Advertisement

Towards secure and truthful task assignment in spatial crowdsourcing

  • Dongjun Zhai
  • Yue Sun
  • An LiuEmail author
  • Zhixu Li
  • Guanfeng Liu
  • Lei Zhao
  • Kai Zheng
Article
  • 114 Downloads
Part of the following topical collections:
  1. Special Issue on Web Information Systems Engineering 2017

Abstract

The ubiquity of mobile device and wireless networks flourishes the market of spatial crowdsourcing, in which location constrained tasks are sent to workers and expected to be performed in some designated locations. To obtain a global optimal task assignment scheme, the platform usually needs to collect location information of all workers. During this process, there is a significant security concern, that is, the platform may not be trustworthy, so it brings about a threat to workers location privacy. In this paper, to tackle the privacy-preserving task assignment problem, we propose a privacy-preserving reverse auction based assignment model which consists of two key parts. In the first part, we generalize private location to travel cost and protect it by an anonymity based data aggregation protocol. In the second part, we propose a reverse auction task assignment algorithm, which is a truthful incentive mechanism, to encourage workers to offer authentic data. We theoretically show that the proposed model is secure against semi-honest adversaries. Experimental results show that our model is efficient and can scale to real SC applications.

Keywords

Privacy-preserving Spatial crowdsourcing Task assignment Reverse auction 

Notes

Acknowledgements

Research reported in this publication was partially supported by Natural Science Foundation of China (Grant Nos. 61572336, 61632016, 61572335), and the Natural Science Research Project of Jiangsu Higher Education Institution (Grant No. 18KJA520010).

References

  1. 1.
    Andrés, M.E., Bordenabe, N.E., Chatzikokolakis, K., Palamidessi, C.: Geo-indistinguishability: differential privacy for location-based systems. In: 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS’13, Berlin, Germany, November 4–8, 2013, pp. 901–914 (2013)Google Scholar
  2. 2.
    Asghari, M., Shahabi, C.: On on-line task assignment in spatial crowdsourcing. In: 2017 IEEE International Conference on Big Data, BigData 2017, Boston, MA, USA, December 11–14, 2017, pp. 395–404 (2017)Google Scholar
  3. 3.
    Chen, L., Shahabi, C.: Spatial crowdsourcing: challenges and opportunities. IEEE Data Eng. Bull. 39(4), 14–25 (2016)Google Scholar
  4. 4.
    Chen, Z., Fu, R., Zhao, Z., Liu, Z., Xia, L., Chen, L., Cheng, P., Cao, C.C., Tong, Y., Zhang, C.J.: gmission: A general spatial crowdsourcing platform. Proc. VLDB Endow. 7(13), 1629–1632 (2014)CrossRefGoogle Scholar
  5. 5.
    Chen, C., Cheng, S., Lau, H.C., Misra, A.: Towards city-scale mobile crowdsourcing: task recommendations under trajectory uncertainties. In: Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, IJCAI 2015, Buenos Aires, Argentina, July 25–31, 2015, pp. 1113–1119 (2015)Google Scholar
  6. 6.
    Cheng, P., Lian, X., Chen, L., Han, J., Zhao, J.: Task assignment on multi-skill oriented spatial crowdsourcing. IEEE Trans. Knowl. Data Eng. 28(8), 2201–2215 (2015)CrossRefGoogle Scholar
  7. 7.
    Cho, E., Myers, S.A., Leskovec, J.: Friendship and mobility: user movement in location-based social networks. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Diego, Ca, USA, August, pp. 1082–1090 (2011)Google Scholar
  8. 8.
    Deng, D., Shahabi, C., Zhu, L.: Task matching and scheduling for multiple workers in spatial crowdsourcing. In: Proceedings of the 23rd SIGSPATIAL International Conference on Advances in Geographic Information Systems, Bellevue, WA, USA, November 3–6, 2015, pp. 21:1–21:10 (2015)Google Scholar
  9. 9.
    Deng, D., Shahabi, C., Demiryurek, U., Zhu, L.: Task selection in spatial crowdsourcing from worker’s perspective. Geoinformatica 20(3), 529–568 (2016)CrossRefGoogle Scholar
  10. 10.
    Elmehdwi, Y., Samanthula, B.K., Jiang, W.: Secure k-nearest neighbor query over encrypted data in outsourced environments. In: IEEE 30th International Conference on Data Engineering, Chicago, ICDE 2014, IL, USA, March 31–April 4, 2014, pp. 664–675 (2014)Google Scholar
  11. 11.
    Even, S., Goldreich, O., Lempel, A.: A Randomized Protocol for Signing Contracts. Springer US (1983)Google Scholar
  12. 12.
    Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.: Private queries in location based services: anonymizers are not necessary. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2008, Vancouver, BC, Canada, June 10–12, 2008, pp. 121–132 (2008)Google Scholar
  13. 13.
    Guo, B., Liu, Y., Wu, W., Yu, Z., Han, Q.: Activecrowd: a framework for optimized multitask allocation in mobile crowdsensing systems. IEEE Trans. Human-Mach. Syst. 47(3), 392–403 (2017)CrossRefGoogle Scholar
  14. 14.
    Hu, H., Zheng, Y., Bao, Z., Li, G., Feng, J., Cheng, R.: Crowdsourced poi labelling: location-aware result inference and task assignment. In: IEEE International Conference on Data Engineering, pp. 61–72 (2016)Google Scholar
  15. 15.
    Kazemi, L., Shahabi, C.: A privacy-aware framework for participatory sensing. SIGKDD Explor. 13(1), 43–51 (2011)CrossRefGoogle Scholar
  16. 16.
    Kazemi, L., Shahabi, C.: Geocrowd: enabling query answering with spatial crowdsourcing. In: International Conference on Advances in Geographic Information Systems, pp. 189–198 (2012)Google Scholar
  17. 17.
    Li, G., Wang, J., Zheng, Y., Franklin, M.J.: Crowdsourced data management: a survey. IEEE Trans. Knowl. Data Eng. 28(9), 2296–2319 (2016)CrossRefGoogle Scholar
  18. 18.
    Li, G., Chai, C., Fan, J., Weng, X., Li, J., Zheng, Y., Li, Y., Yu, X., Zhang, X., Yuan, H.: Cdb: optimizing queries with crowd-based selections and joins. In: ACM International Conference, pp. 1463–1478 (2017)Google Scholar
  19. 19.
    Li, G., Fan, J., Fan, J., Wang, J., Cheng, R.: Crowdsourced data management: overview and challenges. In: ACM International Conference on Management of Data, pp. 1711–1716 (2017)Google Scholar
  20. 20.
    Liu, A., Zheng, K., Li, L., Liu, G., Zhao, L., Zhou, X.: Efficient secure similarity computation on encrypted trajectory data. In: IEEE International Conference on Data Engineering, pp. 66–77 (2015)Google Scholar
  21. 21.
    Liu, S., Liu, A., Zhao, L., Liu, G., Li, Z., Zhao, P., Zheng, K., Qin, L.: Efficient query processing with mutual privacy protection for location-based services. In: Proceedings, Part II, of the 21st International Conference on Database Systems for Advanced Applications - Volume 9643, pp. 299–313 (2016)Google Scholar
  22. 22.
    Liu, A., Li, Z., Liu, G., Zheng, K., Zhang, M., Li, Q., Zhang, X.: Privacy-preserving task assignment in spatial crowdsourcing. J. Comput. Sci. Technol. 32(5), 905–918 (2017)MathSciNetCrossRefGoogle Scholar
  23. 23.
    Liu, B., Chen, L., Zhu, X., Zhang, Y., Zhang, C., Qiu, W.: Protecting location privacy in spatial crowdsourcing using encrypted data. In: Proceedings of the 20th International Conference on Extending Database Technology, EDBT 2017, Venice, Italy, March 21–24, 2017, pp. 478–481 (2017)Google Scholar
  24. 24.
    Liu, X., Liu, A., Zhang, X., Li, Z., Liu, G., Zhao, L., Zhou, X.: When differential privacy meets randomized perturbation: a hybrid approach for privacy-preserving recommender system. In: International Conference on Database Systems for Advanced Applications, pp. 576–591 (2017)Google Scholar
  25. 25.
    Liu, A., Wang, W., Shang, S., Li, Q., Zhang, X.: Efficient task assignment in spatial crowdsourcing with worker and task privacy protection. GeoInformatica 22 (2), 335–362 (2018)CrossRefGoogle Scholar
  26. 26.
    Myerson, R.B.: Optimal auction design. Math. Oper. Res. 6(1), 58–73 (1981)MathSciNetCrossRefzbMATHGoogle Scholar
  27. 27.
    Naor, M., Pinkas, B.: Computationally secure oblivious transfer. J. Cryptol. 18(1), 1–35 (2005)MathSciNetCrossRefzbMATHGoogle Scholar
  28. 28.
    Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Advances in Cryptology - EUROCRYPT ’99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2–6, 1999, Proceeding, pp. 223–238 (1999)Google Scholar
  29. 29.
    Paulet, R., Koasar, M.G., Yi, X., Bertino, E.: Privacy-preserving and content-protecting location based queries. In: 2012 IEEE 28th International Conference on Data Engineering (ICDE), p 1 (2014)Google Scholar
  30. 30.
    Pournajaf, L., Garcia-Ulloa, D.A., Li, X., Sunderam, V.: Participant privacy in mobile crowd sensing task management: a survey of methods and challenges. ACM Sigmod Record 44(4), 23–34 (2016)CrossRefGoogle Scholar
  31. 31.
    Sun, Y., Liu, A., Li, Z., Liu, G., Zhao, L., Zheng, K.: Anonymity-based privacy-preserving task assignment in spatial crowdsourcing. In: Web Information Systems Engineering - WISE 2017 - 18th International Conference, Puschino, Russia, October 7–11, 2017, Proceedings, Part II, pp. 263–277 (2017)Google Scholar
  32. 32.
    Tham, C.K., Luo, T.: Fairness and social welfare in service allocation schemes for participatory sensing. Comput. Netw. 73(C), 58–71 (2014)CrossRefGoogle Scholar
  33. 33.
    To, H., Ghinita, G., Shahabi, C.: Framework for protecting worker location privacy in spatial crowdsourcing. Proc. VLDB Endow. 7(10), 919–930 (2014)CrossRefGoogle Scholar
  34. 34.
    To, H., Shahabi, C., Li, X.: Privacy-preserving online task assignment in spatial crowdsourcing with untrusted server. In: The IEEE International Conference on Data Engineering (2018)Google Scholar
  35. 35.
    Tong, Y., She, J., Ding, B., Wang, L., Chen, L.: Online mobile micro-task allocation in spatial crowdsourcing. In: IEEE International Conference on Data Engineering, pp. 49–60 (2016)Google Scholar
  36. 36.
    Vu, K., Zheng, R., Gao, J.: Efficient algorithms for k-anonymous location privacy in participatory sensing. In: Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25–30, 2012, pp. 2399–2407 (2012)Google Scholar
  37. 37.
    Xiao, Y., Xiong, L.: Protecting locations with differential privacy under temporal correlations. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12–16, 2015, pp. 1298–1309 (2015)Google Scholar
  38. 38.
    Xiong, P., Zhang, L., Zhu, T.: Reward-based spatial crowdsourcing with differential privacy preservation. Enterp. Inf. Syst. 11(10), 1–18 (2017)CrossRefGoogle Scholar
  39. 39.
    Yang, D., Xue, G., Fang, X., Tang, J.: Crowdsourcing to smartphones: incentive mechanism design for mobile phone sensing. MobiCom 2012, 173–184 (2012)CrossRefGoogle Scholar
  40. 40.
    Yao, B., Li, F., Xiao, X.: Secure nearest neighbor revisited. In: 29th IEEE International Conference on Data Engineering, ICDE 2013, Brisbane, Australia, April 8–12, 2013, pp. 733–744 (2013)Google Scholar
  41. 41.
    Yi, X., Paulet, R., Bertino, E., Varadharajan, V.: Practical k nearest neighbor queries with location privacy. In: IEEE 30th International Conference on Data Engineering, Chicago, ICDE 2014, IL, USA, March 31–April 4, 2014, pp. 640–651 (2014)Google Scholar
  42. 42.
    Yi, X., Paulet, R., Bertino, E., Varadharajan, V.: Practical approximate k nearest neighbor queries with location and query privacy. IEEE Trans. Knowl. Data Eng. 28(6), 1546–1559 (2016)CrossRefGoogle Scholar
  43. 43.
    Yiu, M.L., Ghinita, G., Jensen, C.S., Kalnis, P.: Enabling search services on outsourced private spatial data. VLDB J. 19(3), 363–384 (2010)CrossRefGoogle Scholar
  44. 44.
    Zhang, Y., Chen, Q., Zhong, S.: Privacy-preserving data aggregation in mobile phone sensing. IEEE Trans. Inf. Forensics Secur. 11(5), 980–992 (2016)CrossRefGoogle Scholar
  45. 45.
    Zhao, D., Li, X.Y., Ma, H.: How to crowdsource tasks truthfully without sacrificing utility: online incentive mechanisms with budget constraint. In: INFOCOM, 2014 Proceedings IEEE, pp. 1213–1221 (2014)Google Scholar
  46. 46.
    Zheng, L., Chen, L.: Maximizing acceptance in rejection-aware spatial crowdsourcing. In: IEEE International Conference on Data Engineering, pp. 71–72 (2017)Google Scholar
  47. 47.
    Zheng, Y., Cheng, R., Maniu, S., Mo, L.: On optimality of jury selection in crowdsourcing. In: International Conference on Extending Database Technology. Brussels Belgium (2015)Google Scholar
  48. 48.
    Zheng, Y., Wang, J., Li, G., Cheng, R., Feng, J.: Qasca: a quality-aware task assignment system for crowdsourcing applications, pp. 1031–1046 (2015)Google Scholar
  49. 49.
    Zheng, Y., Li, G., Cheng, R.: Docs: a domain-aware crowdsourcing system using knowledge bases. Proc. VLDB Endow. 10(4), 361–372 (2016)CrossRefGoogle Scholar
  50. 50.
    Zheng, Y., Li, G., Li, Y., Shan, C., Cheng, R.: Truth inference in crowdsourcing: is the problem solved? Proc. VLDB Endow. 10(5), 541–552 (2017)CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  • Dongjun Zhai
    • 1
  • Yue Sun
    • 1
  • An Liu
    • 1
    Email author
  • Zhixu Li
    • 1
  • Guanfeng Liu
    • 2
  • Lei Zhao
    • 1
  • Kai Zheng
    • 3
  1. 1.School of Computer Science and Technology & Institute of Artificial IntelligenceSoochow UniversitySuzhouChina
  2. 2.Department of ComputingMacquarie UniversitySydneyAustralia
  3. 3.Big Data Research CenterUniversity of Electronic Science and Technology of ChinaChengduChina

Personalised recommendations