Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing

By effectively reaching out to and engaging larger population of mobile users, mobile crowd-sourcing has become a strategy to perform large amount of urban tasks. The recent empirical studies have shown that compared to the pull-based approach, which expects the users to browse through the list of t...

Full description

Saved in:
Bibliographic Details
Main Authors: KANDAPPU, Thivya, MISRA, Archan, CHENG, Shih-Fen, TANDRIANSYAH, Randy, LAU, Hoong Chuin
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2018
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/3976
https://ink.library.smu.edu.sg/context/sis_research/article/4978/viewcontent/mobile_crowd_tasker_afv.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-4978
record_format dspace
spelling sg-smu-ink.sis_research-49782020-03-26T07:27:34Z Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing KANDAPPU, Thivya MISRA, Archan CHENG, Shih-Fen TANDRIANSYAH, Randy LAU, Hoong Chuin By effectively reaching out to and engaging larger population of mobile users, mobile crowd-sourcing has become a strategy to perform large amount of urban tasks. The recent empirical studies have shown that compared to the pull-based approach, which expects the users to browse through the list of tasks to perform, the push-based approach that actively recommends tasks can greatly improve the overall system performance. As the efficiency of the push-based approach is achieved by incorporating worker's mobility traces, privacy is naturally a concern. In this paper, we propose a novel, 2-stage and user-controlled obfuscation technique that provides a trade off-amenable framework that caters to multi-attribute privacy measures (considering the per-user sensitivity and global uniqueness of locations). We demonstrate the effectiveness of our approach by testing it using the real-world data collected from the well-established TA$Ker platform. More specifically, we show that one can increase its location entropy by 23% with only modest changes to the real trajectories while imposing an additional 24% (< 1 min) of detour overhead on average. Finally, we present insights derived by carefully inspecting various parameters that control the whole obfuscation process. 2018-03-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/3976 info:doi/10.1145/3191748 https://ink.library.smu.edu.sg/context/sis_research/article/4978/viewcontent/mobile_crowd_tasker_afv.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Privacy Mobile Crowd-sourcing platforms obfuscation trajectory context-aware Computer Sciences Information Security Software Engineering
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Privacy
Mobile Crowd-sourcing platforms
obfuscation
trajectory
context-aware
Computer Sciences
Information Security
Software Engineering
spellingShingle Privacy
Mobile Crowd-sourcing platforms
obfuscation
trajectory
context-aware
Computer Sciences
Information Security
Software Engineering
KANDAPPU, Thivya
MISRA, Archan
CHENG, Shih-Fen
TANDRIANSYAH, Randy
LAU, Hoong Chuin
Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing
description By effectively reaching out to and engaging larger population of mobile users, mobile crowd-sourcing has become a strategy to perform large amount of urban tasks. The recent empirical studies have shown that compared to the pull-based approach, which expects the users to browse through the list of tasks to perform, the push-based approach that actively recommends tasks can greatly improve the overall system performance. As the efficiency of the push-based approach is achieved by incorporating worker's mobility traces, privacy is naturally a concern. In this paper, we propose a novel, 2-stage and user-controlled obfuscation technique that provides a trade off-amenable framework that caters to multi-attribute privacy measures (considering the per-user sensitivity and global uniqueness of locations). We demonstrate the effectiveness of our approach by testing it using the real-world data collected from the well-established TA$Ker platform. More specifically, we show that one can increase its location entropy by 23% with only modest changes to the real trajectories while imposing an additional 24% (< 1 min) of detour overhead on average. Finally, we present insights derived by carefully inspecting various parameters that control the whole obfuscation process.
format text
author KANDAPPU, Thivya
MISRA, Archan
CHENG, Shih-Fen
TANDRIANSYAH, Randy
LAU, Hoong Chuin
author_facet KANDAPPU, Thivya
MISRA, Archan
CHENG, Shih-Fen
TANDRIANSYAH, Randy
LAU, Hoong Chuin
author_sort KANDAPPU, Thivya
title Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing
title_short Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing
title_full Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing
title_fullStr Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing
title_full_unstemmed Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing
title_sort obfuscation at-source: privacy in context-aware mobile crowd-sourcing
publisher Institutional Knowledge at Singapore Management University
publishDate 2018
url https://ink.library.smu.edu.sg/sis_research/3976
https://ink.library.smu.edu.sg/context/sis_research/article/4978/viewcontent/mobile_crowd_tasker_afv.pdf
_version_ 1770574109734862848