Research Article
Noninteractive Lightweight Privacy-Preserving Auditing on Images in Mobile Crowdsourcing Networks
Table 1
Features of existing schemes.
| | Data trust | Privacy preserving | Noninteractive |
| [4–6] | Voting-based data checking | ╳ | ╳ | [7–9] | Context information-based data checking | ╳ | ╳ | [10–13] | Statistics-based data checking | ╳ | ╳ | [14, 15] | Gold data set-based data checking | ╳ | ╳ | [16, 17] | Data redundancy checking | ╳ | ╳ | [18–21] | ╳ | Encryption | ╳ | [22–25] | ╳ | Differential privacy | ╳ | [26–31] | ╳ | Location privacy | ╳ | [32–35] | ╳ | Personal information privacy | ╳ | [36] | Blockchain-based authorization | ╳ | ╳ | [37] | ╳ | Blockchain-based data privacy | ╳ | [38] | ╳ | Fog-based data privacy | ╳ |
|
|