Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing
By effectively reaching out to and engaging larger population of mobile users, mobile crowd-sourcing has become a strategy to perform large amount of urban tasks. The recent empirical studies have shown that compared to the pull-based approach, which expects the users to browse through the list of t...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2018
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/3976 https://ink.library.smu.edu.sg/context/sis_research/article/4978/viewcontent/mobile_crowd_tasker_afv.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-4978 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-49782020-03-26T07:27:34Z Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing KANDAPPU, Thivya MISRA, Archan CHENG, Shih-Fen TANDRIANSYAH, Randy LAU, Hoong Chuin By effectively reaching out to and engaging larger population of mobile users, mobile crowd-sourcing has become a strategy to perform large amount of urban tasks. The recent empirical studies have shown that compared to the pull-based approach, which expects the users to browse through the list of tasks to perform, the push-based approach that actively recommends tasks can greatly improve the overall system performance. As the efficiency of the push-based approach is achieved by incorporating worker's mobility traces, privacy is naturally a concern. In this paper, we propose a novel, 2-stage and user-controlled obfuscation technique that provides a trade off-amenable framework that caters to multi-attribute privacy measures (considering the per-user sensitivity and global uniqueness of locations). We demonstrate the effectiveness of our approach by testing it using the real-world data collected from the well-established TA$Ker platform. More specifically, we show that one can increase its location entropy by 23% with only modest changes to the real trajectories while imposing an additional 24% (< 1 min) of detour overhead on average. Finally, we present insights derived by carefully inspecting various parameters that control the whole obfuscation process. 2018-03-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/3976 info:doi/10.1145/3191748 https://ink.library.smu.edu.sg/context/sis_research/article/4978/viewcontent/mobile_crowd_tasker_afv.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Privacy Mobile Crowd-sourcing platforms obfuscation trajectory context-aware Computer Sciences Information Security Software Engineering |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Privacy Mobile Crowd-sourcing platforms obfuscation trajectory context-aware Computer Sciences Information Security Software Engineering |
spellingShingle |
Privacy Mobile Crowd-sourcing platforms obfuscation trajectory context-aware Computer Sciences Information Security Software Engineering KANDAPPU, Thivya MISRA, Archan CHENG, Shih-Fen TANDRIANSYAH, Randy LAU, Hoong Chuin Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing |
description |
By effectively reaching out to and engaging larger population of mobile users, mobile crowd-sourcing has become a strategy to perform large amount of urban tasks. The recent empirical studies have shown that compared to the pull-based approach, which expects the users to browse through the list of tasks to perform, the push-based approach that actively recommends tasks can greatly improve the overall system performance. As the efficiency of the push-based approach is achieved by incorporating worker's mobility traces, privacy is naturally a concern. In this paper, we propose a novel, 2-stage and user-controlled obfuscation technique that provides a trade off-amenable framework that caters to multi-attribute privacy measures (considering the per-user sensitivity and global uniqueness of locations). We demonstrate the effectiveness of our approach by testing it using the real-world data collected from the well-established TA$Ker platform. More specifically, we show that one can increase its location entropy by 23% with only modest changes to the real trajectories while imposing an additional 24% (< 1 min) of detour overhead on average. Finally, we present insights derived by carefully inspecting various parameters that control the whole obfuscation process. |
format |
text |
author |
KANDAPPU, Thivya MISRA, Archan CHENG, Shih-Fen TANDRIANSYAH, Randy LAU, Hoong Chuin |
author_facet |
KANDAPPU, Thivya MISRA, Archan CHENG, Shih-Fen TANDRIANSYAH, Randy LAU, Hoong Chuin |
author_sort |
KANDAPPU, Thivya |
title |
Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing |
title_short |
Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing |
title_full |
Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing |
title_fullStr |
Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing |
title_full_unstemmed |
Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing |
title_sort |
obfuscation at-source: privacy in context-aware mobile crowd-sourcing |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2018 |
url |
https://ink.library.smu.edu.sg/sis_research/3976 https://ink.library.smu.edu.sg/context/sis_research/article/4978/viewcontent/mobile_crowd_tasker_afv.pdf |
_version_ |
1770574109734862848 |