A location privacy protection method in spatial crowdsourcing

Journal of Information Security and Applications - Tập 65 - Trang 103095 - 2022
Fagen Song1,2, Tinghuai Ma2
1Yancheng Institute of Technology, Jiangsu, Yancheng 224-051, China
2School of Computer & Software, Nanjing University of Information Science & Technology, Jiangsu, Nanjing 210-044, China

Tài liệu tham khảo

Wei, 2019, Differential privacy-based location protection in spatial crowdsourcing, IEEE Trans Serv Comput To, 2017, Differentially private location protection for worker datasets in spatial crowdsourcing, IEEE Trans Mob Comput, 16, 934 Fortune magazine, 2020 China business daily, 2020 Wang, 2017, Multi-objective optimization based allocation of heterogeneous spatial crowdsourcing tasks, IEEE Trans Mob Comput, 17, 1637, 10.1109/TMC.2017.2771259 Wang, 2017, Protecting personal trajectories of social media users through differential privacy, Comput Secur, 67, 142, 10.1016/j.cose.2017.02.002 Kazemi L, Shahabi C. GeoCrowd: Enabling query answering with spatial crowdsourcing. In: Proceedings of the 20th international conference on advances in geographic information systems. 2012. Xiong, 2017, Reward-based spatial crowdsourcing with differential privacy preservation, Enterp Inf Syst, 1 Dwork C. Differential Privacy. In: Proceedings of the 33rd international conference on automata, languages and programming - volume part II. 2006. Wang, 2016, Real-time and spatio-temporal crowd-sourced social network data publishing with differential privacy, IEEE Trans Dependable Secur Comput, 1 Dwork C, Mcsherry F, Nissim K, Smith A. Calibrating Noise to Sensitivity in Private Data Analysis. In: Proceedings of the third conference on theory of cryptography. 2006. Dwork C, Lei J. Differential privacy and robust statistics. In: Proceedings of the forty-first annual acm symposium on theory of computing. 2009, p. 371–80. Wang, 2018, Privacy-preserving crowd-sourced statistical data publishing with an untrusted server, IEEE Trans Mob Comput, PP, 1 Mcsherry F, Talwar K. Mechanism Design via Differential Privacy. In: 48th Annual IEEE symposium on foundations of computer science, 2007. 2007, p. 94–103. Gong, 2015, Protecting location privacy for task allocation in ad hoc mobile cloud computing, IEEE Trans Emerg Top Comput, 6, 110, 10.1109/TETC.2015.2490021 Zheng Y, Zhang L, Xie X, Ma W-Y. Mining interesting locations and travel sequences from GPS trajectories. In: Proceedings of the 18th international conference on world wide web. 2009, p. 791–800. Zheng Y, Li Q, Chen Y, Xie X, Ma W-Y. Understanding mobility based on GPS data. In: Proceedings of the 10th international conference on ubiquitous computing. 2008, p. 312–21. Zheng, 2010, Geolife: A collaborative social networking service among user, location and trajectory., IEEE Data Eng Bull, 33, 32 Cho E, Myers S, Leskovec J. Friendship and mobility: Friendship and mobility: User movement in location-based social networks. In: ACM SIGKDD international conference on knowledge discovery and data mining. p. 1082–90. Dewri, 2013, Local differential perturbations: Location privacy under approximate knowledge attackers, IEEE Trans Mob Comput, 12, 2360, 10.1109/TMC.2012.208 Shu, 1939, Privacy-preserving task recommendation services for crowdsourcing, IEEE Trans Serv Comput, 1 Ni J, Lin X, Zhang K, Yong Y. Secure and Deduplicated Spatial Crowdsourcing: A Fog-Based Approach. In: Global communications conference. 2017. Shu, 2018, Anonymous privacy-preserving task matching in crowdsourcing, IEEE Int Things J, PP, 1 Yilmaz, 2017, Privacy-preserving aggregate queries for optimal location selection, IEEE Trans Dependable Secur Comput, PP, 1 Samarati, 1998 Xiong, 2016, A differentially private algorithm for location data release, Knowl Inf Syst, 47, 647, 10.1007/s10115-015-0856-1 Jiang K, Shao D, Bressan S, Kister T, Tan KL. Publishing trajectories with differential privacy guarantees. In: International conference on scientific & statistical database management. 2013. Wang, 2017, Privacyprotected statistics publication over social media user trajectory streams, Future Gener Comput Syst, 87, 792 Shaobo, 2017, 1 Abul O, Bonchi F, Nanni M. Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases. In: IEEE international conference on data engineering. 2008. Xin, 2017, The privacy preserving method for dynamic trajectory releasing based on adaptive clustering, Inform Sci, 378, 131, 10.1016/j.ins.2016.10.038 Wong CW, Fu WC, Wang K, Pei J. Minimality Attack in Privacy Preserving Data Publishing. In: Proceedings of the 33rd international conference on very large data bases. University Of Vienna; 2007, p. 23–7. Ganta SR, Kasiviswanathan SP, Smith A. Composition attacks and auxiliary information in data privacy. In: Proceedings of the 14th ACM SIGKDD international conference on knowledge discovery and data mining. 2008, p. 265–73. Brinkrolf, 2019, Differential privacy for learning vector quantization, Neurocomputing, 342, 125, 10.1016/j.neucom.2018.11.095 Chen, 2011 Hua, 2015, Differentially private publication of general time-serial trajectory data, 549 Luo T, Tan HP, Xia L. Profit-maximizing incentive for participatory sensing. In: IEEE infocom -IEEE conference on computer communications. 2014.