2018
DOI: 10.1007/s11280-018-0638-2
|View full text |Cite
|
Sign up to set email alerts
|

Towards secure and truthful task assignment in spatial crowdsourcing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(8 citation statements)
references
References 35 publications
0
8
0
Order By: Relevance
“…Other crowdsourcing setting. There are other related works in the spatial crowdsourcing spectrum [24,25,28]. Different from the task assignment problem, data publishing has been considered in [25].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Other crowdsourcing setting. There are other related works in the spatial crowdsourcing spectrum [24,25,28]. Different from the task assignment problem, data publishing has been considered in [25].…”
Section: Related Workmentioning
confidence: 99%
“…Different from the task assignment problem, data publishing has been considered in [25]. The truthful rather than privacy-preserving task assignment is considered in [28]. Privacy-preserving crowd-sensing is considered in [24], and the focus is to protect the locations of workers when they report their sensing results, rather than considering our task assignment setting, where workers need to move to a specified location of the assigned task, and both locations (tasks and workers) are perturbed with differential privacy.…”
Section: Related Workmentioning
confidence: 99%
“…In the reverse auction-based incentive model, DPs act as bidders who submit bids to compete for a task, and SP acts as the auctioneer, who aims to maximize its own benefit. Inspired by the work in [41], a number of incentive work based on reverse auction has to be carried out, but only a few of them [34,48,69,74] take into account the privacy issues. In this subsection, we focus on analyzing the requirement fulfillment of these schemes.…”
Section: B) Privacy Protection In Credit-based Incentive (Cr)mentioning
confidence: 99%
“…Yang et al adopted k-anonymity for bid privacy preservation and proposed three auctionbased incentive location privacy protection mechanisms [74]. The first solution is applicable to the scenario where all DCs have the same privacy requirements; the second one is proposed to deal with different privacy requirements in the real world; the last one is suitable for the case where a DP can cheat on both their valuations and degree requirement.…”
Section: B) Privacy Protection In Credit-based Incentive (Cr)mentioning
confidence: 99%
“…Moreover in a previous study, Liu et al [20] adopted Paillier Cryptosystem and KD-tree to build a secure index based on the dual-server setting to address the privacy-preserving and efficiency issues. Unfortunately, the huge update overhead makes this scheme unsuitable for the practical SC services since worker locations are dynamically changing rather than being static [21].…”
Section: Introductionmentioning
confidence: 99%