2018 IEEE International Conference on Electro/Information Technology (EIT) 2018
DOI: 10.1109/eit.2018.8500311
|View full text |Cite
|
Sign up to set email alerts
|

Location Privacy Challenges in Spatial Crowdsourcing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
12
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(12 citation statements)
references
References 22 publications
0
12
0
Order By: Relevance
“…Location Privacy-preserving in pull mode has been studied in term of participatory sensing in [21], [22], [23], [24]. A recent survey provides an overview of location privacy attacks in the pull mode and push mode of tasking in [7]. The latest survey that focuses on this topic can be found in [6].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Location Privacy-preserving in pull mode has been studied in term of participatory sensing in [21], [22], [23], [24]. A recent survey provides an overview of location privacy attacks in the pull mode and push mode of tasking in [7]. The latest survey that focuses on this topic can be found in [6].…”
Section: Related Workmentioning
confidence: 99%
“…In their approach, crowd workers can cloak their location using either distributed or centralized mechanisms based on other crowd workers locations. Unfortunately, the adversaries can infer the crowd worker's locations if the crowd worker lactated in a sparsely populated area [7]. Another differential kanonymity-based has been proposed for location privacy [29].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…There are many attacks that can happen on pull mode such as task sampling attack, location homogeneity attack, and map matching attack [6]. The first attack is the task sampling attack in which the attackers link the location of participants to location-based tasks to know the location of a specific worker.…”
Section: Location-based Privacy Threatsmentioning
confidence: 99%
“…With the growth of the MCS models, there have been other platforms extended from the MCS concept like Spatial Crowdsourcing (SC). The main characteristic of SC is that workers must be present in a specific location to accomplish the spatial tasks [6]. In this paper, we use both terms exchangeably.…”
Section: Introductionmentioning
confidence: 99%