability of data in IoT, we compute the truth value through truth discovery. Recognizing the critical role of user reputation in this process, we designed a reputation verification algorithm using reputation commitment with privacy protection, ensuring that reputation values are tamper-proof. Additionally, we utilize the Dirichlet distribution to predict future reputation values, further enhancing the accuracy and reliability of user selection.
  • We evaluate the privacy-preserving user selection scheme based on computational overhead and communication overhead. We experimentally verify the effectiveness and feasibility of the scheme.
The paper is organized as follows: Related works are presented in Section 2, followed by the preliminaries in Section 3. Section 4 covers the models and design goals. Our proposed scheme is detailed in Section 5, followed by the security analysis in Section 6. Section 7 discusses experimental findings, and Section 8 contains the paper’s conclusion.

2. Related Works

In this section, we mainly discuss privacy-preserving truth discovery and user selection schemes related to our work. Table 1 shows the comparison of our PRUS scheme with previous works in terms of design goals (Section 4.4).

2.1. Privacy-Preserving Truth Discovery (PPTD)

To enhance mobile users’ privacy and prevent adversaries from linking or tracking them with sensitive information, various studies [25,26,27,28,29,30] have been conducted. To be specific, Miao et al. introduced two PPTD schemes aimed at protecting mobile users’s privacy in MCS. One scheme [25] utilized a cloud server to protect sensing data privacy, while the other [26] employed an additively homomorphic cryptosystem to ensure privacy and reduce user burdens. To address the efficiency challenges of the PPTD algorithm, Zheng et al. [27] introduced two novel privacy-aware crowdsensing strategies that significantly enhance bandwidth and computation performance. Similarly focusing on privacy preservation, Tang et al. [28] and Xu et al. [31] addressed efficiency issues in their work. Furthermore, due to the lack of practical solutions, Zhang et al. [29] presented two practical application scenarios implementing PPTD. Wu et al. [30] presented two MCS schemes using the dual clouds model: one for basic privacy-aware TD and the other for enhanced privacy TD, effectively balancing privacy and practicality considerations. These initiatives collectively tackle efficiency and overhead challenges associated with privacy preservation, although none specifically address the reliability of sensing data and users.

2.2. User Selection

Existing user selection schemes fall into two categories: traditional trust-based models and blockchain-based crowdsensing.
User selection in the traditional trust-based model. Guo et al. [14] introduced two user selection methods: one aimed at minimizing the overall distance traveled for tasks with time constraints, while the alternative approach focused on reducing the total user count for tasks that can tolerate delays. Wang et al. [15] suggested a prediction-driven approach to recruit users in mobile crowdsensing, aiming to reduce the expenses associated with uploading sensor data. Yang et al. [16] expanded on the strategy in [15] for spatiotemporal sensitive tasks. Despite framing the user selection issue as a target optimization to meet various requester needs, the actual user selection process is outsourced to a third-party platform, neglecting the fairness of outcomes. Several researchers suggested incorporating reputation into user selection. For instance, Wang et al. [32] proposed incorporating reputation levels as a determinant of user choice and compensation in MCS. Pouryazdan et al. [33] explored two approaches for evaluating reputation using statistical analysis and voting, amalgamating them to compute a collaborative reputation score for selecting users. They integrated decentralized and centralized approaches to enhance data reliability in selecting users based on reputation but overlooked reputation privacy. Wang et al. [34] devised a reliable crowdsourcing framework by introducing the social cloud as a service provider and a reputation-based auction system for selecting trustworthy users, with reputation scores stored in a database managed by the social cloud. However, the user selection process is managed by the trusted centralized server, exposing it to the same issues as the conventional trust-based model.
User selection in blockchain-based crowdsensing. To address the shortcomings of the conventional trust-based model, several studies suggested implementing user selection procedures within blockchain-based crowdsensing (BBC) systems. For instance, Wei et al. [17] proposed utilizing blockchains to save assessed reputation scores to ensure trustworthy worker selection. Kadadha et al. [18] introduced a decentralized crowdsensing platform for various requesters and workers using Ethereum (SenseChain). Within SenseChain, the Quality Information (QoI) for assignments is determined through the integration of reputation value, time, and distance metrics, aiming to select a group of workers with the highest QoI according to the requester’s needs. While this approach achieves fair and dependable worker selection, it operates in a plaintext environment, overlooking the confidentiality of reputation scores and sensory information. Zhao et al. [19] created a mobile crowdsensing system using blockchain technology and proposed a strategy for maintaining privacy while managing reputation to address unethical actions by workers. This method ensures data privacy during reputation calculation via additive secret sharing but overlooks the protection of workers’ reputation confidentiality. Duan et al. [22] concentrated solely on preserving data confidentiality. They employed the threshold Paillier cryptosystem and differential privacy to protect data privacy, integrated SGX technology for data aggregation accuracy, and utilized zero-knowledge proof to counter unauthorized data submissions. Ding et al. [23] suggested a reputation system and a dispute resolution system for selecting workers and data evaluators, aiming to enhance sensing service quality and ensure fair task data evaluation. Furthermore, Chatzopoulos et al. [24] incorporated Internet service providers (ISPs) to offer location-based task recommendations and devised cost-effective bidding for worker selection to minimize crowdsensing provider expenses. To safeguard privacy, ISPs assign distinct identifiers to users for each session to safeguard their identities and locations, although this approach may entail additional overhead for maintaining ID-to-identity mappings and facilitating operations like reputation and asset transfers. Regrettably, many of the aforementioned studies overlook the privacy implications of reputation values stemming from the transparency of blockchain technology. To address the above problem, the most recent work [7] proposed a trusted and privacy-preserving worker selection method called Trustworker for BBC systems. By leveraging the decentralization, transparency, and immutability of the blockchain, it ensures the credibility of the worker selection process while safeguarding the confidentiality of reputation and selects the top-ranked workers through a secret minimum heap sorting scheme to provide high-quality sensing services. However, this work ignores the fact that reputations can be forged, making user selection unreliable.

3. Background

In this section, we mainly discuss various background knowledge related to this scheme, such as truth discovery, a PCDD cryptosystem, an equality verification algorithm, and Dirichlet Distribution.

3.1. Truth Discovery

The concept of truth discovery serves as a crucial technology designed to resolve conflicts in noisy data and assess the trustworthiness of users through the data they furnish. Previous research [25,27,35] has highlighted its benefits in different situations. The truth discovery process commences by setting the initial truth for each task, then progresses through iterative updates to refine the weights and truths until convergence is attained.
Weight update. Regarding the original ground truth remaining constant, this phase entails the modification of user weights. User weights are adjusted based on how closely the information provided by the user corresponds to the established true value. The information provided by users typically includes sensor data such as temperature, humidity, energy consumption, or traffic flow, depending on the specific IoT application. In our case, the users involved were primarily from sectors like energy management, environmental monitoring, and smart city infrastructure, where reliable data are critical. The blockchain is employed to ensure the privacy and security of both user-provided data and reputation scores, preventing tampering and unauthorized access. When there is a high degree of alignment, the user’s weight is augmented; conversely, it is diminished in the case of discrepancies. Generally, the user’s weight is determined through the following:
w k = log k = 1 K m = 1 M d ( x m k , x m ) m = 1 M d ( x m k , x m ) ,
where x m k stands for the sensor data submitted by the user k for the m t h task, and x m indicates the current estimated value of the m t h task. The function d ( · ) is used as a distance measure to evaluate the disparity between user data and the true value. In our study, we adopt the following distance function:
d ( x m k , x m ) = ( x m k x m ) 2 s t d m ,
where s t d m denotes the standard deviation for object m across all users.
Truth discovery. By calculating the weight of each user in the above stage, the truth value of task m can be revised as:
x m = k = 1 K w k · x m k k = 1 K w k .
In the given equation, K denotes the total number of users, x m k denotes the perception data from u k for the m t h task, w k stands for the user weight of u k , and x m indicates the newly estimated truth.

3.2. Public-Key Cryptosystem with Distributed Decryption (PCDD)

Liu et al. [36] introduced a modified public-key cryptosystem that facilitates distributed decryption, referred to as the PCDD cryptosystem, derived from a two-factor Paillier-based cryptosystem [37]. In the PCDD, the private key is fragmented into multiple parts to ensure that no individual entity can decrypt the encrypted data alone. This approach is commonly used in secure multi-party computation due to its operational efficiency and reliability. To elaborate, the PCDD mechanism functions in the following way.
  • KeyGen : Given a security parameter k and two large prime numbers p and q, where | p | = | q | = k , we select two strong primes p , q as p = p 1 2 and q = q 1 2 . Next, we calculate N = p q and λ = lcm p 1 2 , q 1 2 . Subsequently, we define a function L ( x ) = x 1 N . To proceed, we select a generator g of order ( p 1 ) ( q 1 ) 2 (obtainable by picking a random number a Z N 2 and setting g = a 2 N ). Subsequently, we randomly choose θ from the interval [ 1 , N 4 ] and compute h = g θ mod N 2 . The public key is p k = { N , g , h } , while the strong private key is S K = λ .
  • Enc : Given a message m Z N , select a random number r [ 1 , N / 4 ] . The ciphertext can be generated as follows:
    C m = h r ( 1 + m N ) mod N 2 .
  • SDec : C m can be decrypted using decryption algorithm D S K ( · ) with strong private key S K = λ by initially performing the following calculation:
    C m λ mod N 2 = g λ · θ r ( 1 + m N λ ) mod N 2 = ( 1 + m N λ ) .
    Therefore, as gcd ( λ , N ) = 1 , the value of m can be retrieved as follows:
    m = L ( C m λ mod N 2 ) λ 1 mod N .
  • SkeyS : The strong private key S K = λ can be randomly divided into t parts. These partial strong private keys are represented as S K ( i ) = λ i ( i = 1 , , t ) . These parts satisfy the conditions i = 1 t λ i 0 mod λ and i = 1 t λ i 1 mod N 2 simultaneously.
  • PSDec : Upon receiving C m , we can use the partial strong private key S K ( i ) = λ i to calculate the partially decrypted ciphertext C T ( i ) as follows:
    C T ( i ) = ( C m ) λ i = g r θ λ i ( 1 + m N λ i ) mod N 2 .
  • DDSec : Upon receiving C T ( 1 ) , , C T ( t ) , the DDSec algorithm computes m = L ( i = 1 t C T ( i ) ) .

3.3. Equality Verification Algorithm

An algorithm for equality verification is presented to validate that two commitments encrypt identical values while preserving the confidentiality of any information beyond the commitments.
  • Setup. Consider two large primes, denotes as p and q, where q ( p 1 ) . Let g and h be generators of the cyclic group G with order q. The algorithm utilizes p, q, g, and h as public parameters. It is assumed that t Z p denotes the user’s value, while t Z p represents the user’s submitted value, which could be potentially invalid.
  • Commitment. The server obtains the value commitment C m t = g t · h r mod p from the user, where r R Z p .
  • Challenge. The server sends C m t to the trusted third party (TTP).
  • Response. Upon receiving C m t , the TTP chooses β , γ , γ Z p randomly. Subsequently, it calculates C m 1 = g β · h γ mod p , C m 2 = g β · h γ mod p , and H = Hash ( C m 1 | | C m 2 ) , where Hash ( · ) represents a hash function. Following this, based on C m t = g t · h r mod p and r R Z p , the TTP computes D = β + H · t , D 1 = γ + H · r , and D 2 = γ + H · r . Ultimately, the TTP transmits { H , D , D 1 , D 2 , C m t } to the server.
  • Verification. The server checks whether Equation (8) holds.
    H = Hash g D h D 1 ( C m t ) H | | g D h D 2 ( C m t ) H mod p .
When (8) is satisfied, the server concludes that the two commitments, C m t and C m t , correspond to identical values.

3.4. Dirichlet Distribution Algorithm

The Dirichlet distribution comprises a set of continuous multivariate probability distributions defined by a prior parameter vector ζ  [38,39]. In situations involving binary state spaces, the distribution is also influenced by the Beta distribution [40]. It is commonly employed to represent the probability distribution among N-dimensional random variables X = { X 1 , X 2 , , X N } with N representing the number of potential outcomes and X i denotes the value of the i t h outcome. Firstly, we establish a vector θ = { θ 1 , θ 2 , , θ N } , where θ [ 0 , 1 ] and θ i 1 < θ i . Following this, the probability distribution vector of X is denoted by p = { p 1 , p 2 , , p N } , where p i = P { θ i 1 < X i θ i } , with 1 i N . By observing a sequence of k feasible results, the Dirichlet distribution yields prior parameters ζ = { ζ 1 , ζ 2 , , ζ N } to portray the cumulative observation vector, where ζ i > 0 . As a result, the probability density function (PDF) can be formulated as
f ( p | ζ ) = Γ ( i = 1 N ζ i ) × i = 1 N p i ζ i 1 i = 1 N Γ ( ζ i ) ,
where Γ ( · ) denotes the Gamma function. Subsequently, we can compute the mean of the Dirichlet distribution as
E ( p i | ζ i ) = ζ i i = 1 N ζ i .

4. Problem Statement

This section primarily presents the system and threat models, workflow, and design goals of the scheme.

4.1. System Model

The system model depicted in Figure 1 includes four entities: a data requester, two cloud servers, multiple mobile users, and the blockchain.
  • Data requester. The data requester may belong to a management department or a service provider or be an authorized individual. They are responsible for assigning sensing tasks to IoT devices and users to collect data such as environmental conditions, energy usage, traffic flow, and other valuable information.
  • Cloud servers. The cloud servers possess robust storage and computing capabilities, enabling them to gather and analyze ciphertexts. Moreover, they assess sensory data and transmit verifiable reputation to the blockchain.
  • Mobile users. Mobile users can utilize various sensing devices, such as smartphones, tablets, wearable devices, and IoT sensors, to gather data related to specific tasks assigned by the data requester. These users collect data based on their location and preferences, which may include environmental metrics, energy consumption, or traffic conditions. The collected data are then submitted to the cloud or edge servers for processing and analysis. Users who consistently provide high-quality data are rewarded with a higher reputation or quality score, thereby increasing their likelihood of being selected for future tasks in the user selection process.
  • Blockchain. In the PRUS scheme, a consortium blockchain is employed within the IoT environment, enabling users and requesters who are involved in IoT sensing tasks to operate as nodes within the blockchain network. Additionally, the blockchain network includes specialized reputation nodes, which are responsible for assigning reputation or quality score commitments to users based on the data they provide. These reputation nodes also update the scores based on feedback from cloud or edge servers and verify the authenticity of users’ reputation or quality scores, ensuring the integrity and reliability of the user selection process. Note that in our solution, the security access policy of the consortium chain is that users can only access their own data and cannot access other users’ data. The blockchain in this article refers to the consortium chain.

4.2. Threat Model

In this section, we outline potential threats to the blockchain, data requester, cloud servers, and mobile users as per the system model mentioned earlier.
We assume that all nodes in the blockchain are trustworthy. Like prior studies, we operate under the assumption that the information housed in the consortium chain is entirely reliable and that there will be no collaboration with external parties. The data requester and cloud servers ( S 1 and S 2 ) are considered to be honest-but-curious, which means they are capable of fulfilling their responsibilities with integrity and will refrain from any form of collusion among themselves or with any malicious parties. It is important to note that while upholding their honesty, the data requester and cloud server may gain access to the confidential information of mobile users.
Mobile users, acting as data contributors, are accountable for gathering sensing data. It is assumed that the majority of these users are trustworthy, although there may be some with malicious intentions. In particular, malicious users might manipulate reputation values to meet the task’s reputation criteria and deduce the reputation of other users.

4.3. Workflow

The PRUS scheme consists of the steps illustrated in Figure 1.
  • Register. The requester, mobile users, and cloud servers must register on the blockchain and receive a key pair. The registration details of all participants will be documented as transactions in the distributed ledger.
  • Assign tasks. The data requester broadcasts the sensing task through the blockchain, including the task information and reputation requirements.
  • Recruit users. Each mobile user that intends to perceive data submits its reputation value commitment to the cloud server, which cooperates with the reputation node of the blockchain to verify whether the reputation value meets the set criteria.
  • Select users. The cloud server selects mobile users whose reputation values meet the criteria of the perception task.
  • Upload data. The selected mobile users upload perception data to the cloud servers.
  • Perform truth discovery.  S 1 interacts with S 2 to calculate the true value of the perception task, and then S 1 sends the true value to the data requester.
  • Predict reputation values. The cloud server evaluates the accuracy of the data perceived by individual mobile users by comparing it to the ground truth data and then submits the evaluation outcomes to the reputation node. The reputation node then predicts the reputation score for each user using the latest and historical reputation.
  • Update reputation values. Based on the prediction results, the reputation node adjusts the reputation value of the selected mobile user, calculates the reputation commitment, and sends the reputation commitment to the user.

4.4. Design Goals

Given the threat model, this paper aims to develop a reputation-based user selection framework in IoT. The specific design goals are as follows:
  • Privacy. PRUS needs to protect the confidentiality of reputation values and sensing data belonging to mobile users. It is crucial that the reputation values of mobile users remain undisclosed, untraceable, and unconnected by any ill-intentioned mobile users or potential adversaries. Simultaneously, the sensing data of mobile users must be secure throughout the truth discovery procedure.
  • Security. PRUS needs to ensure that reputation scores cannot be manipulated by malicious users. Furthermore, it should prevent malicious mobile users and other attackers from deducing the reputation values of other mobile users.
  • Efficiency. The communication and computational overhead for mobile users should be minimized to facilitate the practical use of PRUS.

5. The Proposed Scheme

PRUS mainly includes registration, assigning sensing tasks, recruiting users, verifying and selecting mobile users, uploading data, performing truth discovery, predicting user reputation, and updating reputation values. Here are the specifics. To enhance comprehension, we provide the symbols in Table 2.

5.1. Register and Assign Tasks

First, the requester, mobile user, and cloud server must be registered on the blockchain. Before describing the specific steps for each stage, it is essential to establish a reliable node within the blockchain system to produce the public and private keys for both the cloud and the requester. In the consortium chain, this can be accomplished by utilizing a secure multi-party computing protocol, and the key pair can only be seen by authorized users. The public key ( n , g , h ) is disclosed, and the private key λ is split into two components ( λ 1 , λ 2 ) . Server S 1 gets λ 1 and server S 2 gets λ 2 . When a new mobile user joins this system, he/she uses the corresponding public key to register identity and the reputation node assigns an initial reputation value t [ 0 , b ) and I D , where t Z p . Let p and q be two large primes such that q dividing p 1 , and g and h are two generators of the cyclic group G with order q. Here, p, g, and h are public parameters.
The requester initiates the process by publishing the m tasks to any node within the blockchain network. The task details include a description of the task and a user reputation threshold t 0 , which specifies the minimum reputation score required for performing each task. Upon receiving the task set, the reputation node first verifies the requester’s I D to ensure that the requester is valid. To be specific, the mobile user uses his private key to sign a message. Then, the reputation node uses the corresponding public key to verify the signature. If the registration information is confirmed to be valid, the reputation node proceeds to broadcast the task across the blockchain.

5.2. Recruit and Select Users

The reputation node serves as the verifier, while the mobile user acts as a prover. The reputation node can validate the reputation value through the equality verification algorithm and then check if the reputation value is within the threshold through the reputation range verification (RRV) algorithm [13].
Specifically, the mobile user first sends an ID to the reputation node. Then the reputation node gets the reputation value t of the mobile user according to I D and computes the reputation commitment C m = g t · h r mod p , where r Z p . Next, the reputation node sends the r to the mobile user. The mobile user who wishes to take part in the perception task selects β , γ , γ Z p and computes C m 1 = g β · h γ mod p , C m 2 = g β · h γ mod p , and hash value H = H a s h ( C m 1 | | C m 2 ) , where H a s h ( · ) is a hash function. Next, the mobile user computes C m = g t · h r mod p , D = β + H · t , D 1 = γ + H · r , and D 2 = γ + H · r , where t Z p is a reputation value (may be invalid) uploaded by the mobile user and r Z p . After that, the mobile user sends { H , D , D 1 , D 2 , C m } to the reputation node. Next, the reputation node verifies reputation commitment by checking if Equation (11) holds.
H = H a s h ( g D h D 1 ( C m ) H mod p | | g D h D 2 ( C m ) H mod p ) .
If Equation (11) is satisfied, the reputation is valid.
After the above steps, we can know that the reputation value uploaded by the mobile user is t = t , and the corresponding commitment is C m t = g t · h r mod p . Next, the reputation node uses the RRV algorithm to verify whether the mobile user’s reputation value meets the reputation range. To be specific, the mobile user computes C m 1 = g ( t t 0 ) · h ( r r 0 ) mod p and C m 2 = g ( b t ) · h ( r b r ) , where r 0 , r b R Z p , t 0 Z p is the reputation threshold for the sensing task, and b denotes the upper bound of t. After that, the mobile transmits { C m 1 , C m 2 , C m t , C r 0 , C r b , I D } to the reputation node. Here, { C r 0 , C r b } represents the ciphertexts encrypted by Equation (4). Upon receiving { C m 1 , C m 2 , C m t , C r 0 , C r b , I D } , the reputation node decrypts C r 0 , C r b according to Equation (6), then gets the reputation value t based on I D and checks if t 0 t b . If this condition is not satisfied, the reputation node aborts the algorithm and outputs ⊥. Otherwise, the reputation node computes C m r 0 = g t 0 · h r 0 mod p , C m b = g b · h r b mod p , and checks whether Equation (12) holds.
C m 1 = C m t · C m r 0 1 , C m 2 = C m b · C m t 1 .
If Equation (12) is met, the reputation value falls within the specified range, allowing the mobile user to engage in the sensing task. If not, the mobile user is ineligible to take part in the task. Then, the reputation node sends the verified mobile user I D to the server.

5.3. Upload Data and Perform Privacy-Preserving Truth Discovery (PPTD)

Users who are allowed to participate in the task first encrypt their perception data and then perform PPTD. Here, we refer to Refs. [26,36] to achieve this section. In this section, we introduce privacy-preserving truth discovery, which consists of two main phases: Setup and Compute the truth. An overview of PPTD is shown as Algorithm 1.
Algorithm 1 An overview of PPTD.
 1:
Setup:
 2:
A data requester submits { z ˜ m } m = 1 M to S 1 and sends { E [ γ m ] , E [ ( γ m ) 2 ] } m = 1 M to S 2 .
 3:
Mobile users submit { x ˜ m k } k = 1 , m = 1 K , M to S 1 and transmit { δ m k } k = 1 , m = 1 K , M to S 2 .
 4:
S 2 calculates { E [ δ m k + γ m ] } k = 1 , m = 1 K , M and { E m = 1 M ( δ m k + γ m ) 2 } k = 1 K and submits them to S 1 .
 5:
Compute the truth:
 6:
for each iteration do
 7:
   for each mobile users do
 8:
      S 1 and S 2 calculate weights to determine w ¯ k .
 9:
     for each task do
10:
         S 1 and S 2 update the truth values to get z ˜ m .
11:
     end for
12:
   end for
13:
end for
14:
S 1 returns { z ˜ m } m = 1 M to the data requester.
15:
The data requester uncovers the truth for the m-th task by calculating z m = z ˜ m γ m .

5.3.1. Setup

A data requester first generates task truths ( z 1 , , z M ) randomly and selects corresponding random values { γ m } m = 1 M to perturb as z ˜ m = z m + γ m . We use E ( · ) to denote the ciphertext encrypted by Equation(4) and leverage D t ( · ) to represent C T ( t ) in Equation (7). The requester then encrypts these random values as E ( γ m ) and E ( γ m 2 ) . Subsequently, the perturbed truths { z ˜ m } m = 1 M are forwarded to S 1 , while the ciphertexts { E ( γ m ) , E ( γ m 2 ) } m = 1 M are sent to S 2 .
Then, user u k aiming to engage in the tasks creates the sensory data ( x 1 k , , x M k ) and chooses random values { δ m k } m = 1 M to perturb the original data as x ˜ m k = x m k δ m k . Then, u k forwards { x ˜ m k } m = 1 M to S 1 and sends all the random values { δ m k } m = 1 M to S 2 .
Upon receiving all users’ data, S 2 computes E ( δ m k ) · E ( γ m ) to derive the ciphertext E ( δ m k + γ m ) , and evaluates E m = 1 M ( δ m k ) 2 · m = 1 M E ( γ m ) 2 δ m k · E ( γ m 2 ) to obtain the ciphertext E m = 1 M ( δ m k + γ m ) 2 . Subsequently, S 2 transmits the ciphertexts { E ( δ m k + γ m ) } k , m = 1 K , M and { E m = 1 M ( δ m k + γ m ) 2 } k = 1 K to S 1 .

5.3.2. Compute the Truth

Utilizing the homomorphic property, S 1 first computes the distance between x m k and z m as
E m = 1 M ( x m k z m ) 2 = E ( m = 1 M [ ( x m k z m ( δ m k + γ m ) ) 2 + ( δ m k + γ m ) 2 + ( δ m k + γ m ) · ( 2 ( x m k z m ( δ m k + γ m ) ) ) ] ) = E ( m = 1 M ( x ˜ m k z ˜ m ) 2 ) · E ( m = 1 M ( δ m k + γ m ) 2 ) · m = 1 M E ( δ m k + γ m ) 2 ( x ˜ m k z ˜ m ) = C f k .
Subsequently, S 1 aggregates the encrypted distances from all users and transmits the merged outcome, denoted as C F = k = 1 K C f k , to S 2 .
S 2 partially decrypts the ciphertext using the private key λ 2 by performing D 2 ( C F ) P S D e c ( λ 2 , C F ) . Next, S 2 sends back D 2 ( C F ) to S 1 . Upon receiving the partly decrypted ciphertext, S 1 computes
D 1 ( C F ) P S D e c ( λ 1 , C F ) k = 1 K m = 1 M ( x m k z m ) 2 D D S e c ( D 1 ( C F ) , D 2 ( C F ) ) ,
to require the sum of all distances. For every worker, S 1 picks a random value r 1 k Z n for the below calculation
C ˜ f k = E r 1 k m = 1 M ( x m k z m ) 2 k = 1 K m = 1 M ( x m k z m ) 2 .
Next, S 1 decrypts part of the ciphertext D 1 ( C ˜ f k ) P S D e c ( λ 1 , C ˜ f k ) and dispatches { C ˜ f k , D 1 ( C ˜ f k ) k = 1 K } to S 2 . Using the private key, S 2 decrypts C ˜ f k by performing the following operations:
D 2 ( C ˜ f k ) P S D e c ( λ 2 , C ˜ f k ) , r 1 k m = 1 M ( x m k z m ) 2 k = 1 K m = 1 M ( x m k z m ) 2 D D S e c ( D 1 ( C ˜ f k ) , D 2 ( C ˜ f k ) ) .
Subsequently, each user’s weight can be computed as:
w ¯ k = log r 1 k m = 1 M ( x m k z m ) 2 k = 1 K m = 1 M ( x m k z m ) 2 + r 2 k = w k log ( r 1 k ) + r 2 k ,
where r 2 k Z n is utilized to perturb the weight information. Following this, S 2 computes C m = k = 1 K E ( δ m k + γ m ) r 2 k and conveys the ciphertexts { C m } m = 1 M , { E ( r 2 k ) } k = 1 K , and the perturbed weights { w ¯ k } k = 1 K to S 1 . Using r 1 k , each user’s weight is restored by calculating w ˜ k = w ¯ k + r 2 k . Following this, S 1 computes the summation of perturbations as:
C ˜ m = E k = 1 K w k ( δ m k + γ m ) k = 1 K r 2 k x ˜ m k = k = 1 K E ( δ m k + γ m ) w ¯ k · C m · k = 1 K E ( r 2 k ) x ˜ m k .
Then S 1 transmits { C ˜ m , D 1 ( C ˜ m ) P S D e c ( λ 1 , C ˜ m ) } m = 1 M back to S 2 .
Upon receiving the ciphertexts, S 2 obtains the plaintext in C ˜ m through the operations:
D 2 ( C ˜ m ) P S D e c ( λ 2 , C ˜ m ) , r ˜ m D D S e c ( D 1 ( C ˜ m ) , D 2 ( C ˜ m ) ) .
Then S 2 returns ( { r ˜ m ) } m = 1 M , r ˜ w = k = 1 K r 2 k ) to S 1 .
Using r ˜ m and r ˜ w , S 1 updates the task truth following these steps:
z ˜ m = z m + γ m = k = 1 K w k · ( x m k + γ m ) k = 1 K w k = k = 1 K ( w k ( δ m k + γ m ) r 2 k ( x ˜ m k δ m k ) ) k = 1 K w k k = 1 K r 2 k + k = 1 K ( w k + r 2 k ) ( x m k δ m k ) k = 1 K ( w 1 k + r 2 k ) k = 1 K r 2 k = k = 1 K w ˜ k · x ˜ m k + r ˜ a m k = 1 K w ˜ k r ˜ w .
Continuing with an iterative application of the above procedure, the truths can be required. Eventually, S 1 transmits { z ˜ m } m = 1 M to the data requester as the truth can be obtained by calculating z m = z ˜ m γ m .

5.4. Predict and Update Reputation

To enhance the assessment of a user’s past reputation, we utilize the Dirichlet distribution for reputation prediction. The process involves forecasting the user’s future reputation by leveraging their consistently standardized historical reputation. Initially, reputation normalization adjusts reputation scores to a range between 0 and 1. Subsequently, reputation aggregation combines historical data with the Dirichlet distribution to derive the probability distribution vector p . The weighted average of p , denoted as X, is then determined, with the expected value E [ X ] serving as the predicted reputation. The detailed algorithm is shown as Algorithm 2.
Algorithm 2 Reputation prediction.
Input: 
{ w i } i = 1 m , { ζ }
  1:
for  i = 1 to m do
  2:
    w i = w i min ( { w i } i = 1 m ) max ( { w i } i = 1 m ) min ( { w i } i = 1 m ) ;
  3:
end for
  4:
set X { X 1 , X 2 , , X C } ;
  5:
set θ { θ 1 , θ 2 , , θ N } , ( θ i ( 0 , 1 ] , i [ 1 , N ] , θ i θ i + 1 );
  6:
set p i = P { θ i 1 < X i θ i } , ( i = 1 , 2 , , N );
  7:
set p { p 1 , p 2 , , p N } , ( i = 1 N p i = 1 );
  8:
set ζ { ζ 1 , ζ 2 , , ζ N } ;
  9:
compute f ( p | ζ ) = D ( p | ζ ) = Γ ( i = 1 N ζ i ) i = 1 N Γ ( ζ i ) i = 1 N p i ζ i 1 ;
 10:
set ζ 0 = i = 1 N ζ i ; set q { q 1 , q 2 , , q N } ;
 11:
compute E [ X ] = i = 1 N q i E [ p i ] = i = 1 N q i ζ i ζ 0 ;
 12:
return  E [ X ]
We first normalize the reputation using Equation (18):
w i = w i m i n ( { w i } i = 1 m ) m a x ( { w i } i = 1 m ) m i n ( { w i } i = 1 m ) ,
where w i denotes the reputation of the mobile user.
For a specific user U, a continuous random variable X ( 0 X 1 ) is utilized to represent the truth associated with U. The levels of truth, denoted as { θ 1 , θ 2 , , θ N } , where θ i ( 0 , 1 ] , ( i = 1 , 2 , , N , θ i < θ i + 1 ) , are established. The probability distribution vector of X concerning these N levels is symbolized as p = { p 1 , p 2 , , p N } , with the constraint i = 1 N p i = 1 , where P { θ i 1 < X i < θ i } = p i for ( i = 1 , 2 , , N ) . The vector ζ = { ζ 1 , ζ 2 , , ζ N } is utilized to denote the cumulative truth value. By utilizing a posterior Dirichlet distribution, the modeling of p is achieved as:
D ( p | ζ ) = Γ ( i = 1 N ζ i ) i = 1 N Γ ( ζ i ) i = 1 N p i ζ i 1 ,
where ζ i is the accumulation value of levels that the user’s truth values belong to, and Γ ( · ) represents the Gamma function.
To determine the reputation score of the user, weight values q i are assigned to each level θ i ( i [ 1 , N ] ) . Let p i denote the probability that the true value of user U falls within level θ i . Consider a random variable X that represents the weighted average of the probabilities of the true value in p . The user’s reputation score R U can be calculated as
R U = E [ X ] = i = 1 N q i E [ p i ] = 1 ζ 0 i = 1 N q i ζ i ,
where ζ 0 = i = 1 N ζ i and q { q 1 , q 2 , , q N } is the weight for each θ i .
Finally, the reputation node obtains the future reputation value of each mobile user and subsequently transmits the new reputation to the user.

6. Security Analysis

In this section, we will perform a security analysis on PRUS to prove its robust security. The goal of PRUS is to protect against unauthorized alteration of reputation values by malicious users and to protect the privacy of mobile users’ data. We give the theorem and the corresponding proof below.
Theorem 1.
PRUS can resist reputation tampering and inference attacks if attacker A is unable to deduce or tamper with the reputation value of u k in PRUS by interacting with the cloud server through reputation commitment.
Proof. 
The reputation value t k of u k is represented in reputation commitments C m k = g 1 t k · h 1 r k mod p and C m k = g 2 t k · h 2 r k mod p . An adversary A could intercept the reputation commitments C m k and C m k through wireless channels, but it is unable to deduce the actual reputation value t k based on the privacy analysis in [13]. This property allows the PRUS to thwart reputation inference attacks effectively.
Furthermore, if A attempts to manipulate the reputation value while computing its reputation commitment C m k , the cloud server will reject the submitted sensing data from the mobile user as it would not satisfy the RRV. Consequently, the PRUS proves resilient against reputation tampering attacks.  □
Theorem 2.
PRUS can protect the data privacy of mobile users if the cloud server is unable to obtain private information like sensory data, weights, and true values through the acquired data.
Proof. 
For S 1 , the known values include the ciphertexts ( E [ δ m k + γ m ] , E m = 1 M ( δ m k + γ m ) 2 , C ˜ m , E [ r 2 k ] ) and plaintexts y ˜ m , x ˜ m k , k = 1 K m = 1 M ( x m k z m ) 2 , w k , r ˜ m , r ˜ w . Without the undisclosed values γ m and δ m k , S 1 cannot deduce the true task from y ˜ m or the sensor data from x ˜ m k . Additionally, as r 2 k is randomly generated, S 1 remains unable to extract confidential information from r ˜ m and r ˜ w , and it cannot differentiate the individual users’ weights w k from the perturbed weight data w ¯ k .
For S 2 , the information it possesses comprises the encrypted values E [ γ m ] , E [ γ m 2 ] , C m and the plaintexts δ m k , w k . Without knowing the other private key or the perturbed sensory data x ˜ m k , S 2 cannot recover users’ sensory data or infer their weights, even if it holds some random values or colludes with other users.
In essence, the sensory data, weights, and truths of users are safeguarded confidentially within the PRUS.  □

7. Experiments

In this section, we will examine and assess the performance of PRUS, focusing on the reputation range verification (RRV) algorithm and the privacy-preserving truth discovery (PPTD) algorithm. To enhance the clarity of our analysis, we will begin by evaluating the RRV algorithm with regard to computation and communication workload. Following that, we will explore how the quantity of mobile users and sensing tasks affects the computational and communication burden of the PPTD algorithm. Lastly, we will delve into the computational load associated with reputation prediction.
In order to better demonstrate the effectiveness of the PRUS, we conducted experiments to showcase the runtime and cost of each algorithm. The operations of the mobile users, cloud servers, blockchain, and data requester were conducted on a laptop with an Intel(R) Core(TM) i5-8300H CPU and a memory of 8 GB. The operating system was 64-bit Windows 10. Regarding user size, the selection of users in our experiments was based on a fixed number of participants, depending on the task requirements. The user size varied between 10 and 50 participants. The criteria for selecting participants included their past performance (data accuracy), geographic location (for task relevance), and reputation scores derived from previous task participation.

7.1. Evaluation of RRV Algorithm

In this section, we will examine the computational and communication overheads associated with the RRV.
Computation overhead. The PRUS scheme employs the RRV algorithm to prevent dishonest mobile users from manipulating reputation values within the reputation range of the sensing task. This algorithm verifies the validity of reputation values against the reputation threshold. The RRV algorithm involves four commitment generation operations, one hash generation operation, one hash verification operation, an exponential operation, a multiplication operation, and two comparison operations. Based on this breakdown, the computational complexity of the RRV algorithm was determined to be O ( K ) . The running time of PRUS under various combinations of mobile users, sensing tasks, and reputation nodes is illustrated in Figure 2.
Communication overhead. According to the RRV algorithm, when a mobile user participates in a perception task, the cloud server communicates with the mobile user and the reputation node. The mobile user sends the reputation commitment to the cloud server, and then the cloud server and the reputation node first verify whether the commitment is valid. In this process, the communication result is { H , D , D 1 , D 2 , C m t } , so the communication cost is 4 | H | + | p | , where | p | is the public parameter size; then, the cloud server verifies whether the commitment is within the reputation threshold of the perception task. The product of this process is { C t 0 , C r 0 , b } and { C m 1 , C m 2 } , so the communication cost is 4 | p | + | b | .

7.2. Evaluation of PPTD Algorithm

Next, we evaluate the performance of the PPTD algorithm in PRUS from the perspective of computation and communication costs. We also evaluate the efficiency by implementing the RPTD scheme [41], as it is also developed using data perturbation and homomorphic Paillier encryption.
Computation overhead. In Figure 3, we describe the computational overhead of each entity. As shown in Figure 3a, on the mobile user side, our PPTD scheme outperforms the RPTD scheme. For instance, with 100 sensing tasks, RPTD takes 125 ms, while our scheme takes less than 1 ms. In Figure 3b,c, the computational overhead for each iteration on the cloud server is displayed for varying numbers of users and tasks. The PPTD scheme is more efficient than the scheme in [41] due to RPTD’s utilization of the traditional homomorphic Paillier cryptosystem for data encryption, while our PPTD employs data perturbation for enhanced data privacy.
Communication overhead. We calculate the communication cost of PPTD in two processes: Setup and Compute the truth. Given the plaintext’s small size relative to the ciphertext, our focus lies on transmitting the size of the ciphertext, denoted by | C | . Table 3 summarizes the communication overhead of our PPTD and RPTD [41] schemes at different stages. As can be seen from the table, the cost of our PPTD in the process of calculating the truth value is lower than that of RPTD [41]. This is because all calculations performed on the mobile user device are performed in the plaintext domain, so our PPTD has less communication overhead.

7.3. Discussion

The PRUS scheme, as demonstrated in our experimental evaluation, performs efficiently within the scope of the current study. The combination of blockchain, privacy-preserving algorithms, and truth discovery provides a robust framework for user selection in IoT environments.
In terms of scalability, while the current experiments focus on small-sized IoT networks, the PRUS scheme has the potential to scale to larger networks. One of the key advantages of PRUS over previous schemes is its efficiency in both communication and computation, as demonstrated in our results. By leveraging blockchain’s decentralized nature and optimizing the truth discovery process, PRUS reduces the reliance on centralized servers, which are often bottlenecks in scalability. Additional optimizations will be required in extremely large IoT networks, where millions of devices are interconnected. We can focus on enhancing the scalability of key components, such as reputation verification and truth discovery, to ensure that PRUS remains efficient even in highly distributed, large-scale environments.

8. Conclusions

In this paper, we proposed PRUS, a privacy-preserving and quality-aware user selection scheme tailored for IoT environments. PRUS leverages the decentralized and immutable nature of the blockchain to enhance the reliability and security of the user selection process. Through a combination of a public-key cryptosystem with distributed decryption, truth discovery, and privacy-preserving algorithms, our scheme ensures that users’ data privacy and reputation are protected while maintaining high-quality data collection. In addition, we design a privacy-preserving verification algorithm, which prevents malicious tampering of reputation scores, and the application of the Dirichlet distribution to predict future reputation values, further improving the robustness of the selection process. Our security analysis demonstrated that PRUS effectively protects user privacy, and our experimental results confirmed that the scheme offers significant advantages in terms of communication and computational efficiency when compared to previous approaches.
Due to the integration of blockchain, truth discovery, and privacy protection algorithms, the implementation of the PRUS scheme is relatively complex. Future research will focus on optimizing PRUS for scalability in extremely large networks with millions of interconnected devices. Moreover, additional optimizations will be explored to further reduce communication overhead and improve computational performance.

Author Contributions

Conceptualization, C.Z. and B.H.; methodology, C.Z.; software, Q.F.; validation, H.S. and C.Z.; formal analysis, C.Z.; investigation, C.Z.; resources, B.H.; data curation, J.W.; writing—original draft preparation, B.H.; writing—review and editing, B.H.; visualization, Q.F.; supervision, C.C.; project administration, H.S.; funding acquisition, H.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research is supported by the National Key R&D Plan Program, grant number 2022YFF0609602; the State Administration for Market Regulation Science and Technology Plan Project, grant number 2022MK187; the Central Basic Research Funds Project, grant number 602024Y-11434; the National Natural Science Foundation of China, grant number 62202051; the China Postdoctoral Science Foundation, grant numbers 2021M700435 and 2021TQ0042; Open Foundation of State Key Laboratory of Networking and Switching Technology (Beijing University of Posts and Telecommunications), grant number SKLNST-2024-1-09; the Open Project Funding of Key Laboratory of Mobile Application Innovation and Governance Technology, Ministry of Industry and Information Technology, grant number 2023IFS080601-K; the Beijing Institute of Technology Research Fund Program for Young Scholars; the Young Elite Scientists Sponsorship Program by CAST, grant number 2023QNRC001.

Data Availability Statement

No new data were created or analyzed in this study.

Acknowledgments

The authors express their gratitude to the editors, anonymous reviewers for their comments and suggestions, and all the contributors to this work.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Suhag, D.; Jha, V. A comprehensive survey on mobile crowdsensing systems. J. Syst. Archit. 2023, 142, 102952. [Google Scholar] [CrossRef]
  2. Ray, A.; Chowdhury, C.; Bhattacharya, S.; Roy, S. A survey of mobile crowdsensing and crowdsourcing strategies for smart mobile device users. CCF Trans. Pervasive Comput. Interact. 2023, 5, 98–123. [Google Scholar] [CrossRef]
  3. Zhou, S.; Zhang, X.; Liu, Y.; Jiang, H.; Li, K. Decentralized and compressed data storage for mobile crowdsensing. IEEE Trans. Mob. Comput. 2023, 23, 4694–4708. [Google Scholar] [CrossRef]
  4. Zhang, C.; Luo, X.; Liang, J.; Liu, X.; Zhu, L.; Guo, S. POTA: Privacy-Preserving Online Multi-Task Assignment with Path Planning. IEEE Trans. Mob. Comput. 2024, 23, 5999–6011. [Google Scholar] [CrossRef]
  5. Liu, X.; Chen, H.; Liu, Y.; Wei, W.; Xue, H.; Xia, F. Multi-Task Data Collection With Limited Budget in Edge-Assisted Mobile Crowdsensing. IEEE Internet Things J. 2024, 11, 16845–16858. [Google Scholar] [CrossRef]
  6. Yang, D.; Zhang, W.; Ye, Q.; Zhang, C.; Zhang, N.; Huang, C.; Zhang, H.; Shen, X. DetFed: Dynamic Resource Scheduling for Deterministic Federated Learning Over Time-Sensitive Networks. IEEE Trans. Mob. Comput. 2024, 23, 5162–5178. [Google Scholar] [CrossRef]
  7. Gao, S.; Chen, X.; Zhu, J.; Dong, X.; Ma, J. TrustWorker: A trustworthy and privacy-preserving worker selection scheme for blockchain-based crowdsensing. IEEE Trans. Serv. Comput. 2021, 15, 3577–3590. [Google Scholar] [CrossRef]
  8. Tang, J.; Han, F.; Fan, K.; Xie, W.; Yin, P.; Qu, Z.; Liu, A.; Xiong, N.N.; Zhang, S.; Wang, T. Credit and quality intelligent learning based multi-armed bandit scheme for unknown worker selection in multimedia MCS. Inf. Sci. 2023, 647, 119444. [Google Scholar] [CrossRef]
  9. Zhang, C.; Zhao, M.; Liang, J.; Fan, Q.; Zhu, L.; Guo, S. Nano: Cryptographic enforcement of readability and editability governance in blockchain databases. IEEE Trans. Dependable Secur. Comput. 2023, 21, 3439–3452. [Google Scholar] [CrossRef]
  10. El Hafyani, H.; Abboud, M.; Zuo, J.; Zeitouni, K.; Taher, Y.; Chaix, B.; Wang, L. Learning the micro-environment from rich trajectories in the context of mobile crowd sensing: Application to air quality monitoring. Geoinformatica 2024, 28, 177–220. [Google Scholar] [CrossRef]
  11. Kraft, R.; Hofmann, F.; Reichert, M.; Pryss, R. Dealing with inaccurate sensor data in the context of mobile crowdsensing and mhealth. IEEE J. Biomed. Health Inform. 2022, 26, 5439–5449. [Google Scholar] [CrossRef] [PubMed]
  12. Cheng, Y.; Ma, J.; Liu, Z.; Wu, Y.; Wei, K.; Dong, C. A lightweight privacy preservation scheme with efficient reputation management for mobile crowdsensing in vehicular networks. IEEE Trans. Dependable Secur. Comput. 2022, 20, 1771–1788. [Google Scholar] [CrossRef]
  13. Cheng, Y.; Ma, J.; Liu, Z.; Li, Z.; Wu, Y.; Dong, C.; Li, R. A privacy-preserving and reputation-based truth discovery framework in mobile crowdsensing. IEEE Trans. Dependable Secur. Comput. 2023, 20, 5293–5311. [Google Scholar] [CrossRef]
  14. Guo, B.; Liu, Y.; Wu, W.; Yu, Z.; Han, Q. ActiveCrowd: A framework for optimized multitask allocation in mobile crowdsensing systems. IEEE Trans.-Hum.-Mach. Syst. 2016, 47, 392–403. [Google Scholar] [CrossRef]
  15. Wang, E.; Yang, Y.; Wu, J.; Liu, W.; Wang, X. An efficient prediction-based user recruitment for mobile crowdsensing. IEEE Trans. Mob. Comput. 2017, 17, 16–28. [Google Scholar] [CrossRef]
  16. Yang, Y.; Liu, W.; Wang, E.; Wu, J. A prediction-based user selection framework for heterogeneous mobile crowdsensing. IEEE Trans. Mob. Comput. 2018, 18, 2460–2473. [Google Scholar] [CrossRef]
  17. Feng, W.; Yan, Z. MCS-Chain: Decentralized and trustworthy mobile crowdsourcing based on blockchain. Future Gener. Comput. Syst. 2019, 95, 649–666. [Google Scholar] [CrossRef]
  18. Kadadha, M.; Otrok, H.; Mizouni, R.; Singh, S.; Ouali, A. SenseChain: A blockchain-based crowdsensing framework for multiple requesters and multiple workers. Future Gener. Comput. Syst. 2020, 105, 650–664. [Google Scholar] [CrossRef]
  19. Zhao, K.; Tang, S.; Zhao, B.; Wu, Y. Dynamic and privacy-preserving reputation management for blockchain-based mobile crowdsensing. IEEE Access 2019, 7, 74694–74710. [Google Scholar] [CrossRef]
  20. Hu, C.; Zhang, C.; Lei, D.; Wu, T.; Liu, X.; Zhu, L. Achieving privacy-preserving and verifiable support vector machine training in the cloud. IEEE Trans. Inf. Forensics Secur. 2023, 18, 3476–3491. [Google Scholar] [CrossRef]
  21. Zhang, C.; Hu, C.; Wu, T.; Zhu, L.; Liu, X. Achieving Efficient and Privacy-Preserving Neural Network Training and Prediction in Cloud Environments. IEEE Trans. Dependable Secur. Comput. 2023, 20, 4245–4257. [Google Scholar] [CrossRef]
  22. Duan, H.; Zheng, Y.; Du, Y.; Zhou, A.; Wang, C.; Au, M.H. Aggregating crowd wisdom via blockchain: A private, correct, and robust realization. In Proceedings of the 2019 IEEE International Conference on Pervasive Computing and Communications (PerCom), Kyoto, Japan, 11–15 March 2019; pp. 1–10. [Google Scholar]
  23. Ding, Y.; Chen, Z.; Lin, F.; Tang, C. Blockchain-based credit and arbitration mechanisms in crowdsourcing. In Proceedings of the 2019 3rd International Symposium on Autonomous Systems (ISAS), Shanghai, China, 29–31 May 2019; pp. 490–495. [Google Scholar]
  24. Chatzopoulos, D.; Gujar, S.; Faltings, B.; Hui, P. Privacy preserving and cost optimal mobile crowdsensing using smart contracts on blockchain. In Proceedings of the 2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), Chengdu, China, 9–12 October 2018; pp. 442–450. [Google Scholar]
  25. Miao, C.; Jiang, W.; Su, L.; Li, Y.; Guo, S.; Qin, Z.; Xiao, H.; Gao, J.; Ren, K. Cloud-enabled privacy-preserving truth discovery in crowd sensing systems. In Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, Seoul, Republic of Korea, 1–4 November 2015; pp. 183–196. [Google Scholar]
  26. Miao, C.; Su, L.; Jiang, W.; Li, Y.; Tian, M. A lightweight privacy-preserving truth discovery framework for mobile crowd sensing systems. In Proceedings of the IEEE INFOCOM 2017-IEEE Conference on Computer Communications, Atlanta, GA, USA, 1–4 May 2017; pp. 1–9. [Google Scholar]
  27. Zheng, Y.; Duan, H.; Yuan, X.; Wang, C. Privacy-aware and efficient mobile crowdsensing with truth discovery. IEEE Trans. Dependable Secur. Comput. 2017, 17, 121–133. [Google Scholar] [CrossRef]
  28. Tang, X.; Wang, C.; Yuan, X.; Wang, Q. Non-interactive privacy-preserving truth discovery in crowd sensing applications. In Proceedings of the IEEE INFOCOM 2018-IEEE Conference on Computer Communications, Honolulu, HI, USA, 16–19 April 2018; pp. 1988–1996. [Google Scholar]
  29. Zhang, C.; Zhu, L.; Xu, C.; Liu, X.; Sharif, K. Reliable and privacy-preserving truth discovery for mobile crowdsensing systems. IEEE Trans. Dependable Secur. Comput. 2019, 18, 1245–1260. [Google Scholar] [CrossRef]
  30. Wu, H.; Wang, L.; Cheng, K.; Yang, D.; Tang, J.; Xue, G. Privacy-enhanced and practical truth discovery in two-server mobile crowdsensing. IEEE Trans. Netw. Sci. Eng. 2022, 9, 1740–1755. [Google Scholar] [CrossRef]
  31. Xu, G.; Li, H.; Liu, S.; Wen, M.; Lu, R. Efficient and privacy-preserving truth discovery in mobile crowd sensing systems. IEEE Trans. Veh. Technol. 2019, 68, 3854–3865. [Google Scholar] [CrossRef]
  32. Wang, Y.; Jia, X.; Jin, Q.; Ma, J. QuaCentive: A quality-aware incentive mechanism in mobile crowdsourced sensing (MCS). J. Supercomput. 2016, 72, 2924–2941. [Google Scholar] [CrossRef]
  33. Pouryazdan, M.; Kantarci, B.; Soyata, T.; Foschini, L.; Song, H. Quantifying user reputation scores, data trustworthiness, and user incentives in mobile crowd-sensing. IEEE Access 2017, 5, 1382–1397. [Google Scholar] [CrossRef]
  34. Wang, K.; Qi, X.; Shu, L.; Deng, D.j.; Rodrigues, J.J. Toward trustworthy crowdsourcing in the social internet of things. IEEE Wirel. Commun. 2016, 23, 30–36. [Google Scholar] [CrossRef]
  35. Li, Y.; Gao, J.; Meng, C.; Li, Q.; Su, L.; Zhao, B.; Fan, W.; Han, J. A survey on truth discovery. Acm Sigkdd Explor. Newsl. 2016, 17, 1–16. [Google Scholar] [CrossRef]
  36. Liu, X.; Qin, B.; Deng, R.H.; Lu, R.; Ma, J. A privacy-preserving outsourced functional computation framework across large-scale multiple encrypted domains. IEEE Trans. Comput. 2016, 65, 3567–3579. [Google Scholar] [CrossRef]
  37. Bresson, E.; Catalano, D.; Pointcheval, D. A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, 30 November–4 December 2003; Springer: Berlin/Heidelberg, Germany, 2003; pp. 37–54. [Google Scholar]
  38. Fung, C.J.; Zhang, J.; Aib, I.; Boutaba, R. Dirichlet-based trust management for effective collaborative intrusion detection networks. IEEE Trans. Netw. Serv. Manag. 2011, 8, 79–91. [Google Scholar] [CrossRef]
  39. Xu, C.; Wang, J.; Zhu, L.; Zhang, C.; Sharif, K. PPMR: A privacy-preserving online medical service recommendation scheme in eHealthcare system. IEEE Internet Things J. 2019, 6, 5665–5673. [Google Scholar] [CrossRef]
  40. Josang, A.; Haller, J. Dirichlet reputation systems. In Proceedings of the Second International Conference on Availability, Reliability and Security (ARES’07), Vienna, Austria, 10–13 April 2007; pp. 112–119. [Google Scholar]
  41. Tang, J.; Fu, S.; Xu, M.; Luo, Y.; Huang, K. Achieve privacy-preserving truth discovery in crowdsensing systems. In Proceedings of the 28th ACM International Conference on Information and Knowledge Management, Beijing, China, 3–7 November 2019; pp. 1301–1310. [Google Scholar]
Figure 1. The system model of the PRUS.
Figure 1. The system model of the PRUS.
Mathematics 12 02961 g001
Figure 2. Experimental results for computation cost of RRV. (a) Computation cost, with respect to mobile users and sensing tasks; (b) Computation cost, with respect to mobile users and reputation nodes; (c) Computation cost, with respect to sensing tasks and reputation nodes.
Figure 2. Experimental results for computation cost of RRV. (a) Computation cost, with respect to mobile users and sensing tasks; (b) Computation cost, with respect to mobile users and reputation nodes; (c) Computation cost, with respect to sensing tasks and reputation nodes.
Mathematics 12 02961 g002aMathematics 12 02961 g002b
Figure 3. Experimental results for computation cost of PPTD. (a) Computation cost, with respect to sensing tasks; (b) Computation cost, with respect to mobile users and M = 10 ; (c) Computation cost, with respect to sensing tasks and K = 100 .
Figure 3. Experimental results for computation cost of PPTD. (a) Computation cost, with respect to sensing tasks; (b) Computation cost, with respect to mobile users and M = 10 ; (c) Computation cost, with respect to sensing tasks and K = 100 .
Mathematics 12 02961 g003aMathematics 12 02961 g003b
Table 1. Comparison with related works. ✓ means the goal is met, × means the goal is not met.
Table 1. Comparison with related works. ✓ means the goal is met, × means the goal is not met.
Ref. [14] Ref. [15] Ref. [22] Ref. [23] Ref. [24] Ref. [7] Our PRUS
Privacy × ×
Security × × × × ×
Efficiency × × ×
Table 2. Notations used in our scheme.
Table 2. Notations used in our scheme.
NotationDescription
C m Reputation commitment
MThe number of tasks
KThe number of mobile users participating in the sensing task
x m k User k’s data for task m
w k User k’s reputation
s t d m The standard deviation
z ˜ m The perturbed truths
E ( · ) The ciphertext
ζ The prior parameter
pProbability distribution vector
θ Reputation level vector
q i Weight for each θ i
R U Reputation value of the mobile user
Table 3. Communication overhead comparison.
Table 3. Communication overhead comparison.
Our PPTDRPTD
SetupData upload———- M · | C |
Compute the ciphertext ( K M + K ) · | C | ——-
Compute the truth valuesWeight update ( 2 K + 2 ) · | C | ( 4 K M + 2 ) · | C |
Truth update ( K + 3 M ) · | C | ( 2 M + 2 ) · | C |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Han, B.; Fu, Q.; Su, H.; Chi, C.; Zhang, C.; Wang, J. A Privacy-Preserving and Quality-Aware User Selection Scheme for IoT. Mathematics 2024, 12, 2961. https://doi.org/10.3390/math12192961

AMA Style

Han B, Fu Q, Su H, Chi C, Zhang C, Wang J. A Privacy-Preserving and Quality-Aware User Selection Scheme for IoT. Mathematics. 2024; 12(19):2961. https://doi.org/10.3390/math12192961

Chicago/Turabian Style

Han, Bing, Qiang Fu, Hongyu Su, Cheng Chi, Chuan Zhang, and Jing Wang. 2024. "A Privacy-Preserving and Quality-Aware User Selection Scheme for IoT" Mathematics 12, no. 19: 2961. https://doi.org/10.3390/math12192961

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop