Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing

The Origin and Trustworthiness of Data in Smart City Applications

Aseel Alkhelaiwi Dan Grigoras


Department of Computer Science Department of Computer Science
University College Cork (UCC) University College Cork (UCC)
Cork, Ireland Cork, Ireland
aa8@cs.ucc.ie d.grigoras@cs.ucc.ie

Abstract— Mobile devices and their sensors facilitate the contribute data that serve their own interest e.g., a leasing
development of a large range of environment-sensing agent who sends fabricated low noise readings in order to
applications and systems. Crowd sensing is used to feed
sell a particular property. Therefore, smart city
smart city applications with anonymous but still relevant
data. The quality and success of smart city applications
applications are useless for citizens in the community if
depend on several aspects of user involvement, such as data the data contributions cannot be trusted. Thus, the
trust and information about data origin. However, with the trustworthiness of data contributed by users/devices must
anonymity and openness of crowd sensing, smart city be evaluated to identify a malicious contribution, i.e.,
applications are exposed to untrustworthy and malicious ensuring data trustworthiness is essential to satisfying
data that can lead to poor decisions. In this paper, we successful smart city applications [1].
propose a cloud architecture for smart city applications that
includes, as a core service, a reputation system for Another key aspect is the possibility of tracing the
evaluating the trustworthiness of crowd sensing data. This
origin of data without affecting contributors’ privacy.
service will run locally, as close to the crowd as possible, for
example, on wireless local area network (WLAN) access Over time, clouds store large amounts of data that will be
points (AP). Additionally, data stored in the cloud is used by many different applications. If data are wrong and
traceable by its origin information. there is no information about their origin, not only will
applications return incorrect results, but there is also no
Keywords-crowd sensing; smart city applications; cloud; way of identifying the source(s) of the errors. Therefore,
trust; data origin we consider that data traceability should be another
feature of smart city applications processing crowd
sensing data. This new feature of mobile cloud
I. INTRODUCTION architecture is important, even in the presence of a trust
Mobile devices, with their sensing capabilities, e.g., system as an additional check, identify and correct
global positioning systems (GPS), accelerometers, mechanism.
cameras, microphones, etc., are a rich source of
environment sensing data. Crowd sensing, which involves In this work, we propose a reputation system for
anonymous crowd data contribution, can be used to evaluating the trustworthiness of the sensor data
develop a wide range of applications and systems. These contributed by users/devices. This reputation system is
include smart city applications that focus on improving different from previous work, discussed in section III.
the citizen’s quality of life, such as through better traffic Instead of having the reputation system deployed in the
management and effective disability support. However, cloud, its service will run locally, as close to the crowd as
due to the limited resources of mobile devices, sensed possible, for example, on wireless local area network
data are usually offloaded and processed in data centers - (WLAN) access points (AP). Local processing of crowd
clouds. Cloud computing involves providing resources to data has several benefits, especially in reducing the
a client on an on-demand basis by using Internet amount of traffic and data filtering. This service allocation
connectivity. Mobile cloud computing (MCC) has the on APs is reasonable in a city Wi-Fi network that is
added benefit of being a motivating technology for crowd designed to support the community. We make the
sensing by uploading a large amount of sensed data from following specific contributions:
mobile phones and other sensors to the cloud to be
processed by smart city applications. The success of smart • A cloud-centered smart city architecture that
city applications depends on the users’ involvement. includes trust and data traceability services is
However, with the open nature of crowd sensing and high proposed.
user contributions, smart city applications can be exposed • We argue for the need for a reputation system in
to untrustworthy and malicious data. For example, some participatory sensing applications to assess the
users may unintentionally contribute incorrect data simply trustworthiness of user-contributed data. We
because the mobile device was in the wrong position or propose a reputation system that is located in the
the sensor had gone out of calibration. Other users may proximity of data contributors using, for

978-0-7695-5697-0/15 $31.00 © 2015 IEEE


978-1-4503-3890-5/15 376
DOI 10.1109/UCC.2015.60

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on June 08,2021 at 09:29:37 UTC from IEEE Xplore. Restrictions apply.
example, WLAN APs. are some scenarios in which evaluating data is very
important:
The rest of this paper is organized as follows. Section
II presents the background and motivation for the work. 1) Events Reporting: Users could report events that
Related work is summarized in Section III. Section IV occurred in malls, universities and other public places and
provides an overview of the system architecture. The share them with others. However, malicious users could
proposed method is given in section V and the discussion try to fabricate the appearance of a crowd at an event in
in section VI. Section VII concludes the paper. order to promote it [6].

II. BACKGROUND AND MOTIVATION 2) Road Repairs: Suppose the City Hall of city “X”
A. Smart City Application launched a mobile application that helped users to send
photographs and locations of the roads that need to be
The concept of a smart city has been introduced as the
repaired in their neighborhood. Malicious users could
application of pervasive computing models to urban
fabricate images in order to have their neighborhood
spaces that focus on developing city network
infrastructures, optimizing traffic and transportation and, repaired first [7].
generally, improving citizens’ quality of life. Emerging
technologies, such as mobile devices, wireless networks, 3) Traffic Warning: Suppose there were an
cloud computing and vehicular networking, promote the application that received traffic jam warnings from users
development of urban computing within smart cities by in a specific location and distributed these alerts to other
enabling tracking and sensing using people’s mobile drivers. Untrustworthy users could send false warnings
devices [2]. Therefore, citizen contribution is an important for some location to reduce traffic congestion for
feature of the system and becomes a requirement for the themselves [8-9].
effective implementation of the smart city concept.
III. RELATED WORK
B. Crowd Sensing A widely used approach to the efficient assessment of
Mobile devices and their sensors have led to sophisticated the trustworthiness of sensed data received from different
context-aware applications and systems. This area has users is to use a reputation system [1]. Researchers [10]
captured a large amount of interest in how users’ mobile have proposed a reputation system for participatory
phones can contribute sensor data towards enabling sensing applications that measures user trust by giving a
environmental awareness (e.g., air pollution and reputation value to each user for his/her contributed data.
transportation), community awareness, healthcare They adopt a similar architecture to the Reputation-based
awareness, etc. Framework for Sensor Networks (RFSN) [11], a
reputation framework for traditional embedded wireless
Context awareness is considered the first generation of sensor networks. The downside of this system is that the
sensing and defined by Pascoe as the ability of devices to trust value of any user is only computed by taking into
sense, interpret and respond to aspects of a user's local account the historical behavior of that user, unlike our
environment [3]. Today, crowd sensing, the second approach, in which the trust value is calculated regardless
generation of sensing, is receiving a lot of attention. It of the previous contributions.
refers to the acquisition of sensor data from multiple (not
only one) mobile devices, generally corresponding to the In the proposed Wi-Fi sensing system for smart city
same geographic area. There are some approaches, such applications, the authors [12] address the trustworthiness
as mobile sensing [4] and public sensing [5], that are of the data published in their system by forming
similar in definition or goals to crowd sensing and are endorsement links between users so that the users can
sometimes used interchangeably in the field. submit reviews of Wi-Fi hotspots along with the data
publishers. Their system is different to ours in that
C. Motivation trustworthiness is actually calculated in the cloud by the
Ultimately, the trustworthiness of the contributed data and number of submitted reviews and the number of
establishing the origin of those data are very important in endorsements earned, not by testing the data itself (in
any crowd sensing application in order for the users (i.e., their case, the strength of the Wi-Fi).
data consumers) to use the data confidently. We consider
that detecting the trustworthiness of data is a major Another system addressing the trustworthiness of
challenge, which, when overcome, will help guarantee the crowdsourcing systems, called Trustworthy Sensing for
success of the crowd sensing application. The following Crowd Management (TSCM), has been proposed [13] as a
cloud-centric crowd management scheme. TSCM adopts

377

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on June 08,2021 at 09:29:37 UTC from IEEE Xplore. Restrictions apply.
the MSensing auction and incentives system for smart contributed by users in the cloud, which means that the
phones [14] and improves it by presenting the reputation cloud will receive both useful and useless data during the
awareness and trustworthiness of the smart phone users. process, which is impractical, and not the case with our
Moreover, user reputation is updated regularly in the approach. All of the above systems use a cloud/server to
cloud in TSCM, where reputation is used as a basis to pay compute the trustworthiness of the data contributed. In
users and assign tasks for them. The reputation score our proposed system, the trustworthiness calculations
calculation depends on the accuracy of the sensed data. take place locally in, for example, WLAN APs or a local
The authors’ system performs the auction and the server.
calculation of the trustworthiness in the cloud, while our
system undertakes the calculation of trust locally.
Furthermore, in their case, the cloud receives all the IV. THE SYSTEM ARCHITECTURE
sensing data, whether trusted or not, from users, whereas A. Definitions of Trust and Reputation
in ours only the sensed data from users with a trust value In this work, we use “trust” and “reputation” as
above a specific threshold are sent to the cloud. separate views, following another work [17]. The term
“trust” relates to building the user’s trust and level of
ARTSense [15] is a framework that addresses the reliability in his/her current contribution accumulated by
problem of trust and anonymity in participatory sensing an AP, i.e., data sensing contributions performed in a
systems. The trustworthiness of the sensing data is specific period of time, such as one day. Reputation
calculated using a trust assessment algorithm. Their management takes place in the cloud to update the user
algorithm is similar to ours as they use different weighting reputation for all of his/her contributions regularly.
factors (location, time, sensor mode and traveling mode) Therefore, trust is a value calculated in an AP over a
to build trust but concentrate on anonymous user period of time, alongside the sensed data. On the other
reputation levels and preserving privacy for users. Unlike hand, reputation is a value calculated in the cloud,
our system, ARTSense performs the anonymity and trust whereby the cloud takes the new trust value received from
algorithm in the cloud. the AP for a specific user and adds it to the previous
reputation to update the reputation value for this particular
CrowdSC [16] is a crowdsourcing framework that user. In other words, the history is considered in the
uses citizen participation in the context of a city. It reputation calculation process, not in the trust process.
transforms queries into simple tasks: collect, filter the data
provided by users, and provide as well as return the B. Smart City Architecture
results to the user. To make the right assessment of the
data, the authors propose a three-step process. The data In our system, there are four components that
collection step collects photos from participants. The data correspond to the four cloud-centric layers [18] in smart
selection step asks other participants to select the photo cities (Fig. 1).
that best represents the problem. Finally, the data
assessment step asks participants to assess each photo 1) Sensor Data Producers
selected from the data selection step. The proposed A subset of users, from two to what we call a crowd, in
system performs all of these steps for assessing data a particular area installs an application called “SenseAll”

Figure 1: Cloud architecture for smart city applications.

378

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on June 08,2021 at 09:29:37 UTC from IEEE Xplore. Restrictions apply.
on their mobile devices, which then start sensing different Step 4. In the WLAN AP, the sensed data, along with
aspects of the city (e.g., traffic, pollution levels, water the user ID, are cached, processed and inserted in a log
levels or leaks). We make the distinction between two file for a period of time in order to build the trust (details
types of producer: non-malicious producers who produce in section V), then the data are sent to the cloud.
truthful data and malicious producers who send untruthful
data. Step 5. In the cloud, data are saved in the sensor
database along with the user ID. The reputation of the
2) Access Points particular user is updated when the trust value is received
The AP receives the sensed data and the user ID, and then saved in the reputation database. The user
performs some processing on the data, inserts the data in a reputation is updated every time the user sends sensed
log file, then calculates the trust of the user in terms of data.
this particular contribution depending on a number of
factors discussed in section V. The data are stored for a Step 6. The sensor database in the cloud is clustered to
period of time, e.g., one day or one week. After that time, other different databases to serve different aspects of the
data are removed from the log file and sent to the cloud, city (traffic database, environment database, etc.).
along with the user ID and the trust value.
Step 7. Smart city applications running in the cloud use
3) Cloud Platform the different databases created in the cloud.
A cloud computing platform provides databases in
which providers’ information, reputations, history and Step 8. The smart city applications are made available
sensed data are stored. Furthermore, the platform hosts a to consumers’ clients. In other words, consumers will be
number of smart city applications that use the sensed data able to subscribe to the cloud and install the clients of
stored in the cloud. These applications are ready to be different smart city applications.
installed/used by consumers.

4) Consumers V. PROPOSED METHOD


Consumers are people or private or public authorities When the sensed data are received, for instance, by the
who consume the sensor data published by the sensor data AP, the data are cached and stored in a log file, along with
providers. There could be one, two or a large number of the user ID, for a determined period of time (e.g., one
consumers. Consumers need to register in the cloud in day) in order to start building trust. We consider four
order to use (i.e., install) smart city applications that important factors for assessing trust with a weighting
benefit from the sensor data stored in the cloud. parameter for every factor:

In our architecture, building trust is performed locally 1) The user status (i.e. not moving, walking, or moving
in a log file that is located as close to the crowd as fast) is an important factor that could affect the quality of
possible, for example, in the WLAN AP, while the the sensed data being sent. The weighting parameter (S)
reputation is saved in the database in the cloud. We are of every status is illustrated in Tab. 1. Every status is
proposing a protocol that involves the entire system given a weight according to the quality of the data
architecture presented in Fig. 1 and consists of the produced with it. For example, the quality of a picture
following steps: taken from a moving vehicle is different from that taken
when the user is stationary. In other words, pictures may
Step 1. Users will use an application called “SenseAll” be shown to be blurry when someone is moving. Someone
installed on their phones to start sensing their taking a picture while walking will also have less chance
surroundings after the authentication process is of taking a blurred picture than when running. Therefore,
completed. the “not moving” status is accorded a higher weighting
than “walking”, “walking” has a higher weighting than
Step 2. Users’ devices send data (photos, voice, “running”, etc.
location, status, date or time), to the cloud using Wi-Fi
access networks.
Table 1: User status weighting parameter.
Step 3. The sensed data, along with the user ID, are
User Status S
received by the WLAN AP, where specific processing is
carried out. Not moving 0.2
Walking 0.15
Running 0.1

379

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on June 08,2021 at 09:29:37 UTC from IEEE Xplore. Restrictions apply.
Moving > 40 mph 0.05 After these factors are calculated, (1) is performed to
compute the trust for the contribution for user “u”:

2) The variety of sensed data will add more weight Tu = e(Su + SSu + Nu + Simu) (1)
when building trust. In other words, the weight parameter
is higher for a user who sends a photo along with a The value Tu ranges from (1.0) to (3.8). This value is
recording and location than a user who sends a photo with tested before sending it to the cloud (after the predefined
a location only. The weighting parameter for the different period of time, e.g., one day):
sensors is shown in Tab. 2. The number assigned to every • If the value is below a specific threshold (below
sensing style depends on the degree of effort made by the or equal to 1.2, where this threshold is chosen
user. Recording voice notes and taking photos need more based on the lowest accepted trust value), then
effort from the user than location, since the location is the contribution will be discarded and the trust
sent by default from the user’s mobile phone. In the value Tu is re-calculated in (2) and sent to the
SenseAll application, the location needs to be turned on cloud along with the user ID:
before sensing in order to send the sensing data (voice,
photo). Tu = - eTu (2)

Table 2: Sensing style weighting parameter. Note that Tu in (2) is a negative number.

Sensing Style SS • If the value is above the threshold, then it will be


Location 0.05 sent to the cloud along with the user ID and the
Voice 0.2 sensed data. The user ID and the sensed data are
Photo 0.2 saved in the sensor database.

3) The user who contributes more to the sensing The trust value is considered in (3) to update the
activity will add more weight to his/her trustworthiness. If reputation value of this user in the reputation database:
one user sends sensed data regularly during a period of
time (the time before the log file is sent to the cloud), the Repu = Rep’u + Tu (3)
trustworthiness of this user and the data he/she sends will
be scored as 0.05 for every contribution, excluding the Where Repu is the new reputation value and Rep’u is the
current contribution. In other words, in our system, previous reputation value. The reputation is in the range
loyalty is an important factor. It is calculated for this from (0) to (100).
parameter for user “u”: Our intuition is that consecutive high trust values will
build a reputation, but one low trust value will ruin it. For
Nu = number of previous contributions in a example, user “X” downloads the SenseAll application,
predefined time * (0.05) agrees to turn the location on and wants to start sensing
data. He/She takes a photo while walking in an area of
4) Sensed data that are similar to each other are interest and sends it to the cloud. Before being received
beneficial to each other. For example, if user “X” and user by the cloud, the data are evaluated in the AP (or a local
“Y” are in the same location and send data that are similar server). User “X” will have a weight of 0.15 for user
to each other, this will add trust for both users. On the status, 0.05 and 0.2 for location and photo, respectively, 0
other hand, if the two users are in the same location but for the number of contributions made during the day
their data are in conflict, the sensed data of the user with (since this was the first) and 0 for similarity, as no similar
the higher reputation, from previous contributions, will be sensing data have been taken in that specific location.
considered and the other one will be discarded. Therefore, Then, Tx = e 0.4 = 1.4, which means the data of user “X”,
similar data will be weighted more heavily when along with his/her trust value Tx= 1.4 and user ID, are
calculating the trust value. This factor is calculated as sent to the cloud, as Tx is above the threshold. To illustrate
follows for user “u”: how the algorithm works in two different scenarios, see
the examples below:
Simu = ∑ u,u’∈ LOG, S’(u,u’)
Table 3: Trust and reputation for user "X".
Where u and u’ are two different users, LOG is the log
Day Day Day Day Day Day Day
file in the AP, S’ is the similarity factor that ranges from 1 2 3 4 5 6 7
(0) for no similarity and (0.1) for similarity. Trust 1.3 2.1 1.9 1.7 1.2 1.4 1.6
Reputation 1.3 3.4 5.3 7.0 3.7 5.1 6.7

380

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on June 08,2021 at 09:29:37 UTC from IEEE Xplore. Restrictions apply.
Example 1:
User “X” downloads the SenseAll application, agrees 
to share his/her location and wants to start sensing the 



   
environment in location “A”. During the first four days of 
sensing, shown in Tab. 3, he/she gains trust values that are 
above the threshold (1.2), which means that the reputation 
value is added every day (Day 1 = 1.3, Day 2 = 1.3 + 2.1 
= 3.4, Day 3 = 3.4 + 1.9 = 5.3, Day 4 = 5.3 + 1.7 = 7.0). 
However, on the fifth day, the user sends data that have a 
trust value equal to the threshold, as the picture he/she

sends is corrupted and only the location counts.


Therefore, the trust value is calculated using (2):

    
1.2
Tx = - e = -3.3  
Figure 2: User "X" and user "Y" reputation values in one week.
And the reputation is calculated using (3):
And the reputation is calculated using (3):
Repx = 7.0 – 3.3 = 3.7
Repy = 1.5 – 3.3 = - 1.8
Note that one bad contribution will have a detrimental
effect on reputation (see Fig. 2). On the sixth and seventh Day 3:
days, the user contributes good data that improve the The trust value is calculated using (2):
reputation but the harm of that one bad contribution
cannot be recovered completely after two days. Ty = - e1.1 = -3.0

Table 4: Trust and reputation for user "Y". And the reputation is calculated using (3):
Day Day Day Day Day Day Day
1 2 3 4 5 6 7 Repy = (-1.8) – 3.0 = - 4.8
Trust 1.5 1.2 1.1 1.7 1.9 1.4 1.7
Reputation 1.5 -1.8 -4.8 -3.1 -1.2 .2 1.9 Then, as shown in Tab. 4, the user took three days to
recover from the two consecutive pieces of untrustworthy
data contributed (see Fig. 2). Therefore, in our approach,
Example 2: building trust takes time but contributing malicious data
User “Y” downloads the SenseAll application, agrees ruins a reputation.
to share his/her location, and wants to start sensing the
environment in location “B”. During the first day, shown
in Table 4, he/she contributes trusted data and has a VI. DISCUSSION
reputation value of 1.5. The data contributed on the We believe that our simple but effective approach will
following two days are below the threshold. This leads to reduce the amount of untruthful data in the cloud by a
negative reputation values that equate to a reputation of large degree, since data with low scores (below a specific
zero. The reputation value is treated as zero because there threshold), according to the factors presented, are
is no scale for negative numbers in our approach; we keep discarded and not sent to the cloud. Unfortunately, existing
them simply to make the reputation calculations. These solutions proposed in related works to solve the issue
are the calculations that occurred on the second and third mentioned in the scenarios in section II and others are
days. weak because they:
• either require offloading all sensed data to the
Day 2: cloud and evaluating the trustworthiness of
The trust value is calculated using (2): the data there, which is unnecessary traffic
and time consuming, or
Ty = - e1.2 = -3.3 • add significant overheads to users’ mobile
phones, since the processing and evaluation
takes place on the phone.

In our proposed solution, the sensed data are processed


and evaluated locally. Malicious data are immediately
discarded when discovered, and not sent to the cloud.

381

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on June 08,2021 at 09:29:37 UTC from IEEE Xplore. Restrictions apply.
Thus, we save more time and avoid traffic overheads when [4] D. Estrin, “Participatory sensing: applications and architecture
sending data to the cloud. Furthermore, in our approach, [internet predictions],” IEEE Internet Computing, vol. 14, no. 1, pp. 12-
42, 2010.
we require that the location service in the mobile phone be
turned on before the user starts sensing in the SenseAll [5] D. Christin, A. Reinhardt, S. S. Kanhere, and M. Hollick, “A survey
application in order to support traceability. We believe in mobile participatory sensing applications,” Journal of System and
that, with traceability, smart city applications in the cloud Software, vol. 84, no. 11, pp. 1928-1946, 2011.
will benefit the most from the data sensed. In our
architecture, we overcame the issue of exposing user [6] K. Toyama, R. Logan, and A. Roseway, “Geographic location tags
identities to traceability by ensuring anonymity. This is on digital images,” Proc. 11th ACM International Conference on
Multimedia. ACM, pp. 156-166, 2003.
because user identities are not sent to the cloud in the first
place, since we only use application IDs assigned to every
[7] K. Benouaret, R. Valliyur-Ramalingam, and F. Charoy, “CrowdSC:
contributing user, and these IDs are the ones sent to the Building smart cities with large-scale citizen participation”, IEEE
cloud. Internet Computing Journal, vol. 17, Iss. 6, pp. 57-63, 2013.

[8] J. Herrera, D. Work, R. Herring, X. Ban, Q. Jacobson, and A. Bayen,


VII. CONCLUSIONS “Evaluation of traffic data obtained via GPS-enabled mobile phones:
The mobile century field experiment,” Transportation Research Part C:
Smart cities run their applications with data contributed Emerging Technologies, vol. 18, no. 4, pp. 568-583, 2010.
by their inhabitants. Crowd sensing not only means
involvement and participation, but also raises issues of [9] J. White, C. Thompson, H. Turner, B. Dougherty, and D. Schmidt,
data trust and origin. Indeed, a smart city cannot run on “Wreckwatch: Automatic traffic accident detection and notification with
untrustworthy data or be unable to trace data origin, as the smartphones,” Mobile Networks and Applications, vol. 16, no. 3, pp.
quality of its application results depends on these features. 285-303, 2011.
In this paper, a smart city architecture that uses crowd
sensing is proposed. The problem of the trustworthiness of [10] K. L. Huang, S. S. Kanhere and W. Hu, “Are you contributing
trustworthy data? The case for a reputation system in participatory
the sensing data is addressed and we present our original sensing,” Proc. of ACM (MSWiM ’10), 2010.
approach to solving the problem. Instead of offloading all
the sensed data to the cloud to make the evaluation there, [11] S. Ganeriwal and M. Srivastava, “Reputation-based framework for
as all previous works suggest, the sensed data are high integrity sensor networks,” ACM Transactions on Sensor Networks
evaluated and processed locally (i.e., in local servers, APs, (TOSN), vol. 4, No. 3, May 2008.
etc.) before sending the data to the cloud. Malicious data
are then discarded and trusted data are sent to the cloud, [12] F. Wu, T. Luo, J. C. J. Liang, “A crowdsourced WiFi sensing
along with the trust value obtained by our approach, in system with an endorsement network in smart cities,” 2015 IEEE Tenth
International Conference on Intelligent Sensors, Sensor Networks and
which the reputation is calculated using historic values Information Processing (ISSNIP), pp. 1-2, April 2015.
gained by this user. Therefore, we reduce traffic and
minimize the amount of time wasted. We also evaluate the [13] B. Kantarci, H. T. Mouftah, “Trustworthy sensing for public safety
quality of the results of our solution. in cloud-centric Internet of Things,” IEEE Internet of Things (IoT)
As the next step, we will develop this approach further Journal, pp. 360-368, July 2014.
and increase its effectiveness in reducing the amount of
untruthful data in the cloud in order for it to be used by [14] D. Yang, G. Xue, X. Fang, and J. Tang, “Crowdsourcing to
different smart city applications. smartphones: Incentive mechanism design for mobile phone sensing,”
Proc. 18th Int. Conf. Mobile Comput. Netw., pp. 173-184, Aug. 2012.
ACKNOWLEDGMENT
[15] X. Wang, W. Cheng, P. Mohapatra, and T. Abdelzaher,
Aseel Alkhelaiwi’s research is funded by King Saud “ARTSense: Anonymous reputation and trust in participatory sensing,”
University in Saudi Arabia. INFOCOM, 2013 Proceedings IEEE, pp. 2517-2525, April 2013.

[16] K. Benouaret, R. Valliyur-Ramalingam, and F. Charoy, “CrowdSC:


REFERENCES Building smart cities with large-scale citizen participation,” IEEE
Internet Computing Journal, vol. 17, Iss. 6, pp. 57-63, 2013.
[1] K. L. Huang, S. S. Kanhere, and W. Hu, “A privacy-preserving
reputation system for participatory sensing,” Proc. 37th Conference on [17] X. Wang, K. Govindan, and P. Mohapatra, “Collusion-resilient
Local Networks (LCN), pp. 10-18. Oct. 2012. quality of information evaluation based on information provenance,”
IEEE 8th Communications Society Conference on Sensor, Mesh and Ad
[2] J. Wan, D. Li, C. Zou, and K. Zhou, "M2M communications for HocCommunications and Networks, 2011.
smart city: An event-based architecture," 2012 IEEE 12th International
Conference on Computer and Information Technology (CIT), pp. 895- [18] C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos,
900, 2012. “Sensing as a service model for smart cities supported by Internet of
Things,” Trans. Emerging Telecommun. Technol., vol. 25, no. 1, pp. 81-
[3] J. Pascoe, “Adding generic contextual capabilities to wearable 93, Jan. 2014.
computers,” 2nd International Symposium on Wearable Computers, pp.
92-99, 1998.

382

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on June 08,2021 at 09:29:37 UTC from IEEE Xplore. Restrictions apply.

You might also like