Collusion-Resistant Worker Recruitment in Crowdsourcing Systems

被引:8
|
作者
Xiao, Mingyan [1 ]
Jin, Wenqiang [1 ]
Li, Ming [1 ]
Yang, Lei [2 ]
Thapa, Arun [3 ]
Li, Pan [4 ]
机构
[1] Univ Texas Arlington, Dept Comp Sci & Engn, Arlington, TX 76010 USA
[2] Univ Nevada, Dept Comp Sci & Engn, Reno, NV USA
[3] Tuskegee Univ, Dept Elect Engn, Tuskegee, AL USA
[4] Case Western Reserve Univ, Dept Elect Engn & Comp Sci, Cleveland, OH USA
关键词
Crowdsourcing; worker recruitment auctions; collusion resistance; AUCTIONS; PROCUREMENT; COMPETITION; ALLOCATION; 2ND-PRICE; STRATEGY; BEHAVIOR; DESIGN;
D O I
10.1109/TMC.2021.3071093
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the wake of the Web 2.0, crowdsourcing has emerged as a promising approach to maintain a flexible workforce for human intelligence tasks. To stimulate worker participation, many reverse auction-based incentive mechanisms have been proposed. Designing auctions that discourage workers from cheating and instead encouraging them to reveal their true cost information has drawn significant attention. However, the existing efforts have been focusing on tackling individual cheating misbehaviors, while the scenarios that workers strategically form collusion coalitions and rig their bids together to manipulate auction outcomes have received little attention. To fill this gap, in this work we develop a (t,p)-collusion resistant scheme that ensures no coalition of weighted cardinality t can improve its group utility by coordinating the bids at a probability of p. This paper takes into account the unique features of crowdsourcing, such as diverse worker types and reputations, in the design. The proposed scheme can suppress a broad spectrum of collusion strategies. Besides, desirable properties, including p-truthfulness and p-individual rationality, are also achieved. To provide a comprehensive evaluation, we first analytically prove our scheme's collusion resistance and then experimentally verify our analytical conclusion using a real-world dataset. Our experimental results show that the baseline scheme, where none of the critical properties is guaranteed, costs up to 20.1 times the optimal payment in an ideal case where no collusion exists, while our final scheme is merely 4.9 times the optimal payment.
引用
收藏
页码:129 / 144
页数:16
相关论文
共 50 条
  • [31] Collusion-Resistant Repeated Double Auctions for Cooperative Communications
    Xu, Zichuan
    Liang, Weifa
    9TH IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS (MASS 2012), 2012, : 443 - 447
  • [32] Collusion-resistant, Incentive-compatible Feedback Payments
    Jurca, Radu
    Faltings, Boi
    EC'07: PROCEEDINGS OF THE EIGHTH ANNUAL CONFERENCE ON ELECTRONIC COMMERCE, 2007, : 200 - 209
  • [33] COLLUSION-RESISTANT VIDEO FINGERPRINTING BASED ON TEMPORAL OSCILLATION
    Lin, Yu-Tzu
    Huang, Chun-Hsiang
    Wu, Ja-Ling
    2008 15TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-5, 2008, : 3128 - 3131
  • [34] An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata
    Peter Kieseberg
    Sebastian Schrittwieser
    Martin Mulazzani
    Isao Echizen
    Edgar Weippl
    Electronic Markets, 2014, 24 : 113 - 124
  • [35] Functional Re-encryption and Collusion-Resistant Obfuscation
    Chandran, Nishanth
    Chase, Melissa
    Vaikuntanathan, Vinod
    THEORY OF CRYPTOGRAPHY (TCC 2012), 2012, 7194 : 404 - 421
  • [36] Collusion-Resistant Mechanisms for Single-Parameter Agents
    Goldberg, Andrew V.
    Hartline, Jason D.
    PROCEEDINGS OF THE SIXTEENTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, 2005, : 620 - 629
  • [37] Collusion-resistant video fingerprinting for large user group
    He, Shan
    Wu, Min
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2007, 2 (04) : 697 - 709
  • [38] Data hiding in curves for collusion-resistant digital fingerprinting
    Gou, HM
    Wu, M
    ICIP: 2004 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1- 5, 2004, : 51 - 54
  • [39] Collusion-Resistant Mechanisms with Verification Yielding Optimal Solutions
    Penna, Paolo
    Ventre, Carmine
    ACM TRANSACTIONS ON COMPUTATION THEORY, 2012, 4 (02)
  • [40] AudiWFlow: Confidential, collusion-resistant auditing of distributed workflows
    Zhou, Xiaohu
    Nehme, Antonio
    Jesus, Vitor
    Wang, Yonghao
    Josephs, Mark
    Mahbub, Khaled
    Abdallah, Ali
    BLOCKCHAIN-RESEARCH AND APPLICATIONS, 2022, 3 (03):