Skip to main content
Log in

A budget feasible peer graded mechanism for iot-based crowdsourcing

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

We develop and extend a line of recent works on the design of mechanisms for heterogeneous tasks assignment problem in ’crowdsourcing’. The budgeted market we consider consists of multiple task requesters and multiple IoT devices as task executers. In this, each task requester is endowed with a single distinct task along with the publicly known budget. Also, each IoT device has valuations as the cost for executing the tasks and quality, which are private. Given such scenario, the objective is to select a subset of IoT devices for each task, such that the total payment made is within the allotted quota of the budget while attaining a threshold quality. For the purpose of determining the unknown quality of the IoT devices we have utilized the concept of peer grading. In this paper, we have carefully crafted a truthful budget feasible mechanism for the problem under investigation that also allows us to have the true information about the quality of the IoT devices. Further, we have extended the set-up considering the case where the tasks are divisible in nature and the IoT devices are working collaboratively, instead of, a single entity for executing each task. We have designed the budget feasible mechanisms for the extended versions. The simulations are performed in order to measure the efficacy of our proposed mechanism.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Notes

  1. It is to be noted, our proposed system is applicable equally to the system where there are human agents instead of IoT devices in the role of task executers.

  2. https://www.youtube.com/watch?v=dJfQQNY7NdU.

  3. It could be tackled by utilizing the concept of Approximate Shapley value Fatima et al. (2008) that is reserved for our future work.

  4. Similarly, the other two mechanisms; NoTUBE and TUBE-ETAP could be simulated and analyzed.

References

  • Alfaro LD, Shavlovsky M, Polychronopoulos V (2016) Incentives for truthful peer grading. CoRR arxiv:1604.03178

  • Assadi S, Hsu J, Jabbari S (2015) Online assignment of heterogeneous tasks in crowdsourcing markets. CoRR arxiv:1508.03593

  • Bhat S, Padmanabhan D, Jain S, Narahari Y (2016) A truthful mechanism with biparameter learning for online crowdsourcing: (extended abstract). In: Proceedings of the 2016 international conference on autonomous agents and multiagent systems. International Foundation for Autonomous Agents and Multiagent Systems, Richland, AAMAS ’16, pp 1385–1386. http://dl.acm.org/citation.cfm?id=2937029.2937172. Accessed Jan 2019

  • Chatzimilioudis G, Konstantinidis A, Laoudias C, Zeinalipour-Yazti D (2012) Crowdsourcing with smartphones. IEEE Internet Comput 16(5):36–44. https://doi.org/10.1109/MIC.2012.70

    Article  Google Scholar 

  • Cormen TH, Leiserson CE, Rivest RL, Stein C (2009) Introduction to algorithms. MIT press, Cambridge

    MATH  Google Scholar 

  • Daniel F, Kucherbaev P, Cappiello C, Benatallah B, Allahbakhsh M (2018) Quality control in crowdsourcing: a survey of quality attributes, assessment techniques, and assurance actions. ACM Comput Surv 51(1):7:1–7:40. https://doi.org/10.1145/3148148

    Article  Google Scholar 

  • Duan Z, Tian L, Yan M, Cai Z, Han Q, Yin G (2017) Practical incentive mechanisms for iot-based mobile crowdsensing systems. IEEE Access 5:20383–20392. https://doi.org/10.1109/ACCESS.2017.2751304

    Article  Google Scholar 

  • Fatima SS, Wooldridge M, Jennings NR (2008) A linear approximation method for the Shapley value. Artif Intell 172(14):1673–1699. https://doi.org/10.1016/j.artint.2008.05.003

    Article  MathSciNet  MATH  Google Scholar 

  • Feng Z, Zhu Y, Zhang Q, Ni LM, Vasilakos AV (2014) TRAC: truthful auction for location-aware collaborative sensing in mobile crowdsourcing. In: IEEE INFOCOM 2014—IEEE conference on computer communications, Toronto, pp 1231–1239. https://doi.org/10.1109/INFOCOM.2014.6848055

  • Gao L, Hou F, Huang J (2015a) Providing long-term participation incentive in participatory sensing. In: 2015 IEEE conference on computer communications (INFOCOM), Kowloon, pp 2803–2811. https://doi.org/10.1109/INFOCOM.2015.7218673

  • Gao Y, Chen Y, Liu KJR (2015b) On cost-effective incentive mechanisms in microtask crowdsourcing. IEEE Trans Comput Intell AI Games 7(1):3–15. https://doi.org/10.1109/TCIAIG.2014.2298361

    Article  Google Scholar 

  • Goel G, Nikzad A, Singla A (2014) Mechanism design for crowdsourcing markets with heterogeneous tasks. In: Proceedings of the second AAAI conference on human computation and crowdsourcing, HCOMP 2014, Pittsburgh, 2–4 Nov 2014

  • Gong X, Shroff N (2018) Incentivizing truthful data quality for quality-aware mobile data crowdsourcing. In: Proceedings of the eighteenth ACM international symposium on mobile ad hoc networking and computing, ACM, New York, Mobihoc ’18, pp 161–170. https://doi.org/10.1145/3209582.3209599

  • Howe J (2006) The rise of crowdsourcing. Wired Mag 14(6):1–4. http://www.wired.com/wired/archive/14.06/crowds.html. Accessed Jan 2019

  • Jain S, Ghalme G, Bhat S, Gujar S, Narahari Y (2016) A deterministic mab mechanism for crowdsourcing with logarithmic regret and immediate payments. In: Proceedings of the 2016 international conference on autonomous agents and multiagent systems. International Foundation for Autonomous Agents and Multiagent Systems, Richland, AAMAS ’16, pp 86–94. http://dl.acm.org/citation.cfm?id=2936924.2936941

  • Jain S, Gujar S, Bhat Zoeter O, Narahari Y (2018) A quality assuring, cost optimal multi-armed bandit mechanism for expertsourcing. Artif Intell 254:44–63. https://doi.org/10.1016/j.artint.2017.10.001

    Article  MathSciNet  MATH  Google Scholar 

  • Kobayashi M, Morita H, Matsubara M, Shimizu N, Morishima A (2018) An empirical study on short- and long-term effects of self-correction in crowdsourced microtasks. HCOMP. The Association for the Advancement of Artificial Intelligence (AAAI) Press, California, USA, pp 79–87

    Google Scholar 

  • Lee JS, Hoh B (2010a) Dynamic pricing incentive for participatory sensing. Elsevier J Pervasive Mob Comput 6(6):693–708. https://doi.org/10.1016/j.pmcj.2010.08.006

    Article  Google Scholar 

  • Lee JS, Hoh B (2010b) Sell your experiences: a market mechanism based incentive for participatory sensing. In: 2010 IEEE international conference on pervasive computing and communications (PerCom), Mannheim, Germany, pp 60–68. https://doi.org/10.1109/PERCOM.2010.5466993

  • Li Y, Zhao Y, Ishak S, Song H, Wang N, Yao N (2018) An anonymous data reporting strategy with ensuring incentives for mobile crowd-sensing. J Ambient Intell Humaniz Comput 9(6):2093–2107. https://doi.org/10.1007/s12652-017-0529-x

    Article  Google Scholar 

  • Luo T, Das SK, Tan HP, Xia L (2016) Incentive mechanism design for crowdsourcing: an all-pay auction approach. ACM Trans Intell Syst Technol 7(3):35:1–35:26. https://doi.org/10.1145/2837029

    Article  Google Scholar 

  • Maschler M, Solan E, Zamir S (2013) The Shapley value. In: Game theory, Cambridge University Press, Cambridge, pp 748–781. https://doi.org/10.1017/CBO9780511794216.019

  • Mazlan N, Syed Ahmad SS, Kamalrudin M (2018) Volunteer selection based on crowdsourcing approach. J Ambient Intell Humaniz Comput 9(3):743–753. https://doi.org/10.1007/s12652-017-0490-8

    Article  Google Scholar 

  • Nisan N, Roughgarden T, Tardos E, Vazirani VV (2007) Algorithmic game theory. Cambridge University Press, New York

    Book  Google Scholar 

  • Reddy S, Estrin D, Hansen M, Srivastava M (2010) Examining micro-payments for participatory sensing data collections. In: 12th international conference on ubiquitous computing (UbiComp), ACM, Copenhagen, pp 33–36. https://doi.org/10.1145/1864349.1864355

  • Roughgarden T (2016) CS269I: incentives in computer science (Stanford University course). Lecture #17: scoring rules and peer prediction (incentivizing honest forecasts and feedback)

  • Shapley LS (1953) A value for n-person games. In: Kuhn HW, Tucker AW (eds) Contributions to the theory of games II. Princeton University Press, Princeton, pp 307–317

    Google Scholar 

  • Singer Y (2010) Budget feasible mechanisms. In: Proceedings of the 2010 IEEE 51st annual symposium on foundations of computer science, IEEE Computer Society, Washington, DC, FOCS ’10, pp 765–774. https://doi.org/10.1109/FOCS.2010.78

  • Singh VK, Mukhopadhyay S, Xhafa F (2018a) A budget feasible peer graded mechanism for IoT-based crowdsourcing. CoRR. arxiv:1809.09315

  • Singh VK, Mukhopadhyay S, Xhafa F, Sharma A (2018b) A budget feasible mechanism for hiring doctors in e-healthcare. In: 2018 IEEE 32nd international conference on advanced information networking and applications (AINA), Krakow, pp 785–792. https://doi.org/10.1109/AINA.2018.00117

  • Slivkins A, Vaughan JW (2014) Online decision making in crowdsourcing markets: theoretical challenges. SIGecom Exchanges 12(2):4–23. https://doi.org/10.1145/2692359.2692364

    Article  Google Scholar 

  • Tinati R, Madaan A, Hall W (2017) The role of crowdsourcing in the emerging internet-of-things. In: Proceedings of the 26th international conference on world wide web companion. International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, Geneva, WWW ’17 Companion, pp 1669–1672. https://doi.org/10.1145/3041021.3051693

  • Xu P, Srinivasan A, Sarpatwar KK, Wu K (2017) Budgeted online assignment in crowdsourcing markets: theory and practice. In: Proceedings of the 16th conference on autonomous agents and multiagent systems. International foundation for autonomous agents and multiagent systems, Richland, AAMAS’17, pp 1763–1765. http://dl.acm.org/citation.cfm?id=3091125.3091431

  • Yuen M, King I, Leung K (2011) A survey of crowdsourcing systems. In: 3rd IEEE international conference on privacy, security, risk and trust and 3rd IEEE international conference on social computing, Boston, pp 766–773. https://doi.org/10.1109/PASSAT/SocialCom.2011.203

  • Zhao D, Li X, Huadong M (2014) How to crowdsource tasks truthfully without sacrificing utility: Online incentive mechanisms with budget constraint. In: Proceeding of annual IEEE international conference on computer communications, ACM, Toronto, pp 173–184. https://doi.org/10.1109/INFOCOM.2014.6848053

Download references

Acknowledgements

We would like to thanks the research students and faculty members of the Department of CSE, NIT Durgapur for their valuable suggestions during the course of this work. Further, we would like to thank Prof. Y. Narahari and members of the Game Theory Lab. at IISc Bangalore for their suggestions and directions. Finally, we thank the Government of India Ministry of Human Resource Development for their Institute scholarship fund given to the Ph.D. scholars.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fatos Xhafa.

Additional information

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendices

Appendix

A omitted proofs from Sect. 5

1.1 A1. Proof of Lemma 2

Fix a task requester \(\mathbb {R}_j\) and a task \(\mathbb {T}_j\). From the construction of TUBE-TAP, it is clear that, the maximum payment that any winning IoT device will be paid is \(\frac{\mathbb {B}_j}{k}\); where k is the largest index obtained in the ordering of IoT devices that satisfies \(b_{k}^{j} \le \frac{\mathbb {B}_j}{k}\). Now, the total payment \(\mathbb {\varvec{P}}_j\) is given as:

$$\begin{aligned} \mathbb {\varvec{P}}_j = \sum \limits _{\mathbb {E}_i \in \mathbb {A}_j} \mathbb {\varvec{P}}_i^j \le \sum _{\mathbb {E}_i \in \mathbb {A}_j} \frac{\mathbb {B}_j}{k} = \frac{\mathbb {B}_j}{k} \times k = \mathbb {B}_j \end{aligned}$$

From here we can say that, \(\mathbb {\varvec{P}}_j \le \mathbb {B}_j\). As this is true for any task \(\mathbb {T}_j\), so the budget feasibility will hold for all the available tasks i.e. \(\sum \limits _{\mathbb {A}_j \in \mathbb {A}} \sum \limits _{\mathbb {E}_i \in \mathbb {A}_j} \mathbb {\varvec{P}}_i^j \le \sum \limits _{\mathbb {T}_j \in \mathbb {T}}\mathbb {B}_j\). This completes the proof.

1.2 A2. Proof of Lemma 4

By the definition of indicator random variable, we can write \(X_j^i\) is 1 when \(\mathbb {U}\) occurs and 0 when \(\mathbb {U}\) does not occurs. So, as \(X_j^i\) = I{\(\mathbb {U}\)}. Taking expectation both side, we get from definition of expectation

$$\begin{aligned} E[X_j^i] = E[I\{\mathbb {U}\}] = Pr\{\mathbb {U}\} \end{aligned}$$

The detailing of this lemma is provided in draft version Singh et al. (2018a).

1.3 A3. Proof of Lemma 6

Fix an IoT device \(\mathbb {E}_i\). In similar line the proof is illustrated in Cormen et al. (2009). Our proof is divided into two cases. From Lemma 5 it can be seen that the probability that \(\mathbb {E}_i\) will be considered for any task \(\mathbb {T}_j\) is p. Let \(X^{i}_{kl} = I\{A_{kl}^{i}\}\) be the indicator random variable associated with an event that the IoT device \(\mathbb {E}_i\) is rejected for at least l tasks starting form \(k^{th}\) task. It is to be noted that, the participation in one time slot by the IoT device is independent of the participation in other time slots. So, for any given event \(X^{i}_{kl}\), the probability that for all l tasks the IoT device is rejected is given as

$$\begin{aligned} Pr\{A_{kl}^{i}\} = p\cdot p~\cdot \cdot \cdot l~times = p^l \end{aligned}$$
(9)

As in our case, k varies from 1 to \(k_i - l +1\) (i.e. \(1 \le k \le k_i - l +1\)), so the total number of such rejections could be formulated as:

$$\begin{aligned} Y = \sum \limits _{k=1}^{k_i-l+1} X^{i}_{kl} \end{aligned}$$

Taking expectation both side, we get

$$\begin{aligned} E[Y] = E\bigg [\sum \limits _{k=1}^{k_i-l+1} X^{i}_{kl}\bigg ] \end{aligned}$$

By linearity of expectation, we get

$$\begin{aligned} = \sum \limits _{k=1}^{k_i-l+1} E[X^{i}_{kl}] \end{aligned}$$

From the definition of expectation in Lemma 4, we have

$$\begin{aligned} E[Y]= \sum \limits _{k=1}^{k_i-l+1} Pr\{A_{kl}^{i}\} \end{aligned}$$

Using equation 9, we get

$$\begin{aligned} = \sum \limits _{k=1}^{k_i-l+1} p^l \end{aligned}$$
$$\begin{aligned} E[Y] = (k_i-l+1) \cdot p^l \end{aligned}$$

Now, for \(l = c \log _p k_i\) and for some positive constant c, we obtain

$$\begin{aligned} E[Y] & = (k_i-c \log _p k_i+1)\cdot p^{c \log _p k_i} \\ & = (k_i-c \log _p k_i+1) \cdot k_i^c\\ & = k_i^{c+1} - ck_i^c \log _p k_i + k_i^c\\ & = \Theta (k_i^c) \end{aligned}$$

From here we can conclude that, for some constant \(c \ge 1\) the longest continuous rejection boils down to \(\Theta (\log _p k_i)\). Hence, the claim survived.

1.4 A4. Proof of Lemma 7

Fix an IoT device \(\mathbb {E}_i\). As \(\mathbb {E}_i\) has shown interest on \(k_i\) tasks that are present in different time slots. The probability that \(\mathbb {E}_i\) will be considered for task \(\mathbb {T}_j\) is p (Pr{\(\mathbb {E}_i\) is not considered for task \(\mathbb {T}_j\)} = \(1-p\)). Also, it can be seen that, the consideration of \(\mathbb {E}_i\) in any time slot is independent of other time slots. So, the probability that \(\mathbb {E}_i\) will not be considered at all for any of the \(k_i\) tasks is given as:

$$\begin{aligned} Pr[X^i < 1] & = (1-p) \cdot (1-p) \ldots k_i~times \\ & = (1-p)^{k_i} \end{aligned}$$

Following the inequality \(1+x \le e^x\), we get

$$\begin{aligned} Pr[X^i < 1] \le e^{-p\cdot k_i} = \frac{1}{e^{p\cdot k_i}} \end{aligned}$$

Now, the probability that any \(\mathbb {E}_i\) will be considered at least once is given as

$$\begin{aligned} Pr[X^i \ge 1] \ge \bigg (1-\frac{1}{e^{p\cdot k_i}}\bigg ) \end{aligned}$$

Hence, the claim survives. Also, for \(p=\ln 2\), we can see that

$$\begin{aligned}&Pr[X^i \ge 1] \ge \bigg (1-\frac{1}{e^{\ln 2\cdot k_i}}\bigg ) \\&\quad = \bigg (1-\frac{1}{2k_i}\bigg ) \end{aligned}$$

It can be concluded that, the term \(\frac{1}{2k_i}\) represents that any arbitrary \(\mathbb {E}_i\) will not be considered at all is very small, and can say that it is very unlikely to occur. So, the term \((1-\frac{1}{2k_i})\) will be quite large and hence can say that any IoT device could be considered for at least once with larger probability.

B. Omitted proofs from Sect. 6.6

1.1 B1. Proof of Lemma 9

At any \(i^{th}\) iteration of the Algorithm 5, say a sub-task \(\mathbb {T}_j^i\) of task \(\mathbb {T}_j\) is having the highest estimated time among the other sub-tasks. From the construction of NoTUBE, the sub-task \(\mathbb {T}_j^i\) is a potential candidate for getting the IoT device(s). It is quite clear from Algorithm 5 that, with each assignment of IoT device to the sub-task \(\mathbb {T}_j^i\), an estimated time of the sub-task under consideration goes down monotonically. Once the substantial number of IoT devices is allocated to sub-task \(\mathbb {T}_i^j\), a new sub-task comes up as a potential candidate for getting the IoT devices, we call this as switch. So, in this lemma we are trying to answer the query: what is the substantial number of IoT devices in expectation that is to be assigned to any sub-task with highest estimated time before the switch happens?

Let us suppose the assignment of substantial number of IoT devices to a sub-task as a Bernoulli trials. So, we have a sequence of Bernoulli trials, each with probability of assigning IoT device to the sub-task \(\mathbb {T}_j^i\) be p and the probability of not assigning the IoT device to the sub-task \(\mathbb {T}_j^i\) is \(q = 1-p\). It can be observed that, the switch can occur after \(1^{st}\) assignment, or \(2^{nd}\) assignment, or \(3^{rd}\) assignment and so on. Making this argument more explicit, we let \(X_i\) be the random variable associated with an event in which the switch occurs after ith assignment: \(X_i\) = I{switch occurs after ith assignment}. Let X be the random variable denoting the total number of assignment before the switch happens. So, X has values in the range \(\{1,2,3,\ldots \}\) and for \(x \ge 1\),

$$\begin{aligned} Pr\{X = x\} = \underbrace{(1-p) \cdot (1-p) \cdot \ldots \cdot (1-p)}_{\begin{array}{c} \text {{ x}-1 times} \end{array}} \cdot ~ p \end{aligned}$$
(10)

since we have \(x-1\) number of IoT device(s) assigned to any sub-task before the switch occurs. It can be seen that, the probability distribution in Eq. 10 is said to be geometric distribution. Now, the expected value of random variable in which we are interested in is given as:

$$\begin{aligned} E[X] & = \sum \limits _{x=1}^{\infty } x \cdot (1-p)^{x-1} \cdot p\\ & = \frac{p}{p-1} \cdot \sum \limits _{x=0}^{\infty } x \cdot (1-p)^{x} \\ & = \frac{p}{p-1} \cdot \frac{1-p}{p^2}\\ & = \frac{p}{p-1} \cdot \frac{1-p}{p} \cdot \frac{1}{p}\\ E[X] & = \frac{1}{p} \end{aligned}$$

Now, if we have value of p as \(\frac{1}{2}\) then we get \(E[X] = 2\), which is a small constant. Similarly, for \(p=\frac{1}{3}\) we have \(E[X]=3\). Hence the claim survives.

1.2 B2. Proof of Theorem 1

Fix a task \(\mathbb {T}_j\). For any arbitrary sub-task, it may happen that the subset of the IoT devices that are the member of the grand coalition can form the sub-coalition (coalition other than the grand coalition) and could achieve the estimated completion time of the sub-task. The result of which, two things could be observed: (1) the IoT devices in the sub-coalition will have to utilize more of their battery power as they will be getting larger part of the sub-task this time as compared to the part they were getting in the grand coalition but within their battery power drainage time; (2) the IoT devices in the sub-coalition is guaranteed to be paid more than they were in the grand coalition.

The benefit raised in point (2) from IoT device point of view will motivate the IoT devices to form the sub-coalition and gain. Hence, the IoT devices are gaining by manipulating the system. So, NoTUBE is not truthful.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Singh, V.K., Mukhopadhyay, S., Xhafa, F. et al. A budget feasible peer graded mechanism for iot-based crowdsourcing. J Ambient Intell Human Comput 11, 1531–1551 (2020). https://doi.org/10.1007/s12652-019-01219-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-019-01219-z

Keywords

Navigation