Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
194 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
46 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

A Narrative Review of Identity, Data, and Location Privacy Techniques in Edge Computing and Mobile Crowdsourcing (2401.11305v3)

Published 20 Jan 2024 in cs.CR and cs.CL

Abstract: As digital technology advances, the proliferation of connected devices poses significant challenges and opportunities in mobile crowdsourcing and edge computing. This narrative review focuses on the need for privacy protection in these fields, emphasizing the increasing importance of data security in a data-driven world. Through an analysis of contemporary academic literature, this review provides an understanding of the current trends and privacy concerns in mobile crowdsourcing and edge computing. We present insights and highlight advancements in privacy-preserving techniques, addressing identity, data, and location privacy. This review also discusses the potential directions that can be useful resources for researchers, industry professionals, and policymakers.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (82)
  1. Driving directions, live traffic & road conditions updates - waze. https://www.waze.com/live-map/, 2024. Accessed on 01/20/2024.
  2. Zahrah A. Almusaylim and NZ Jhanjhi. Comprehensive review: Privacy protection of user in location-aware services of mobile cloud computing. Wireless Personal Communications, 111:541–564, 2020.
  3. Mobile edge computing: A survey. IEEE Internet of Things Journal, 5(1):450–465, 2017.
  4. Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions. IEEE transactions on knowledge and data engineering, 17(6):734–749, 2005.
  5. Context-aware recommender systems. In Recommender systems handbook, pages 217–253. Springer, 2010.
  6. A survey on harnessing the applications of mobile computing in healthcare during the covid-19 pandemic: Challenges and solutions. Computer Networks, 224:109605, 2023.
  7. A comprehensive survey on privacy-preserving techniques in federated recommendation systems. Applied Sciences, 13(10):6201, 2023.
  8. Hans Asenbaum. The Politics of Becoming: Anonymity and Democracy in the Digital Age. Oxford University Press, 2023.
  9. A survey on context-aware systems. International Journal of ad Hoc and ubiquitous Computing, 2(4):263–277, 2007.
  10. A comparative study on cloud and edgeb computing: A survey on current research activities and applications. In 2023 IEEE 3rd International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering (MI-STA), pages 679–684, 2023.
  11. Improving rating and relevance with point-of-interest recommender system. In ICC 2022-IEEE International Conference on Communications, pages 1734–1739. IEEE, 2022.
  12. Bert4loc: Bert for location—poi recommender system. Future Internet, 15(6):213, 2023.
  13. A privacy-preserving vehicular crowdsensing-based road surface condition monitoring system using fog computing. IEEE Internet of Things Journal, 4(3):772–782, 2017.
  14. A three-layer approach for protecting smart-citizens privacy in crowdsensing projects. In 2015 34th International Conference of the Chilean Computer Science Society (SCCC), pages 1–5. IEEE, 2015.
  15. Cascade: Reliable distributed session handoff for continuous interaction across devices. In 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), pages 244–254. IEEE, 2018.
  16. Private data aggregation with integrity assurance and fault tolerance for mobile crowd-sensing. Wireless Networks, 23:131–144, 2017.
  17. Privacy-preserving trajectory data publishing by local suppression. Information Sciences, 231:83–97, 2013.
  18. Calibrating noise to sensitivity in private data analysis. In Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedings 3, pages 265–284. Springer, 2006.
  19. Multi-access edge computing: A survey. IEEE Access, 8:197017–197046, 2020.
  20. Privacy aspects of recommender systems. Recommender systems handbook, pages 649–688, 2015.
  21. De-anonymization attack on geolocated data. Journal of Computer and System Sciences, 80(8):1597–1614, 2014.
  22. Optimal task recommendation for mobile crowdsourcing with privacy control. IEEE Internet of Things Journal, 3(5):745–756, 2015.
  23. Data security and privacy in fog computing. IEEE Network, 32(5):106–111, 2018.
  24. Privacy-enhanced participatory sensing with collusion resistance and data aggregation. In Cryptology and Network Security: 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings 13, pages 321–336. Springer, 2014.
  25. Mobile crowd sensing and computing: The review of an emerging human-powered sensing paradigm. ACM computing surveys (CSUR), 48(1):1–31, 2015.
  26. Privacy assurance in mobile sensing networks: Go beyond trusted servers. In 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pages 613–619. IEEE, 2010.
  27. An efficient authentication system of smart device using multi factors in mobile cloud service architecture. International Journal of Communication Systems, 28(4):659–674, 2015.
  28. A survey on fairness-aware recommender systems. Information Fusion, 100:101906, 2023.
  29. Inception: Incentivizing privacy-preserving data aggregation for mobile crowd sensing systems. In Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pages 341–350, 2016.
  30. Consolidated identity management system for secure mobile cloud computing. Computer Networks, 65:99–110, 2014.
  31. Mobile crowdsourcing in smart cities: Technologies, applications, and future challenges. IEEE Internet of Things Journal, 6(5):8095–8113, 2019.
  32. Unitask: A unified task assignment design for mobile crowdsourcing-based urban sensing. IEEE Internet of Things Journal, 6(4):6629–6641, 2019.
  33. Pseudonym changing at social spots: An effective strategy for location privacy in vanets. IEEE transactions on vehicular technology, 61(1):86–96, 2011.
  34. Edge computing on iot for machine signal processing and fault diagnosis: A review. IEEE Internet of Things Journal, 10(13):11093–11116, 2023.
  35. Resource scheduling in edge computing: A survey. IEEE Communications Surveys and Tutorials, 23(4):2131–2165, 2021.
  36. Sprinkler: A probabilistic dissemination protocol to provide fluid user interaction in multi-device ecosystems. In 2018 IEEE International Conference on Pervasive Computing and Communications (PerCom), pages 1–10. IEEE, 2018.
  37. Pseudonym systems. In Selected Areas in Cryptography: 6th Annual International Workshop, SAC’99 Kingston, Ontario, Canada, August 9–10, 1999 Proceedings 6, pages 184–199. Springer, 2000.
  38. Hmc: Robust privacy protection of mobility data against multiple re-identification attacks. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2(3):1–25, 2018.
  39. Contextual modelling in context-aware recommender systems: A generic approach. In International Conference on Web Information Systems Engineering, pages 41–52. Springer, 2011.
  40. Cloud-enabled privacy-preserving truth discovery in crowd sensing systems. In Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, pages 183–196, 2015.
  41. Privasense: Privacy-preserving and reputation-aware mobile participatory sensing. In Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, pages 38–47, 2017.
  42. Security and privacy in fog computing: Challenges. IEEE Access, 5:19293–19304, 2017.
  43. Robust de-anonymization of large sparse datasets. In 2008 IEEE Symposium on Security and Privacy (sp 2008), pages 111–125. IEEE, 2008.
  44. Privacy-preserving real-time navigation system using vehicular crowdsourcing. In 2016 IEEE 84th vehicular technology Conference (VTC-Fall), pages 1–5. IEEE, 2016.
  45. Privacy-preserving mobile crowdsensing for located-based applications. In 2017 IEEE International Conference on Communications (ICC), pages 1–6. IEEE, 2017.
  46. Community-enhanced de-anonymization of online social networks. In Proceedings of the 2014 acm sigsac conference on computer and communications security, pages 537–548, 2014.
  47. Privacy risks of general-purpose language models. In 2020 IEEE Symposium on Security and Privacy (SP), pages 1314–1331. IEEE, 2020.
  48. Privacy in the time of language models. In Proceedings of the Sixteenth ACM International Conference on Web Search and Data Mining, pages 1291–1292, 2023.
  49. The long road to computational location privacy: A survey. IEEE Communications Surveys and Tutorials, 21(3):2772–2793, 2018.
  50. Privacy techniques for edge computing systems. Proceedings of the IEEE, 107(8):1632–1654, 2019.
  51. Security and privacy for iot and fog computing paradigm. In 2018 15th Learning and Technology Conference (L&T), pages 96–101. IEEE, 2018.
  52. Shaina Raza. A covid-19 search engine (co-se) with transformer-based architecture. Healthcare Analytics, 2:100068, 2022.
  53. Shaina Raza. Bias reduction news recommendation system. Digital, 4(1):92–103, 2023.
  54. News recommender system considering temporal dynamics and news taxonomy. In 2019 IEEE international conference on big data (big data), pages 920–929. IEEE, 2019.
  55. Progress in context-aware recommender systems—an overview. Computer Science Review, 31:84–97, 2019.
  56. Deep neural network to tradeoff between accuracy and diversity in a news recommender system. In 2021 IEEE International Conference on Big Data (Big Data), pages 5246–5256. IEEE, 2021.
  57. News recommender system: a review of recent progress, challenges, and opportunities. Artificial Intelligence Review, pages 1–52, 2022.
  58. Improving clinical decision making with a two-stage recommender system. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 2023.
  59. Constructing a disease database and using natural language processing to capture and standardize free text clinical information. Scientific Reports, 13(1):8591, 2023.
  60. Exploiting mobile crowdsourcing for pervasive cloud services: challenges and solutions. IEEE Communications Magazine, 53(3):98–105, 2015.
  61. Mobile cloud computing: A survey on current security trends and future directions. Engineering Proceedings, 32(1), 2023.
  62. Privacy enhanced matrix factorization for recommendation with local differential privacy. IEEE Transactions on Knowledge and Data Engineering, 30(9):1770–1782, 2018.
  63. Edge ai: A survey. Internet of things and cyber-physical systems, 2023.
  64. A survey on federated recommendation systems. arXiv preprint arXiv:2301.00767, 2022.
  65. Privacy preservation in the publication of trajectories. In The Ninth international conference on mobile data management (mdm 2008), pages 65–72. IEEE, 2008.
  66. Assuring privacy and reliability in crowdsourcing with coding. In 2014 Information Theory and Applications Workshop (ITA), pages 1–6. IEEE, 2014.
  67. Privacy, quality of information, and energy consumption in participatory sensing systems. In 2014 IEEE international conference on pervasive computing and communications (PerCom), pages 199–207. IEEE, 2014.
  68. A secure and privacy-preserving navigation scheme using spatial crowdsourcing in fog-based vanets. Sensors, 17(4):668, 2017.
  69. Personalized privacy-preserving data aggregation for histogram estimation. In 2015 IEEE Global Communications Conference (GLOBECOM), pages 1–6. IEEE, 2015.
  70. Convergence of edge computing and deep learning: A comprehensive survey. IEEE Communications Surveys and Tutorials, 22(2):869–904, 2020.
  71. Distilling at the edge: A local differential privacy obfuscation framework for iot data analytics. IEEE Communications Magazine, 56(8):20–25, 2018.
  72. Participatory cultural mapping based on collective behavior data in location-based social networks. ACM Transactions on Intelligent Systems and Technology (TIST), 7(3):1–23, 2016.
  73. Fine-grained preference-aware location search leveraging crowdsourced digital footprints from lbsns. In Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing, pages 479–488, 2013.
  74. Anonymity-based privacy-preserving data reporting for participatory sensing. IEEE Internet of Things Journal, 2(5):381–390, 2015.
  75. Identity privacy-preserving public auditing with dynamic group for secure mobile cloud storage. In Network and System Security: 8th International Conference, NSS 2014, Xi’an, China, October 15-17, 2014, Proceedings 8, pages 28–40. Springer, 2014.
  76. Linking anonymous location traces through driving characteristics. In Proceedings of the third ACM conference on Data and application security and privacy, pages 293–300, 2013.
  77. Evaluating recommender systems: survey and framework. ACM Computing Surveys, 55(8):1–38, 2022.
  78. Data security and privacy-preserving in edge computing paradigm: Survey and open issues. IEEE access, 6:18209–18237, 2018.
  79. Efficient chameleon hashing-based privacy-preserving auditing in cloud storage. Cluster Computing, 19(1):47–56, 2016.
  80. Deep learning based recommender system: A survey and new perspectives. ACM computing surveys (CSUR), 52(1):1–38, 2019.
  81. A survey of large language models. arXiv preprint arXiv:2303.18223, 2023.
  82. Privacy-preserving verifiable data aggregation and analysis for cloud-assisted mobile crowdsourcing. In IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications, pages 1–9. IEEE, 2016.
Citations (1)

Summary

We haven't generated a summary for this paper yet.