Abstract
In order to establish efficient public services (e.g., traffic management, demand forecasting, traffic prediction), it’s necessary to build a supportive data collection, specially multi-platform user data collection (e.g., data of user’s journey information), to provide training data for building models. However, several issues hinders such paradigm to be deployed in real world. Firstly, we need to achieve the balance between data collection and user privacy protection. Secondly, it’s crucial to motive the users to contribute their data. Thirdly, we need to design a data pricing mechanism to promote data sharing. In this paper, we try to solve these issues by extending the Pay-by-data model, which is an explicit data-service exchange protocol. Based on this, we propose a system framework to support large-scale public service.
Similar content being viewed by others
Notes
Appthority. App Reputation Report Winter 2014: https://www.appthority.com/app-reputation-report/report/AppReputation0214.pdf, December 2014
Shara Tibken, Path to pay $800,000 to settle privacy issues with FTD. From CNet: http://www.cnet.com/uk/news/path-to-pay-800000-to-settle-privacy-issues-with-ftc/, February 2013
Digital Economy 2015: http://mitsloan.mit.edu/alumni/events/2015-london-digital-economy/
React Native: http://facebook.github.io/react-native/
References
Barkhuus L, Dey AK (2003) Location-based services for mobile telephony: a study of users’ privacy concerns. In: Interact, vol 3. Citeseer, pp 702–712
Cheng R, Zhang Y, Bertino E, Prabhakar S (2006) Preserving user location privacy in mobile data management infrastructures. In: International workshop on privacy enhancing technologies. Springer, pp 393–412
de Montjoye Y-A, Hidalgo CA, Verleysen M, Blondel VD Unique in the crowd: The privacy bounds of human mobility, Scientific reports 3
Dwork C (2008) Differential privacy: a survey of results. In: International conference on theory and applications of models of computation. Springer, pp 1–19
Felt AP, Ha E, Egelman S, Haney A, Chin E, Wagner D (2012) Android permissions: User attention, comprehension, and behavior. In: Proceedings of the eighth symposium on usable privacy and security. ACM, p 3
Gedik B, Liu L (2005) Location privacy in mobile systems: a personalized anonymization model. In: 25th IEEE international conference on distributed computing systems (ICDCS’05). IEEE, pp 620–629
Li N, Li T, Venkatasubramanian S (2007) t-closeness: Privacy beyond k-anonymity and l-diversity. In: IEEE 23rd international conference on data engineering, 2007. ICDE 2007. IEEE, pp 106–115
Liang F, Yu W, An D, Yang Q, Fu X, Zhao W (2018) A survey on big data market: pricing, trading and protection. IEEE Access 6:15132–15154
Machanavajjhala A, Gehrke J, Kifer D, Venkitasubramaniam M (2006) l-diversity: Privacy beyond k-anonymity. In: Proceedings of the 22nd international conference on data engineering, 2006. ICDE’06. IEEE, pp 24–24
Narayanan A, Shmatikov V How to break anonymity of the netflix prize dataset. arXiv:cs/0610105
Nauman M, Khan S, Zhang X (2010) Apex: extending android permission model and enforcement with user-defined runtime constraints. In: Proceedings of the 5th ACM symposium on information, computer and communications security. ACM, pp 328–332
Nie L, Song X, Chua T-S (2016) Learning from multiple social networks. Synthesis Lectures on Information Concepts, Retrieval, and Services 8(2):1–118
Nie L, Zhang L, Yang Y, Wang M, Hong R, Chua T-S (2015) Beyond doctors: Future health prediction from multimedia and multimodal observations. In: Proceedings of the 23rd ACM international conference on multimedia. ACM, pp 591–600
Petrie C (2016) The proper use of the internet: Digital private property. IEEE Internet Comput 20(2):92–94
Sweeney L (2002) K-anonymity: a model for protecting privacy. Int J Uncertainty Fuzziness Knowledge Based Syst 10(05):557–570
Van Grove J Your address book is mine: Many iphone apps take your data, VB Mobile 14
Vukovic M, Kumara S, Greenshpan O (2010) Ubiquitous crowdsourcing. In: Proceedings of the 12th ACM international conference adjunct papers on ubiquitous computing-adjunct. ACM, pp 523–526
Wagner DT, Rice A, Beresford AR (2014) Device analyzer: Large-scale mobile data collection. ACM SIGMETRICS Performance Evaluation Review 41(4):53–56
Wilson K, Brownstein JS (2009) Early detection of disease outbreaks using the internet. Can Med Assoc J 180(8):829–831
Yiu ML, Jensen CS, Huang X, Lu H (2008) Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: 2008 IEEE 24th international conference on data engineering. IEEE, pp 366–375
Acknowledgments
This work is supported by Fundamental Research Funds for the Central Universities, Artificial Intelligence Research Foundation of Baidu Inc., Zhejiang University and Cybervein Joint Research Lab, Zhejiang Natural Science Foundation (LY19F020051, R19F020009, LZ17F020001), National Natural Science Foundation of China (61572431), Key R&D Program of Zhejiang Province (2018C01006), Program of China Knowledge Center for Engineering Sciences and Technology, Program of ZJU and Tongdun Joint Research Lab, Program of ZJU and Horizon Robotics Joint Research Lab, Joint Research Program of ZJU and Hikvision Research Institute, and Major Scientifc Research Project of Zhejiang Lab (No. 2018EC0ZX01-1).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Wu, C., Hu, S., Lee, CH. et al. Multi-platform data collection for public service with Pay-by-Data. Multimed Tools Appl 79, 33503–33518 (2020). https://doi.org/10.1007/s11042-019-07919-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-07919-0