2018
DOI: 10.1016/j.comnet.2018.02.008
|View full text |Cite
|
Sign up to set email alerts
|

Truthful incentive mechanism with location privacy-preserving for mobile crowdsourcing systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
50
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 124 publications
(51 citation statements)
references
References 14 publications
1
50
0
Order By: Relevance
“…Considering the private participating mobile devices [8], Tran and To et al proposed a real-time algorithm for spatial task allocation in server-assigned crowdsourcing [5]. This framework can be employed to protect the real locations of mobile workers and to maximize the crowdsourcing success rates [10,11].…”
Section: Task Allocation In Location-based Mobile Crowdsourcingmentioning
confidence: 99%
See 1 more Smart Citation
“…Considering the private participating mobile devices [8], Tran and To et al proposed a real-time algorithm for spatial task allocation in server-assigned crowdsourcing [5]. This framework can be employed to protect the real locations of mobile workers and to maximize the crowdsourcing success rates [10,11].…”
Section: Task Allocation In Location-based Mobile Crowdsourcingmentioning
confidence: 99%
“…Moreover, the success of mobile crowdsourcing relies heavily on the quality of location-related workers [7]. The existing crowdsourcing systems are dependent on mainly mobile workers to allocate tasks to themselves when logging on to the systems [8], and many spatial tasks may not be allocated to suitable workers [9]. The execution quality of the crowdsourcing tasks suffers because the workers may be malicious participants [10][11][12][13].…”
mentioning
confidence: 99%
“…Wang et al [113] proposed a two-stage auction algorithm taking both trust degree and privacy sensibility into consideration for mobile crowdsourcing systems, such as ridesharing practices. The k-anonymity scheme is integrated with -differential scheme to add Gaussian white noise to the actual locations of users.…”
Section: 2015mentioning
confidence: 99%
“…The improved twostage auction algorithm based on trust degree and privacy sensibility is proposed. The differential privacy based on Gauss white noise is applied to k-anonymity to prevent user location information leakage [9]. Zhang HT.…”
Section: Research Statusmentioning
confidence: 99%
“…For example, the location privacy protection development model and task allocation strategy in mobile cloud computing of ad hoc networks are proposed in [12]. A truthful incentive mechanism to protect location privacy in mobile crowdsourcing system is proposed in document [9]. And location service providers have a lot of user privacy information.…”
Section: Comparative Analysismentioning
confidence: 99%