Advertisement

Journal of Computer Science and Technology

, Volume 32, Issue 5, pp 905–918 | Cite as

Privacy-Preserving Task Assignment in Spatial Crowdsourcing

  • An Liu
  • Zhi-Xu Li
  • Guan-Feng Liu
  • Kai Zheng
  • Min Zhang
  • Qing Li
  • Xiangliang Zhang
Regular Paper

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Supplementary material

References

  1. [1]
    Kazemi L, Shahabi C. GeoCrowd: Enabling query answering with spatial crowdsourcing. In Proc. the 20th Int. Conf. Advances in Geographic Information Systems, November 2012, pp.189-198.Google Scholar
  2. [2]
    Deng D X, Shahabi C, Demiryurek U, Zhu L H. Task selection in spatial crowdsourcing from worker’s perspective. GeoInformatica, 2016, 20(3): 529–568.CrossRefGoogle Scholar
  3. [3]
    Cheng P, Lian X, Chen Z, Fu R, Chen L, Han J S, Zhao J Z. Reliable diversity-based spatial crowdsourcing by moving workers. Proceedings of the VLDB Endowment, 2015, 8(10): 1022–1033.CrossRefGoogle Scholar
  4. [4]
    Cheng P, Lian X, Chen L, Han J S, Zhao J Z. Task assignment on multi-skill oriented spatial crowdsourcing. IEEE Trans. Knowledge and Data Engineering, 2016, 28(8): 2201–2215.CrossRefGoogle Scholar
  5. [5]
    Ghinita G, Kalnis P, Khoshgozaran A, Shahabi C, Tan K L. Private queries in location based services: Anonymizers are not necessary. In Proc. the ACM SIGMOD Int. Conf. Management of Data, June 2008, pp.121-132.Google Scholar
  6. [6]
    Paulet R, Kaosar M G, Yi X, Bertino E. Privacy-preserving and content-protecting location based queries. In Proc. the 28th IEEE Int. Conf. Data Engineering, April 2012, pp.44-53.Google Scholar
  7. [7]
    Paulet R, Kaosar M G, Yi X, Bertino E. Privacy-preserving and content-protecting location based queries. IEEE Trans. Knowledge and Data Engineering, 2014, 26(5): 1200–1210.CrossRefGoogle Scholar
  8. [8]
    Yi X, Paulet R, Bertino E, Varadharajan V. Practical k nearest neighbor queries with location privacy. In Proc. the 30th IEEE Int. Conf. Data Engineering, March 31-April 4, 2014, pp.640-651.Google Scholar
  9. [9]
    Yi X, Paulet R, Bertino E, Varadharajan V. Practical approximate k nearest neighbor queries with location and query privacy. IEEE Trans. Knowledge and Data Engineering, 2016, 28(6): 1546–1559.CrossRefGoogle Scholar
  10. [10]
    Liu S S, Liu A, Zhao L, Liu G F, Li Z X, Zhao P P, Zheng K, Qin L. Efficient query processing with mutual privacy protection for location-based services. In Proc. the 21st Int. Conf. Database Systems for Advanced Applications, April 2016, pp.299-313.Google Scholar
  11. [11]
    To H, Ghinita G, Shahabi C. A framework for protecting worker location privacy in spatial crowdsourcing. Proceedings of the VLDB Endowment, 2014, 7(10): 919–930.CrossRefGoogle Scholar
  12. [12]
    To H, Ghinita G, Shahabi C. PrivGeoCrowd: A toolbox for studying private spatial crowdsourcing. In Proc. the 31st IEEE Int. Conf. Data Engineering, April 2015, pp.1404-1407.Google Scholar
  13. [13]
    Liu B Z, Chen L, Zhu X Q, Zhang Y, Zhang C Q, Qiu W D. Protecting location privacy in spatial crowdsourcing using encrypted data. In Proc. the 20th Int. Conf. Extending Database Technology, March 2017, pp.478-481.Google Scholar
  14. [14]
    Liu A, Wang W Q, Shang S, Li Q, Zhang X L. Efficient task assignment in spatial crowdsourcing with worker and task privacy protection. Geoinformatica, 2017. DOI: 101007/s10707-017-0305-2.Google Scholar
  15. [15]
    Dwork C. Differential privacy: A survey of results. In Proc. the 5th Int. Conf. Theory and Applications of Models of Computation, April 2008.Google Scholar
  16. [16]
    Hightower J, Borriello G. Location systems for ubiquitous computing. Computer, 2001, 34(8): 57–66.CrossRefGoogle Scholar
  17. [17]
    Paillier P. Public-key cryptosystems based on composite degree residuosity classes. In Proc. the 17th Int. Conf. Theory and Application of Cryptographic Techniques, May 1999, pp.223-238.Google Scholar
  18. [18]
    Yao A C C. How to generate and exchange secrets. In Proc. the 27th Annual Symp. Foundations of Computer Science, October 1986, pp.162-167.Google Scholar
  19. [19]
    Lindell Y, Pinkas B. A proof of security of Yao’s protocol for two-party computation. Journal of Cryptology, 2009, 22(2): 161–188.MathSciNetCrossRefzbMATHGoogle Scholar
  20. [20]
    Gentry C. Fully homomorphic encryption using ideal lattices. In Proc. the 41st Annual ACM Symp. Theory of Computing, May 31-June 2, 2009, pp.169-178.Google Scholar
  21. [21]
    Gentry C, Halevi S. Implementing Gentry’s fullyhomomorphic encryption scheme. In Proc. the 30th Annual Int. Conf. Theory and Applications of Cryptographic Techniques: Advances in Cryptology, May 2011, pp.129-148.Google Scholar
  22. [22]
    Elmehdwi Y, Samanthula B K, Jiang W. Secure k-nearest neighbor query over encrypted data in outsourced environments. In Proc. the 30th IEEE Int. Conf. Data Engineering, March 31-April 4, 2014, pp.664-675.Google Scholar
  23. [23]
    Liu A, Zheng K, Li L, Liu G F, Zhao L, Zhou X F. Efficient secure similarity computation on encrypted trajectory data. In Proc. the 31st IEEE Int. Conf. Data Engineering, April 2015, pp.66-77.Google Scholar
  24. [24]
    Liu J F, Yang J C, Xiong L, Pei J. Secure skyline queries on cloud platform. In Proc. the 33rd IEEE Int. Conf. Data Engineering, April 2017, pp.633-644.Google Scholar
  25. [25]
    Goldreich O. Foundations of Cryptography: Volume 2, Basic Applications. Cambridge University Press, 2004.Google Scholar
  26. [26]
    Samanthula B K, Rao F Y, Bertino E, Yi X. Privacypreserving protocols for shortest path discovery over outsourced encrypted graph data. In Proc. Int. Conf. Information Reuse and Integration, August 2015, pp.427-434.Google Scholar
  27. [27]
    Nikolaenko V, Ioannidis S, Weinsberg U, Joye M, Taft N, Boneh D. Privacy-preserving matrix factorization. In Proc. the ACM SIGSAC Conf. Computer & Communications Security, November 2013, pp.801-812.Google Scholar
  28. [28]
    Zhu H H, Meng X R, Kollios G. Privacy preserving similarity evaluation of time series data. In Proc. the 17th Int. Conf. Extending Database Technology, March 2014, pp.499-510.Google Scholar
  29. [29]
    Kolesnikov V, Sadeghi A R, Schneider T. Improved garbled circuit building blocks and applications to auctions and computing minima. In Proc. the 8th Int. Conf. Cryptology and Network Security, December 2009, pp.1-20.Google Scholar
  30. [30]
    Mokbel M F, Chow C Y, ArefWG. The new Casper: Query processing for location services without compromising privacy. In Proc. the 32nd Int. Conf. Very Large Data Bases, September 2006, pp.763-774.Google Scholar
  31. [31]
    Huang Y, Evans D, Katz J, Malka L. Faster secure twoparty computation using garbled circuits. In Proc. the 20th USENIX Conf. Security, August 2011.Google Scholar
  32. [32]
    Li G L, Wang J N, Zheng Y D, Franklin M J. Crowdsourced data management: A survey. IEEE Trans. Knowledge and Data Engineering, 2016, 28(9): 2296–2319.CrossRefGoogle Scholar
  33. [33]
    Chen L, Shahabi C. Spatial crowdsourcing: Challenges and opportunities. Bulletin of the Technical Committee on Data Engineering, 2016, 39(4): 14–25.Google Scholar
  34. [34]
    Tong Y X, She J Y, Ding B L, Wang L B, Chen L. Online mobile micro-task allocation in spatial crowdsourcing. In Proc. the 32nd IEEE Int. Conf. Data Engineering, May 2016, pp.49-60.Google Scholar
  35. [35]
    Zheng L, Chen L. Mutual benefit aware task assignment in a bipartite labor market. In Proc. the 32nd IEEE Int. Conf. Data Engineering, May 2016, pp.73-84.Google Scholar
  36. [36]
    Yiu M L, Ghinita G, Jensen C S, Kalnis P. Enabling search services on outsourced private spatial data. The VLDB Journal, 2010, 19(3): 363–384.CrossRefGoogle Scholar
  37. [37]
    Yao B, Li F F, Xiao X K. Secure nearest neighbor revisited. In Proc. the 29th IEEE Int. Conf. Data Engineering, April 2013, pp.733-744.Google Scholar
  38. [38]
    Shin M, Cornelius C, Peebles D, Kapadia A, Kotz D, Triandopoulos N. AnonySense: A system for anonymous opportunistic sensing. Pervasive and Mobile Computing, 2011, 7(1): 16–30.CrossRefGoogle Scholar
  39. [39]
    Boutsis I, Kalogeraki V. Privacy preservation for participatory sensing data. In Proc. IEEE Int. Conf. Pervasive Computing and Communications, March 2013, pp.103-113.Google Scholar
  40. [40]
    Agir B, Papaioannou T G, Narendula R, Aberer K, Hubaux J P. User-side adaptive protection of location privacy in participatory sensing. GeoInformatica, 2014, 18(1): 165–191.CrossRefGoogle Scholar
  41. [41]
    Vergara-Laurens I J, Mendez D, Labrador M A. Privacy, quality of information, and energy consumption in participatory sensing systems. In Proc. IEEE Int. Conf. Pervasive Computing and Communications, March 2014, pp.199-207.Google Scholar
  42. [42]
    Zhang F, He L, He W B, Liu X. Data perturbation with state-dependent noise for participatory sensing. In Proc. IEEE INFOCOM, March 2012, pp.2246-2254.Google Scholar
  43. [43]
    Li Q H, Cao G H. Efficient and privacy-preserving data aggregation in mobile sensing. In Proc. the 20th IEEE Int. Conf. Network Protocols, October 30-November 2, 2012.Google Scholar
  44. [44]
    Kazemi L, Shahabi C. A privacy-aware framework for participatory sensing. ACM SIGKDD Explorations Newsletter, 2011, 13(1): 43–51.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2017

Authors and Affiliations

  • An Liu
    • 1
    • 2
  • Zhi-Xu Li
    • 1
  • Guan-Feng Liu
    • 1
  • Kai Zheng
    • 1
    • 3
  • Min Zhang
    • 1
  • Qing Li
    • 4
  • Xiangliang Zhang
    • 2
  1. 1.School of Computer Science and TechnologySoochow UniversitySuzhouChina
  2. 2.King Abdullah University of Science and TechnologyThuwalSaudi Arabia
  3. 3.Beijing Key Laboratory of Big Data Management and Analysis MethodsBeijingChina
  4. 4.Department of Computer ScienceCity University of Hong KongHong KongChina

Personalised recommendations