Crowdsourcing quality control model protecting location privacy of workers

被引:0
|
作者
Chu X. [1 ,2 ]
Zhong Q. [2 ]
机构
[1] Department of Management Science and Engineering, Tsinghua University, Beijing
[2] Faculty of Management and Economics, Dalian University of Technology, Dalian
来源
| 2016年 / Systems Engineering Society of China卷 / 36期
基金
中国国家自然科学基金;
关键词
Crowdsourcing; EM algorithm; Location privacy; Quality control;
D O I
10.12011/1000-6788(2016)08-2047-09
中图分类号
学科分类号
摘要
Emerging location based crowdsourcing requires workers to submit their own immediate location information to outsourcer along with task labels, for the sake of quality control. However, massive exposed location privacy may incur workers more vulnerable. In order to protect privacy of workers, an approach based on fuzzy space and time is proposed, which can raise uncertainty of information obtained by potential attackers. We theoretically guarantee and experimentally examine that proposed approach does not significantly reduce accuracy of crowdsourcing. The experiment results show: 1) when most workers submit high-quality results, outsourcer can guarantee overall crowdsourcing quality, without worker location information; 2) when error or spammer ratio of workers is high, location information improves quality control ability, nevertheless the fuzzy processing does not weaken the quality. © 2016, Editorial Board of Journal of Systems Engineering Society of China. All right reserved.
引用
收藏
页码:2047 / 2055
页数:8
相关论文
共 16 条
  • [1] Karger D.R., Oh S., Shah D., Budget-optimal task allocation for reliable crowdsourcing systems, Operations Research, 62, 1, pp. 1-24, (2014)
  • [2] Howe J., The rise of crowdsourcing, Wired, 14, 6, pp. 176-183, (2006)
  • [3] Varshney L.R., Privacy and reliability in crowdsourcing service delivery, 2012 Service Research and Innovation Institute Global Conference, pp. 55-60, (2012)
  • [4] Varshney L.R., Vempaty A., Varshney P.K., Assuring privacy and reliability in crowdsourcing with coding, Proceedings of the 2014 Information Theory and its Applications Workshop (ITA), pp. 1-6, (2014)
  • [5] Hiroshi K., Hiromi A., Hisashi K., Preserving worker privacy in crowdsourcing, Data Mining and Knowledge Discovery, 28, pp. 1314-1335, (2014)
  • [6] Wang L., Meng X.F., Location privacy preservation in big data era: A survey, Journal of Software, 4, pp. 693-712, (2014)
  • [7] Beresford A.R., Stajano F., Location privacy in pervasive computing, IEEE Pervasive Computing, 2, 1, pp. 46-55, (2003)
  • [8] Dewri R., Local differential perturbations: Location privacy under approximate knowledge attackers, IEEE Transactions on Mobile Computing, 12, 12, pp. 2360-2372, (2013)
  • [9] Palanisamy B., Liu L., Mobimix: Protecting location privacy with mix-zones over road networks, Proceedings of the 27th International Conference on Data Engineering (ICDE), pp. 494-505, (2011)
  • [10] Zhang Z.Q., Pang J.S., Xie X.Q., Et al., Research on crowdsourcing quality control strategies and evaluation algorithm, Chinese Journal of Computers, 36, 8, pp. 1636-1649, (2013)