9th International Conference on Communications and Networking in China

Research Article

SAFE-CROWD: Secure Task Allocation for Collaborative Mobile Social Network

  • @INPROCEEDINGS{10.4108/icst.chinacom.2014.256449,
        author={Xiaochen Fan and Panlong Yang and Qingyu Li},
        title={SAFE-CROWD: Secure Task Allocation for Collaborative Mobile Social Network},
        proceedings={9th International Conference on Communications and Networking in China},
        publisher={IEEE},
        proceedings_a={CHINACOM},
        year={2015},
        month={1},
        keywords={security task allocation traffic balancing mobile social network},
        doi={10.4108/icst.chinacom.2014.256449}
    }
    
  • Xiaochen Fan
    Panlong Yang
    Qingyu Li
    Year: 2015
    SAFE-CROWD: Secure Task Allocation for Collaborative Mobile Social Network
    CHINACOM
    IEEE
    DOI: 10.4108/icst.chinacom.2014.256449
Xiaochen Fan1, Panlong Yang1,*, Qingyu Li1
  • 1: PLA University of Science and Technology
*Contact email: panlongyang@gmail.com

Abstract

With the pervasive use of smart mobile devices and increasing wireless networking technologies, collaborations among mobile users are becoming deeper and ubiquitous. Appropriate task collaborations among mobile users could effectively improve the network processing ability with so called ‘mobile cloud’ or ‘cloudlet’. However, task allocations confront with the security issues. The possible collusion or re-collaborations among the mobile users would possibly merge the allocated tasks of the specific users. Moreover, considering the delivery reliability and task execution efficiency, replications are applied for enhancement, which would also lead to more sever security threat for users. We investigate how to secure the security when task collaborations are allowed for mobile users. Our security scheme is built upon the load balancing scheme, and our intuitive solution is, if the tasks could be effectively balanced among users, the security issues could be guaranteed, because averaging the task assignment could effectively raise the threshold for collusion among potential malicious users.