Online citations, reference lists, and bibliographies.
Please confirm you are human
(Sign Up for free to never see this)
← Back to Search

Optimal Task Recommendation For Spatial Crowdsourcing With Privacy Control

Dan. Lu, Q. Han, H. Zhao, Kejia Zhang
Published 2017 · Computer Science

Save to my Library
Download PDF
Analyze on Scholarcy
Share
Mobile crowdsourcing (MC) is a transformative paradigm that engages a crowd of mobile users (i.e., workers) in the act of collecting, analyzing, and disseminating information or sharing their resources. To ensure quality of service, MC platforms tend to recommend MC tasks to workers based on their context information extracted from their interactions and smartphone sensors. This raises privacy concerns hard to address due to the constrained resources on mobile devices. In this paper, we identify fundamental tradeoffs among three metrics—utility, privacy, and efficiency—in an MC system and propose a flexible optimization framework that can be adjusted to any desired tradeoff point with joint efforts of MC platform and workers. Since the underlying optimization problems are NP-hard, we present efficient approximation algorithms to solve them. Since worker statistics are needed when tuning the optimization models, we use an efficient aggregation approach to collecting worker feedbacks while providing differential privacy guarantees. Both numerical evaluations and performance analysis are conducted to demonstrate the effectiveness and efficiency of the proposed framework.
This paper references
10.1137/1.9781611972719.5
On the performance of bisecting K-means and PDDP
S. Savaresi (2001)
10.1145/2370216.2370373
Context-aware mobile crowdsourcing
A. Tamilin (2012)
10.1109/ICDE.2012.16
Differentially Private Spatial Decompositions
Graham Cormode (2012)
10.1145/1807342.1807376
The labor economics of paid crowdsourcing
J. Horton (2010)
Serving Ads from localhost for Performance, Privacy, and Profit
S. Guha (2009)
10.1371/journal.pmed.1000376
Participatory Epidemiology: Use of Mobile Phones for Community-Based Health Reporting
C. Freifeld (2010)
Clustering Algorithms Research
S. Ji (2008)
10.1109/INFCOM.2010.5462174
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
Shucheng Yu (2010)
Online Task Assignment in Crowdsourcing Markets
C. Ho (2012)
10.1145/2660267.2660270
Location Privacy Protection for Smartphone Users
Kassem Fawaz (2014)
Analyzing Privacy in Enterprise Packet Trace Anonymization
Bruno Ribeiro (2008)
10.1145/2424321.2424346
GeoCrowd: enabling query answering with spatial crowdsourcing
L. Kazemi (2012)
10.1007/978-3-642-03511-1_2
Location Privacy Techniques in Client-Server Architectures
Christian S. Jensen (2009)
10.1109/INFCOM.2010.5462147
PriSense: Privacy-Preserving Data Aggregation in People-Centric Urban Sensing Systems
Jing Shi (2010)
10.24017/SCIENCE.2017.2.2
Biochemical markers and fertility rate of hydatid cyst isolated from human and animal in Sulaimani province
A. A. Hama (2017)
10.1145/2444776.2444791
A framework for context-aware privacy of sensor data on mobile systems
S. Chakraborty (2013)
10.3724/SP.J.1001.2008.00048
Clustering Algorithms Research: Clustering Algorithms Research
J. Sun (2008)
10.1145/1066116.1189037
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Marco Gruteser (2003)
10.1145/2442657.2442661
Task recommendation in crowdsourcing systems
M. Yuen (2012)
10.1007/11428572_10
A Formal Model of Obfuscation and Negotiation for Location Privacy
M. Duckham (2005)
Towards Task Recommendation in Micro-Task Markets
V. Ambati (2011)
10.1007/11787006_1
Differential Privacy
C. Dwork (2006)
10.1145/1099554.1099747
Implicit user modeling for personalized search
X. Shen (2005)
10.1109/TMC.2016.2586058
Differentially Private Location Protection for Worker Datasets in Spatial Crowdsourcing
H. To (2017)
10.1145/1217299.1217302
L-diversity: privacy beyond k-anonymity
Ashwin Machanavajjhala (2006)
10.1145/1242572.1242652
Privacy-enhancing personalized web search
Yabo Xu (2007)
10.1145/1620585.1620591
Casper*: Query processing for location services without compromising privacy
M. Mokbel (2009)
10.1145/2493432.2493498
Understanding the coverage and scalability of place-centric crowdsensing
Yohan Chon (2013)
10.1007/11761679_29
Our Data, Ourselves: Privacy Via Distributed Noise Generation
C. Dwork (2006)
10.1109/TIFS.2013.2252618
TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing
Sheng Gao (2013)
10.1145/2470654.2470745
Labor dynamics in a mobile micro-task market
Mohamed Musthag (2013)
10.14778/2732951.2732966
A Framework for Protecting Worker Location Privacy in Spatial Crowdsourcing
H. To (2014)
10.1145/1376616.1376631
Private queries in location based services: anonymizers are not necessary
Gabriel Ghinita (2008)
10.1109/MDM.2014.15
Spatial Task Assignment for Crowd Sensing with Cloaked Locations
Layla Pournajaf (2014)
10.1109/SP.2011.37
RePriv: Re-imagining Content Personalization and In-browser Privacy
Matt Fredrikson (2011)
10.1145/1460412.1460440
PoolView: stream privacy for grassroots participatory sensing
Raghu K. Ganti (2008)
10.1007/978-3-642-04592-9_7
Context-Aware User and Service Profiling by Means of Generalized Association Rules
E. Baralis (2009)
10.1145/2382196.2382266
Privacy-aware personalization for mobile advertising
M. Hardt (2012)
10.1142/S0218488502001648
k-Anonymity: A Model for Protecting Privacy
L. Sweeney (2002)
Towards Statistical Queries over Distributed Private User Data
R. Chen (2012)
10.1145/1866739.1866758
A firm foundation for private data analysis
C. Dwork (2011)
10.1145/1868914.1868921
Location-based crowdsourcing: extending crowdsourcing to the real world
Florian Alt (2010)
10.1145/800070.802212
Probabilistic encryption & how to play mental poker keeping secret all partial information
S. Goldwasser (1982)
10.1145/1807167.1807247
Differentially private aggregation of distributed time-series with transformation and encryption
Vibhor Rastogi (2010)
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces
Scott E. Coull (2007)
10.1007/978-3-642-22444-7_15
Privacy-Friendly Energy-Metering via Homomorphic Encryption
F. Garcia (2010)
10.1145/2382196.2382261
Protecting location privacy: optimal strategy against localization attacks
R. Shokri (2012)
10.1002/(SICI)1520-6750(199809)45:6<615::AID-NAV5>3.0.CO;2-5
Analysis of the greedy approach in problems of maximum k‐coverage
D. Hochbaum (1998)
10.1109/INFCOM.2010.5462173
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
C. Wang (2010)
10.1145/2525314.2525323
Haze: privacy-preserving real-time traffic statistics
J. Brown (2013)



This paper is referenced by
Semantic Scholar Logo Some data provided by SemanticScholar