2021
DOI: 10.1002/int.22371
|View full text |Cite
|
Sign up to set email alerts
|

A two‐stage privacy protection mechanism based on blockchain in mobile crowdsourcing

Abstract: With the rise of the Internet of Things (IoT) and fifth‐generation (5G) networks, which have led to a surge in data processing and increased data transfer time, traditional cloud computing could no longer meet the needs of workers, so edge computing has emerged. Edge computing could meet the demand for low time consumption by processing data at the edge of the network and then transmitting it to a third‐party platform. However, since the credibility of the third‐party platform is unknown which can easily leak … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
30
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 82 publications
(30 citation statements)
references
References 46 publications
0
30
0
Order By: Relevance
“…In the upcoming research, we will continue to refine our work by considering more optimization strategies [45][46]. In addition, how to design appropriate incentive mechanism to promote the release or sharing of sensitive data is a promising issue that enables multi-party collaborations [47][48][49] with high success rate.…”
Section: Discussionmentioning
confidence: 96%
“…In the upcoming research, we will continue to refine our work by considering more optimization strategies [45][46]. In addition, how to design appropriate incentive mechanism to promote the release or sharing of sensitive data is a promising issue that enables multi-party collaborations [47][48][49] with high success rate.…”
Section: Discussionmentioning
confidence: 96%
“…In future study, we will continuously refine SIFSimHash by considering more data types [25][26][27][28][29] and more optimization metrics [30][31][32][33][34][35]. Besides, how to integrate SIFSimHash with other privacy protection techniques (e.g., in [36][37][38][39][40][41][42][43][44][45]) is another research focus.…”
Section: Discussionmentioning
confidence: 99%
“…Blockchain is considered a technology that may provide a powerful solution to network security and a high level of privacy protection [82]. Such as encryption and signature algorithm [83], k-anonymity [84] and transparency [85] of Blockchain can effectively protect privacy. Data security and privacy protection are challenges to be accepted in the explosive growth of data and rapid development of technology.…”
Section: ) Cluster 1 (Red): Data Security and Privacy Protectionmentioning
confidence: 99%