Abstract
With the development of mobile smartphones equipped with a large number of sensor devices, mobile crowd computing has become the hotspot of current research. In the application, the publishers use the application platform to release the task and then select the appropriate users to participate in the task by bidding and collect their data, in which the users’ identity, location, and other private information face the risk of disclosure. To solve the problem of privacy disclosure in mobile crowd computing, we propose a privacy preserving method based on Voronoi Polygon (PP - Voronoi). The users construct the Voronoi diagram to form a cloaked region hiding users identity and then calculate the anchor point of the cloaked region, by which the users communicate with the task publisher to achieve privacy protection of the cloaked region and K anonymity. The experimental results show that compared with other privacy preserving methods, PP-Voronoi method has better effectiveness of privacy protection and lower network traffic.
Introduction
In the information era, with the popularity of smartphones equipped with a large number of sensor devices (such as GPS, camera, accelerometer, Wi-Fi/4G interface), mobile crowd computing (MCC) applications have developed rapidly. Mobile users can obtain complex data information (such as noise, weather, environment, traffic) at different locations by carrying mobile terminal devices. At present, a large number of MCC applications have been developed, including environmental testing, 1 traffic monitoring,2,3 and noise monitoring.4,5Figure 1 is the description of the MCC scenario. First, mobile users need to register as a candidate on the MCC platform. Task publishers release sensing tasks with certain requirements, including sensing locations, sensing times, sensing skills, and budget constraints. Candidate users acquire sensing tasks to calculate their own costs and upload bidding to the platform. The platform selects the winner of the bidding based on the criteria. After completing the sensing task, the selected users upload the sensing data and obtain the reward and evaluation. 6 In this process, more users participating in the sensing task do not need to consider the cost of privacy as the users privacy is protected. This is an important research content on the current MCC.

Description of the MCC scenario.
Related work
In MCC, taking into account that the privacy costs affect the users’ enthusiasm of participating in the sensing task, some privacy protection methods are proposed nowadays, which can be divided into four categories: (1) encryption method, (2) anonymous method, (3) sensitive location hiding method, and (4) cloaked region method. Some users may need other users’ bidding and sensing data to adjust their strategy, so as to obtain greater benefits. Even worse, the malicious user deduces the users’ location and activity trajectory by the obtained user-uploaded data. Further decrease in inference of privacy information can effectively encourage users to actively participate in the sensing task.
At present, the more direct way to solve the location disclosure is the anonymous method and is to hide the users’ true identity and related location information. However, the opponent can infer the users identity and location information by obtaining sufficient sensing data. To further reduce the opponents’ inference, Chen et al. 7 used K-anonymous mechanisms to overcome the exposure of real identity information caused by low user density. Beresford and Stajano 8 proposed the method of hiding the identity information by frequently changing the anonymous information. However, if the opponent obtains a large amount of spatiotemporal correlation sensing data, he can also associate the user to transform the anonymous information to acquire the users’ identity and location. Yang et al. 9 proposed a K-anonymous location privacy protection mechanism to solve the above problem. However, in sparse environment, the attacker can still infer the users’ information. Freudiger et al. 10 proposed to add anonymous users to a mixed area to protect their location information. However, as this method assumes that the users of the mixed area are trustworthy, it cannot prevent the attack of the bad users. In addition, the mixed area is regular, so the attacker can infer the relevant information by repeatedly inferring. This work mainly focuses on the following problems:
The malicious user can analyze the users’ identity and location information by obtaining enough data with spatiotemporal correlation and further deduce the users’ trajectory information.
How to establish an irregular cloaked region so that it would be difficult for attackers to infer the users’ activity range;
How to prevent the untrusted users in the cloaked region from attacking user information.
To solve the above problem, we propose a privacy preserving method based on Voronoi diagram. First of all, the users build their own Voronoi cell and then band with other users to establish a K-anonymous cloaked region. To further prevent the attacker from inferring the users’ location information, in the cloaked region, we calculate an anchor to communicate with the task publisher. In addition, to prevent untrusted users from attacking, the users utilize anonymous method to transmit only anonymous information and Voronoi cell area to the neighbors. The major contributions of this article are summarized in the following:
To the best of our knowledge, we are the first to apply Voronoi diagram to protect participants’ privacy in MCC, where users can hide their specific location in irregular region. We construct Voronoi cell by the setting of users’ activity range and sensing range threshold to reduce computational complexity using geometric method.
We propose an establishment method of the cloaked region to further protect the participants’ privacy, which utilizes a distributed mechanism to broadcast requests and communicates among users by cache contact list to overcome many unique limitations in mobile environment. In addition, we design a calculation method of the anchor to reduce the communication overhead.
To verify the performance of the
The rest of the article is organized as follows: section “Privacy preserving method based on Voronoi diagram” describes in detail the privacy preserving method based on Voronoi diagram. Section “Performance evaluation” evaluates the performance of our proposed method by extensive simulations, along with the related parameters setting, followed by the result discussions and analysis. Section “Conclusion” concludes the article.
Privacy preserving method based on Voronoi diagram
In MCC, due to the problems of privacy disclosure, the users do not want to upload too much information to the platform. Even if the users hide their location information, it is also very easy to infer the users’ location due to the users’ motion or the sparse network environment. 11 To better protect the users’ privacy, we introduce our approach step by step in the following part.
Establishment of the Voronoi diagram
To prevent privacy disclosure, users hide their position by the establishment of the Voronoi diagram, which is a geometric structure in computational geometry and a spatial segmentation method which can form some irregular area. Polygons in the Voronoi diagram on a two-dimensional (2D) plane are often called Voronoi cell. In the geometric space, the Voronoi cell represents the corresponding spatial description or range of action for each user. Figure 2 is a description of the Voronoi diagram generation. The specific Voronoi diagram is defined in the figure

Establishment of the Voronoi diagram.
Definition 1
Assume that the user set
In the user set S, each point which is viewed as a growth kernel expands outward at the same rate until each other encounters to form the Voronoi diagram on a plane. Some outermost points form the open area, and the rest form a convex polygon (Voronoi cell). In the Voronoi diagram, the distance from any point of the Voronoi cells to the control point
The sensing platform forwards all the sensing tasks in the Voronoi cell to the corresponding user
Privacy preserving method
The Voronoi cell, which is calculated by the sensing platform, has a large degree of privacy disclosure. So the users can contact his neighbors to establish their own Voronoi cell. But the platform is still able to infer the users’ activity range, so the user cannot fully realize the privacy protection by only relying on the establishment of Voronoi cell. To overcome this problem, we design to establish a cloaked region on the basis of Voronoi diagram, by which user can further protect the privacy. The users’ privacy preserving level is determined by the privacy protection value
The first step is to build a users’ Voronoi diagram. In the literatures,12–14 the authors proposed some algorithms to calculate the Voronoi diagram. However, these geometry algorithms have high computational complexity and are not suitable for mobile environments. In this article, we improve the generation method of original Voronoi diagrams to construct a Voronoi cell by the distribution area of user
To further protect the users’ privacy, when each user establishes their own Voronoi cell, the second step is to establish a cloaked region among adjacent users in mobile environment, which have a lot of unique limitations, scarce bandwidth resources, limited transmission range, user mobility, and multi-hop communication.
15
To overcome these limitations, we utilize the historical non-sensitive information sharing scheme and the establishment of cache contact list to reduce the limited communication overhead. In addition, we build a cloaked region of limited number users by the broadcasting method to overcome the problem of limited transmission range. Finally, due to the users’ mobility, the cloaked area adjustment scheme can remove and add users in real time. The following is a specific method. The user first broadcasts a request to his or her neighbors through a single-hop route to look for neighbors to join. If he does not find enough neighbors, he or she will continue through the multi-hop route until he finds K − 1 neighbors. To decrease the users’ distrust in the cloaked region, the user

Establishment of the cloaked region.
After the cloaked region is constructed, the third step is to select an anchor point
To prevent malicious users from attacking, the user first builds their own Voronoi cell, and then K users form a cloaked region, where the users only transmit Voronoi cell area with the neighbors anonymously. It prevents the attack of the untrusted user. In addition, the Voronoi cells and cloaked region are both irregular in our proposed method, so it is difficult to deduce the identity information and the specific location of the users for a malicious attacker. Due to the dynamic nature of mobile users, when users leave the cloaked region, to ensure the privacy level, we can dynamically invite new users to join.
Performance evaluation
To evaluate the performance of the
Experimental setup
All the simulations are run on laptop with Intel Core i7-5557U CPU 3.10 GHZ, 8 GB memory, and Windows 8.1 operating system. We utilize Dev-cpp 5.4 as simulation platform to compile the three privacy preserving methods and carry out a simple wireless network node simulation, setting 4G network communication with the 20 Mbps bandwidth between users in NS2. The experimental data are generated using the Thomas Brinkhoff network data generator in Chen et al. 18 This method is a commonly used method of moving data research, which uses the urban Oldenburg traffic network as input to generate simulated mobile user data. Table 1 lists the parameters used in the experiment. All experimental results are the average values of at least 100 rounds of experiments.
The settings of parameters.
Experimental analysis
We consider the experimental environment and parameters with the same scenario as Huang et al.
17
We first compare the cloaked success rate of different privacy protection methods. When the number of users changes, we set the K value as 5. The number of untrusted users increases as the users’ number goes up. Because our proposed method and

The comparative results of cloaked success rate: (a) under different number of users and (b) under different privacy protection level K.
From Figure 5(a), we can observe that the average response time of three privacy protection methods decreases with the increasing of users’ number because it is easier to construct cloaked region of anonymous user. However, the

The comparative results of mean response time: (a) under different number of users and (b) under different privacy protection level K.
The average traffic refers to the average mutual communication times from the setting up of the cloaked area to the task ending. From Figure 6(a), we can observe that when the number of users is limited, it takes more communication times to build a cloaked area so that the average traffic of the three methods is all higher. As the number of users goes up, the untrusted users number increases, too. The calculation of anchor point in the

The comparative results of average traffic: (a) under different number of users and (b) under different privacy protection level K.
Conclusion
In MCC, the users participating in the sensing task face the risk of privacy disclosure, which seriously impedes the participation of massive users. In this article, we propose a privacy preserving method based on Voronoi diagram. The users create a Voronoi cell and cloaked region among them and then choose an anchor point to communicate with the platform. By this method, it is difficult for a malicious attacker to infer the users’ private information. The experimental results show that our privacy protection method can effectively protect the users’ privacy. Compared to other methods, the average response time and the average traffic have greatly improved. In further research work, we mainly consider the dynamic updating of the anonymous users in the cloaked area and how to apply the lightweight encryption algorithm to the users’ privacy protection.
Footnotes
Handling Editor: Yanping Zhang
Declaration of conflicting interests
The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
Funding
The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: This work is supported by National Natural Science Foundation of China under grant nos 61070169, 61201212, Natural Science Foundation of Jiangsu Province under grant no. BK2011376, Production-Teaching-Research Prospective of Jiangsu Province under grant no. BY2012114, and Suzhou Key Laboratory of Converged Communication under grant no. SKLCC 2013XX.
