Privacy-friendly spatial crowdsourcing in vehicular networks

  • Cheng HuangEmail author
  • Rongxing Lu
  • Hui Zhu
Research Paper


With the evolution of conventional VANETs (Vehicle Ad-hoc Networks) into the IoV (Internet of Vehicles), vehicle-based spatial crowdsourcing has become a potential solution for crowdsourcing applications. In vehicular networks, a spatial-temporal task/question can be outsourced (i.e., task/question relating to a particular location and in a specific time period) to some suitable smart vehicles (also known as workers) and then these workers can help solve the task/question. However, an inevitable barrier to the widespread deployment of spatial crowdsourcing applications in vehicular networks is the concern of privacy. Hence, We propose a novel privacy-friendly spatial crowdsourcing scheme. Unlike the existing schemes, the proposed scheme considers the privacy issue from a new perspective according that the spatial-temporal tasks can be linked and analyzed to break the location privacy of workers. Specifically, to address the challenge, three privacy requirements (i.e. anonymity, untraceability, and unlinkability) are defined and the proposed scheme combines an efficient anonymous technique with a new composite privacy metric to protect against attackers. Detailed privacy analyses show that the proposed scheme is privacy-friendly. In addition, performance evaluations via extensive simulations are also conducted, and the results demonstrate the efficiency and effectiveness of the proposed scheme.


spatial crowdsourcing vehicular networks location privacy IoV (Internet of Vehicles) privacy metric 


  1. [1]
    S. H. Kim, Y. Lu, G. Constantinou, et al. Mediaq: mobile multimedia management system [C]//Proceedings of the 5th ACM Multimedia Systems Conference, 2014: 224–235.Google Scholar
  2. [2]
    X. Wang, X. Zheng, Q. Zhang, et al. Crowdsourcing in ITS: the state of the work and the networking [J]. IEEE transactions on intelligent transportation systems, 2016, 17(6): 1596–1605.CrossRefGoogle Scholar
  3. [3]
    J. Hu, L. Huang, L. Li, et al. Protecting location privacy in spatial crowdsourcing [C]//Asia-Pacific Web ConferenceWeb Technologies and Applications, 2015: 113–124.Google Scholar
  4. [4]
    H. To, G. Ghinita, C. Shahabi. A framework for protecting worker location privacy in spatial crowdsourcing [J]. Proceedings of the VLDB endowment, 2014, 7(10): 919–930.CrossRefGoogle Scholar
  5. [5]
    Y. Gong, Y. Guo, Y. Fang. A privacy-preserving task recommendation framework for mobile crowdsourcing [C]//IEEE Global Communications Conference (GLOBECOM), 2014: 588–593.Google Scholar
  6. [6]
    H. To, G. Ghinita, C. Shahabi. PrivGeoCrowd: a toolbox for studying private spatial crowdsourcing [C]//IEEE 31st International Conference on Data Engineering (ICDE), 2015: 1404–1407.Google Scholar
  7. [7]
    Y. Shen, L. Huang, L. Li, et al. Towards preserving worker location privacy in spatial crowdsourcing [C]//IEEE Global Communications Conference (GLOBECOM), 2015: 1–6.Google Scholar
  8. [8]
    N. Yang, P. Yu. Efficient Hidden trajectory reconstruction from sparse data [C]//Proceedings of the 25th ACM International on Conference on Information and Knowledge Management, 2016: 821–830.Google Scholar
  9. [9]
    M. Piorkowski, N. Sarafijanovic-Djukic, M. Grossglauser. A parsimonious model of mobile partitioned networks with clustering [C]//IEEE Communication Systems and Networks and Workshops, 2009: 1–10.Google Scholar
  10. [10]
    Y. Zhao, Q. Han. Spatial crowdsourcing: current state and future directions [J]. IEEE communications magazine, 2016, 54(7): 102–107.CrossRefGoogle Scholar
  11. [11]
    C. Xu, R. Lu, H. Wang, et al. PAVS: a new privacypreserving data aggregation scheme for vehicle sensing systems [J]. Sensors, 2017, 17(3): 500.CrossRefGoogle Scholar
  12. [12]
    H. Hu, R. Lu, C. Huang, et al. TripSense: a trust-based vehicular platoon crowdsensing scheme with privacy preservation in VANETs [J]. Sensors, 2016, 16(6): 803.CrossRefGoogle Scholar
  13. [13]
    C. Y. T. Ma, D. K. Y. Yau, N. K. Yip, et al. Privacy vulnerability of published anonymous mobility traces [J]. IEEE/ACM transactions on networking (TON), 2013, 21(3): 720–733.CrossRefGoogle Scholar
  14. [14]
    Y. A. De Montjoye, C. A. Hidalgo, M. Verleysen, et al. Unique in the crowd: the privacy bounds of human mobility [J]. Scientific reports, 2013, 3: 1376.CrossRefGoogle Scholar
  15. [15]
    G. P. Corser, H. Fu, A. Banihani. Evaluating location privacy in vehicular communications and applications [J]. IEEE transactions on intelligent transportation systems, 2016, 17(9): 2658–2667.CrossRefGoogle Scholar
  16. [16]
    M. J. Fortin, M. R. Dale. Spatial analysis: a guide for ecologists [M]. Cambridge: Cambridge University Press, 2005.Google Scholar
  17. [17]
    F. Zhang, R. Safavi-Naini, W. Susilo. Efficient verifi-ably encrypted signature and partially blind signature from bilinear pairings [C]//International Conference on Cryptology, 2003: 191–204.zbMATHGoogle Scholar
  18. [18]
    R. Dahlberg, T. Pulls, R. Peeters. Efficient sparse Merkle trees: caching strategies and secure (non-) membership proofs [C]//Proceedings of the 21st Nordic Workshop on Secure Computer Systems (NORDSEC 2016). 2016.CrossRefGoogle Scholar
  19. [19]
    L. Kazemi, C. Shahabi, L. Chen. Geotrucrowd: trustworthy query answering with spatial crowdsourcing [C]//Proceedings of the 21st ACM sigspatial international conference on advances in geographic information systems, 2013: 314–323.Google Scholar
  20. [20]
    Y. Tong, J. She, B. Ding, et al. Online mobile micro-task allocation in spatial crowdsourcing [C]// IEEE 32nd International Conference on Data Engineering (ICDE), 2016: 49–60.Google Scholar
  21. [21]
    R. W. Ouyang, M. Srivastava, A. Toniolo, et al. Truth discovery in crowdsourced detection of spatial events [J]. IEEE transactions on knowledge and data engineering, 2016, 28(4): 1047–1060.CrossRefGoogle Scholar
  22. [22]
    X. Zhang, G. Xue, R. Yu, et al. Truthful incentive mechanisms for crowdsourcing [C]//IEEE Conference on Computer Communications (INFOCOM), 2015: 2830–2838.Google Scholar
  23. [23]
    J. Ren, Y. Zhang, K. Zhang, et al. Exploiting mobile crowdsourcing for pervasive cloud services: challenges and solutions [J]. IEEE communications magazine, 2015, 53(3): 98–105.CrossRefGoogle Scholar
  24. [24]
    D. Wu, Y. Zhang, L. Bao, et al. Location-based crowdsourcing for vehicular communication in hybrid networks [J]. IEEE transactions on intelligent transportation systems, 2013, 14(2): 837–846.CrossRefGoogle Scholar
  25. [25]
    J. Ni, X. Lin, K. Zhang, et al. Privacy-preserving real-time navigation system using vehicular crowdsourcing [C]//IEEE 84th Vehicular Technology Conference (VTC-Fall), 2016: 1–5.Google Scholar
  26. [26]
    R. Lu, X. Lin, Z. Shi, et al. A lightweight conditional privacy-preservation protocol for vehicular trafficmonitoring systems [J]. IEEE intelligent systems, 2013, 28(3): 62–65.CrossRefGoogle Scholar
  27. [27]
    K. Yang, K. Zhang, J. Ren, et al. Security and privacy in mobile crowdsourcing networks: challenges and opportunities [J]. IEEE communications magazine, 2015, 53(8): 75–81.CrossRefGoogle Scholar

Copyright information

© Posts & Telecom Press and Springer Nature Singapore Pte Ltd. 2017

Authors and Affiliations

  1. 1.Department of Electrical and Computer EngineeringUniversity of WaterlooWaterlooCanada
  2. 2.Faculty of Computer ScienceUniversity of New BrunswickFrederictonCanada
  3. 3.School of Cyber EngineeringXidian UniversityXi’anChina

Personalised recommendations