Privacy-preserving crowd-sensed trust aggregation in the user-centeric internet of people networks
Journal article
Authors | Azad, Muhammad, Perera, Charith, Bag, Samiran, Barhamgi, Mahmoud and Hao, Feng |
---|---|
Abstract | Today we are relying on the Internet technologies for various types of services ranging from personal communication to the entertainment. The online social networks (Facebook, twitter, youtube) has seen an increase in subscribers in recent years developing a social network among people termed as the Internet of People. In such a network, subscribers use the content disseminated by other subscribers. The malicious users can also utilize such platforms for spreading the malicious and fake content that would bring catastrophic consequences to a social network if not identified on time. People crowd-sensing on the Internet of people system has seen a prospective solution for the large scale data collection by leveraging the feedback collections from the people of the internet that would not only help in identifying malicious subscribers of the network but would also help in defining better services. However, the human involvement in crowd-sensing would have challenges of privacy-preservation, intentional spread of false high score about certain user/content undermining the services, and assigning different trust scores to the peoples of the network without disclosing their trust weights. Therefore, having a privacy-preserving system for computing trust of people and their content in the network would play a crucial role in collecting high-quality data from the people. In this paper, a novel trust model is proposed for evaluating the trust of the people in the social network without compromising the privacy of the participating people. The proposed systems have inherent properties of the trust weight assignment to a different class of user i.e. it can assign different weights to different users of the network, has decentralized setup, and ensures privacy properties under the malicious and honest but curious adversarial model. We evaluated the performance of the system by developing a prototype and applying it to different online social network dataset. |
Keywords | privacy-preservation; crowdsourcing; security |
Year | 2020 |
Journal | ACM Transactions on Cyber-Physical Systems |
Publisher | ACM |
ISSN | 2378-962X |
2378-9638 | |
Digital Object Identifier (DOI) | https://doi.org/10.1145/3446431 |
Web address (URL) | http://hdl.handle.net/10545/624948 |
hdl:10545/624948 | |
Publication dates | 2020 |
Publication process dates | |
Deposited | 06 Jul 2020, 14:05 |
Accepted | 01 Mar 2020 |
Contributors | University of Derby, Cardiff University, University of Warwick and Universite Claude Bernard Lyon |
File | File Access Level Open |
https://repository.derby.ac.uk/item/94v6z/privacy-preserving-crowd-sensed-trust-aggregation-in-the-user-centeric-internet-of-people-networks
Download files
59
total views0
total downloads3
views this month0
downloads this month
Export as
Related outputs

Large-scale Data Integration Using Graph Probabilistic Dependencies (GPDs)
Zada, Muhammad Sadiq Hassan, Yuan, Bo, Anjum, Ashiq, Azad, Muhammad Ajmal, Khan, Wajahat Ali and Reiff-Marganiec, Stephan 2020. Large-scale Data Integration Using Graph Probabilistic Dependencies (GPDs). IEEE. https://doi.org/10.1109/bdcat50828.2020.00028
Persation: an IoT based personal safety prediction model aided solution
Alofe, Olasunkanmi Matthew, Fatema, Kaniz, Azad, Muhammad Ajmal and Kurugollu, Fatih 2020. Persation: an IoT based personal safety prediction model aided solution. International Journal of Computing and Digital Systems.
Designing privacy-aware internet of things applications
Perera, Charith, Barhamgi, Mahmoud, Bandara, Arosha K., Ajmal, Muhammad, Price, Blaine and Nuseibeh, Bashar 2019. Designing privacy-aware internet of things applications. Elsevier Information Sciences. https://doi.org/10.1016/j.ins.2019.09.061
Authentic-caller: Self-enforcing authentication in a next generation network
Azad, Muhammad Ajmal, Bag, Samiran, Perera, Charith, Barhamgi, Mahmoud and Hao, Feng 2019. Authentic-caller: Self-enforcing authentication in a next generation network. IEEE Transactions on Industrial Informatics. https://doi.org/10.1109/tii.2019.2941724
CRT-BIoV: A cognitive radio technique for blockchain-enabled internet of vehicles
Rathee, Geetanjali, Ahmad, F., Kurugollu, Fatih, Azad, Muhammad, Iqbal, Razi and Imran, Muhammad 2020. CRT-BIoV: A cognitive radio technique for blockchain-enabled internet of vehicles. IEEE Transactions on Intelligent Transportation Systems. https://doi.org/10.1109/TITS.2020.3004718
A first look at privacy analysis of COVID-19 contact tracing mobile applications
Azad, Muhammad Ajmal, Arshad, Junaid, Akmal, Syed Muhammad Ali, Riaz, Farhan, Abdullah, Sidrah, Imran, Muhammad and Ahmad, F. 2020. A first look at privacy analysis of COVID-19 contact tracing mobile applications. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2020.3024180
PriVeto: a fully private two round veto protocol.
Samiran, Bag, Muhammad Ajmal, Azad and Feng, Hao 2018. PriVeto: a fully private two round veto protocol. IET Information Security. https://doi.org/10.1049/iet-ifs.2018.5115
M2M-REP: Reputation system for machines in the internet of things.
Azad, Muhammad Ajmal, Bag, Samiran, Hao, Feng and Salah, Khaled 2018. M2M-REP: Reputation system for machines in the internet of things. Computers & Security. 79, pp. 1-16. https://doi.org/10.1016/j.cose.2018.07.014
Consumer-facing technology fraud: Economics, attack methods and potential solutions
Mohammed Aamir, Ali, Muhammad AJmal, Azad, Mario Parreno, Centeno, Feng, Hao and Aad Van, Moorsel 2019. Consumer-facing technology fraud: Economics, attack methods and potential solutions. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2019.03.041
TrustVote: Privacy-preserving node ranking in vehicular networks
Muhammad AJmal, Azad, Samiran, Bag, Simon, Parkinson and Feng, Hao 2018. TrustVote: Privacy-preserving node ranking in vehicular networks. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2018.2880839