Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing

By e!ectively reaching out to and engaging larger population of mobile users, mobile crowd-sourcing has become a strategy to perform large amount of urban tasks. The recent empirical studies have shown that compared to the pull-based approach, which expects the users to browse through the list of ta...

Full description

Saved in:
Bibliographic Details
Main Authors: KANDAPPU, Thivya, MISRA, Archan, CHENG, Shih-Fen, TANDRIANSYAH, Randy, LAU, Hoong Chuin
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2018
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/5428
https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=6431&context=sis_research
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-6431
record_format dspace
spelling sg-smu-ink.sis_research-64312020-12-11T06:19:55Z Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing KANDAPPU, Thivya MISRA, Archan CHENG, Shih-Fen TANDRIANSYAH, Randy LAU, Hoong Chuin By e!ectively reaching out to and engaging larger population of mobile users, mobile crowd-sourcing has become a strategy to perform large amount of urban tasks. The recent empirical studies have shown that compared to the pull-based approach, which expects the users to browse through the list of tasks to perform, the push-based approach that actively recommends tasks can greatly improve the overall system performance. As the e"ciency of the push-based approach is achieved by incorporating worker’s mobility traces, privacy is naturally a concern. In this paper, we propose a novel, 2-stage and usercontrolled obfuscation technique that provides a tradeo!-amenable framework that caters to multi-attribute privacy measures (considering the per-user sensitivity and global uniqueness of locations). We demonstrate the e!ectiveness of our approach by testing it using the real-world data collected from the well-established TA$Ker platform. More speci#cally, we show that one can increase its location entropy by 23% with only modest changes to the real trajectories while imposing an additional 24% ( 2018-03-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/5428 https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=6431&context=sis_research http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Privacy Mobile Crowd-sourcing platforms obfuscation trajectory context-aware Social and Behavioral Sciences
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Privacy
Mobile Crowd-sourcing platforms
obfuscation
trajectory
context-aware
Social and Behavioral Sciences
spellingShingle Privacy
Mobile Crowd-sourcing platforms
obfuscation
trajectory
context-aware
Social and Behavioral Sciences
KANDAPPU, Thivya
MISRA, Archan
CHENG, Shih-Fen
TANDRIANSYAH, Randy
LAU, Hoong Chuin
Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing
description By e!ectively reaching out to and engaging larger population of mobile users, mobile crowd-sourcing has become a strategy to perform large amount of urban tasks. The recent empirical studies have shown that compared to the pull-based approach, which expects the users to browse through the list of tasks to perform, the push-based approach that actively recommends tasks can greatly improve the overall system performance. As the e"ciency of the push-based approach is achieved by incorporating worker’s mobility traces, privacy is naturally a concern. In this paper, we propose a novel, 2-stage and usercontrolled obfuscation technique that provides a tradeo!-amenable framework that caters to multi-attribute privacy measures (considering the per-user sensitivity and global uniqueness of locations). We demonstrate the e!ectiveness of our approach by testing it using the real-world data collected from the well-established TA$Ker platform. More speci#cally, we show that one can increase its location entropy by 23% with only modest changes to the real trajectories while imposing an additional 24% (
format text
author KANDAPPU, Thivya
MISRA, Archan
CHENG, Shih-Fen
TANDRIANSYAH, Randy
LAU, Hoong Chuin
author_facet KANDAPPU, Thivya
MISRA, Archan
CHENG, Shih-Fen
TANDRIANSYAH, Randy
LAU, Hoong Chuin
author_sort KANDAPPU, Thivya
title Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing
title_short Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing
title_full Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing
title_fullStr Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing
title_full_unstemmed Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing
title_sort obfuscation at-source: privacy in context-aware mobile crowd-sourcing
publisher Institutional Knowledge at Singapore Management University
publishDate 2018
url https://ink.library.smu.edu.sg/sis_research/5428
https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=6431&context=sis_research
_version_ 1712305231302230016