2020
DOI: 10.1109/jiot.2020.2989578
|View full text |Cite
|
Sign up to set email alerts
|

A Fog-Assisted Privacy-Preserving Task Allocation in Crowdsourcing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(5 citation statements)
references
References 26 publications
0
5
0
Order By: Relevance
“…Theoretical analysis and experiments were performed to show that the approach could provide a strict privacy guarantee and enhance the performance. Zhang [43] aimed to address the issue of privacy-preserving crowdsourcing. They proposed an approach to managing the workers' computational requirements by allocating parts of the computation to the fog node.…”
Section: Privacy In Crowd-iotmentioning
confidence: 99%
See 1 more Smart Citation
“…Theoretical analysis and experiments were performed to show that the approach could provide a strict privacy guarantee and enhance the performance. Zhang [43] aimed to address the issue of privacy-preserving crowdsourcing. They proposed an approach to managing the workers' computational requirements by allocating parts of the computation to the fog node.…”
Section: Privacy In Crowd-iotmentioning
confidence: 99%
“…Their approach achieves privacy protection of task content and interest keywords and resists the attacks of the workers. Zhang [43] aimed to address the issue of privacy-preserving crowdsourcing. They proposed an approach to managing the workers' computational requirements by allocating parts of the computation to the fog node.…”
Section: Privacy In Crowd-iotmentioning
confidence: 99%
“…Usually, the data uploaded in the FSs include trajectories, unique identifiers, and location information which leads to potential financial loss or privacy leakage. Fog computing has advanced services which may be invalidated when misled of prediction and optimization results occur due to inappropriate global aggregation result 16 …”
Section: Introductionmentioning
confidence: 99%
“…Fog computing has advanced services which may be invalidated when misled of prediction and optimization results occur due to inappropriate global aggregation result. 16 To overcome issues related to data centralization drawbacks in vehicular networks, researchers introduced FL as a solution. FL is used to enrich AI in order to apply computation applications into end devices to protect privacy issues.…”
mentioning
confidence: 99%
“…Recently, FL is explored extensively in IoT applications [78][79][80][81][82]. Many studies focus on privacy-preserving crowdsourcing [107,108], and leveraging the fog computing or edge computing to improve the performance as they have gained popularity [109][110][111][112][113][114]. For example, Wu et al [107] proposed two generic models for quantifying mobile users' privacy and data utility in crowdsourced location-based services, respectively.…”
Section: Existing Studies On Federated Learning For Iotmentioning
confidence: 99%