Skip to main content

A Differentially Private Method for Reward-Based Spatial Crowdsourcing

  • Conference paper
  • First Online:
Applications and Techniques in Information Security (ATIS 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 557))

Abstract

The popularity of mobile devices such as smart phones and tablets has led to a growing use of spatial crowdsourcing in recent years. However, current solution requires the workers send their locations to a centralized server, which leads to a privacy threat. One of the key challenges of spatial crowdsourcing is to maximize the number of assigned tasks with workers’ location privacy preserved. In this paper, we focus on the reward-based spatial crowdsourcing and propose a two-stage method which consists of constructing a differentially private contour plot followed by task assignment with optimized-reward allocation. Experiments on real dataset demonstrate the availability of the proposed method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Andrés, M.E., Bordenabe, N.E., Chatzikokolakis, K., Palamidessi, C.: Geo-indistinguishability: differential privacy for location-based systems. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer; Communications Security, CCS 2013, pp. 901–914. ACM, New York (2013)

    Google Scholar 

  2. Dewri, R.: Local differential perturbations: location privacy under approximate knowledge attackers. IEEE Trans. Mob. Comput. 12(12), 2360–2372 (2013)

    Article  Google Scholar 

  3. Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  4. Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D.-Z., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1–19. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  5. Dwork, C.: A firm foundation for private data analysis. Commun. ACM 54(1), 86–95 (2011)

    Article  Google Scholar 

  6. Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265–284. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  7. Kazemi, L., Shahabi, C.: Geocrowd: enabling query answering with spatial crowdsourcing. In: Proceedings of the 20th International Conference on Advances in Geographic Information Systems, SIGSPATIAL 2012, pp. 189–198. ACM, New York (2012)

    Google Scholar 

  8. Li, N., Yang, W., Qardaji, W.: Differentially private grids for geospatial data. In: Proceedings of the 2013 IEEE International Conference on Data Engineering (ICDE 2013), pp. 757–768. IEEE Computer Society, Washington, D.C. (2013)

    Google Scholar 

  9. Lu, H., Jensen, C.S., Yiu, M.L.: Pad: privacy-area aware, dummy-based location privacy in mobile services. In: Proceedings of the Seventh ACM International Workshop on Data Engineering for Wireless and Mobile Access, MobiDE 2008, pp. 16–23. ACM, New York (2008)

    Google Scholar 

  10. McSherry, F., Talwar, K.: Mechanism design via differential privacy. In: Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2007, pp. 94–103. IEEE Computer Society, Washington, D.C. (2007)

    Google Scholar 

  11. Pan, X., Xu, J., Meng, X.: Protecting location privacy against location-dependent attack in mobile services. In: Proceedings of the 17th ACM Conference on Information and Knowledge Management, CIKM 2008, pp. 1475–1476. ACM, New York (2008)

    Google Scholar 

  12. Pournajaf, L., Xiong, L., Sunderam, V., Goryczka, S.: Spatial task assignment for crowd sensing with cloaked locations. In: Proceedings of the 2014 IEEE 15th International Conference on Mobile Data Management, MDM 2014, vol. 01, pp. 73–82. IEEE Computer Society, Washington, D.C. (2014)

    Google Scholar 

  13. To, H., Ghinita, G., Shahabi, C.: A framework for protecting worker location privacy in spatial crowdsourcing. Proc. VLDB Endow. 7(10), 919–930 (2014)

    Article  Google Scholar 

  14. To, H., Ghinita, G., Shahabi, C.: Privgeocrowd: a toolbox for studying private spatial crowdsourcing. In: Proceedings of the 31st IEEE International Conference on Data Engineering (2015)

    Google Scholar 

  15. Xiao, Y., Gardner, J., Xiong, L.: Dpcube: releasing differentially private data cubes for health information. In: Proceedings of the 2012 IEEE 28th International Conference on Data Engineering, ICDE 2012, pp. 1305–1308. IEEE Computer Society, Washington, D.C. (2012)

    Google Scholar 

Download references

Acknowledgements

This work is supported by the Natural Science Foundation of HuBei province (China) under Grant No. 2014CFB354 and the Fundamental Research Funds for Central Universities of China under Grant No. 31541511301.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lefeng Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, L., Lu, X., Xiong, P., Zhu, T. (2015). A Differentially Private Method for Reward-Based Spatial Crowdsourcing. In: Niu, W., et al. Applications and Techniques in Information Security. ATIS 2015. Communications in Computer and Information Science, vol 557. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-48683-2_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-48683-2_14

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-48682-5

  • Online ISBN: 978-3-662-48683-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics