2017
DOI: 10.1007/s11390-017-1772-5
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Task Assignment in Spatial Crowdsourcing

Abstract: With the progress of mobile devices and wireless networks, spatial crowdsourcing (SC) is emerging as a promising approach for problem solving. In SC, spatial tasks are assigned to and performed by a set of human workers. To enable effective task assignment, however, both workers and task requesters are required to disclose their locations to untrusted SC systems. In this paper, we study the problem of assigning workers to tasks in a way that location privacy for both workers and task requesters is preserved. W… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
5

Relationship

2
8

Authors

Journals

citations
Cited by 41 publications
(17 citation statements)
references
References 39 publications
0
17
0
Order By: Relevance
“…This two-dimensional data is re-coordinate to single shorter string values using the geohash converter. Geohash algorithm provides a hierarchical grid-based model of the earth where locations are presented in Base32 strings [84]. To use more accurate, consistent data for our data processing, the converted geohash data, and other data features are integrated through data fusion.…”
Section: Proposed Risk Inference Approach Based On Geographical mentioning
confidence: 99%
“…This two-dimensional data is re-coordinate to single shorter string values using the geohash converter. Geohash algorithm provides a hierarchical grid-based model of the earth where locations are presented in Base32 strings [84]. To use more accurate, consistent data for our data processing, the converted geohash data, and other data features are integrated through data fusion.…”
Section: Proposed Risk Inference Approach Based On Geographical mentioning
confidence: 99%
“…The elliptic curve discrete logarithm problem (ECDLP) is significantly more difficult and has a larger computational complexity than the integer factorization or discrete logarithm problem. (11) To satisfy security requirements, the ECC needs a comparatively smaller key size than the other cryptosystems. ECC-based access control schemes enjoy high security performance at the expense of bulky mobile agent codes and excessive calculations for encryption/decryption keys.…”
Section: Previous Workmentioning
confidence: 99%
“…In fact, there are a lot of researches using homomorphic encryption as a commonly used encryption method [9,27,2,24,26,14,54,38,46,45]. Homomorphic encryption [12] which allows computation carried out on ciphertext is a straightforward way to achieve privacy.…”
Section: Related Workmentioning
confidence: 99%