2017
DOI: 10.1007/s10707-017-0305-2
|View full text |Cite
|
Sign up to set email alerts
|

Efficient task assignment in spatial crowdsourcing with worker and task privacy protection

Abstract: Spatial crowdsourcing (SC) outsources tasks to a set of workers who are required to physically move to specified locations and accomplish tasks. Recently, it is emerging as a promising tool for emergency management, as it enables efficient and cost-effective collection of critical information in emergency such as earthquakes, when search and rescue survivors in potential ares are required. However in current SC systems, task locations and worker locations are all exposed in public without any privacy protectio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
27
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
4

Relationship

2
6

Authors

Journals

citations
Cited by 86 publications
(28 citation statements)
references
References 41 publications
0
27
0
Order By: Relevance
“…Considering the private participating mobile devices [8], Tran and To et al proposed a real-time algorithm for spatial task allocation in server-assigned crowdsourcing [5]. This framework can be employed to protect the real locations of mobile workers and to maximize the crowdsourcing success rates [10,11]. Unlike private location-based queries, this study focuses on trust-aware task allocation in mobile crowdsourcing.…”
Section: Task Allocation In Location-based Mobile Crowdsourcingmentioning
confidence: 99%
See 1 more Smart Citation
“…Considering the private participating mobile devices [8], Tran and To et al proposed a real-time algorithm for spatial task allocation in server-assigned crowdsourcing [5]. This framework can be employed to protect the real locations of mobile workers and to maximize the crowdsourcing success rates [10,11]. Unlike private location-based queries, this study focuses on trust-aware task allocation in mobile crowdsourcing.…”
Section: Task Allocation In Location-based Mobile Crowdsourcingmentioning
confidence: 99%
“…The existing crowdsourcing systems are dependent on mainly mobile workers to allocate tasks to themselves when logging on to the systems [8], and many spatial tasks may not be allocated to suitable workers [9]. The execution quality of the crowdsourcing tasks suffers because the workers may be malicious participants [10][11][12][13]. The trustworthiness of mobile workers must be considered in the mobile crowdsourcing setting [12].…”
mentioning
confidence: 99%
“…In this paper, we consider a typical adversary model, that is, the semi-honest model [13], that has been widely accepted in a variety of privacy-preserving problem domains [21,18,20]. Specifically, all parties in this model are assumed to be semi-honest, that is, they follow the recommendation protocol exactly as specified, but may try to learn as much as possible about other parties' private input from what they see during the protocol's execution.…”
Section: Adversary Model and Security Definitionmentioning
confidence: 99%
“…Recently there have also been some advances in privacy-preserving task assignment in SC applications [11][12][13][14] . In [11][12], workers' locations are collected and perturbed by a trusted party which injects calibrated noises into raw data according to differential privacy (DP) [15] .…”
Section: Introductionmentioning
confidence: 99%
“…Unfortunately, the update operation is very time-consuming especially when there are a large number of workers, which makes it unsuitable for large-scale real-time SC applications. The protocol proposed in [14] also takes into account worker velocity during task assignment, thus the result is more effective in practice. However, it still suffers from computation time issue and cannot scale to large SC applications.…”
Section: Introductionmentioning
confidence: 99%