Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing
By e!ectively reaching out to and engaging larger population of mobile users, mobile crowd-sourcing has become a strategy to perform large amount of urban tasks. The recent empirical studies have shown that compared to the pull-based approach, which expects the users to browse through the list of ta...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2018
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/5428 https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=6431&context=sis_research |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-6431 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-64312020-12-11T06:19:55Z Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing KANDAPPU, Thivya MISRA, Archan CHENG, Shih-Fen TANDRIANSYAH, Randy LAU, Hoong Chuin By e!ectively reaching out to and engaging larger population of mobile users, mobile crowd-sourcing has become a strategy to perform large amount of urban tasks. The recent empirical studies have shown that compared to the pull-based approach, which expects the users to browse through the list of tasks to perform, the push-based approach that actively recommends tasks can greatly improve the overall system performance. As the e"ciency of the push-based approach is achieved by incorporating worker’s mobility traces, privacy is naturally a concern. In this paper, we propose a novel, 2-stage and usercontrolled obfuscation technique that provides a tradeo!-amenable framework that caters to multi-attribute privacy measures (considering the per-user sensitivity and global uniqueness of locations). We demonstrate the e!ectiveness of our approach by testing it using the real-world data collected from the well-established TA$Ker platform. More speci#cally, we show that one can increase its location entropy by 23% with only modest changes to the real trajectories while imposing an additional 24% ( 2018-03-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/5428 https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=6431&context=sis_research http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Privacy Mobile Crowd-sourcing platforms obfuscation trajectory context-aware Social and Behavioral Sciences |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Privacy Mobile Crowd-sourcing platforms obfuscation trajectory context-aware Social and Behavioral Sciences |
spellingShingle |
Privacy Mobile Crowd-sourcing platforms obfuscation trajectory context-aware Social and Behavioral Sciences KANDAPPU, Thivya MISRA, Archan CHENG, Shih-Fen TANDRIANSYAH, Randy LAU, Hoong Chuin Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing |
description |
By e!ectively reaching out to and engaging larger population of mobile users, mobile crowd-sourcing has become a strategy to perform large amount of urban tasks. The recent empirical studies have shown that compared to the pull-based approach, which expects the users to browse through the list of tasks to perform, the push-based approach that actively recommends tasks can greatly improve the overall system performance. As the e"ciency of the push-based approach is achieved by incorporating worker’s mobility traces, privacy is naturally a concern. In this paper, we propose a novel, 2-stage and usercontrolled obfuscation technique that provides a tradeo!-amenable framework that caters to multi-attribute privacy measures (considering the per-user sensitivity and global uniqueness of locations). We demonstrate the e!ectiveness of our approach by testing it using the real-world data collected from the well-established TA$Ker platform. More speci#cally, we show that one can increase its location entropy by 23% with only modest changes to the real trajectories while imposing an additional 24% ( |
format |
text |
author |
KANDAPPU, Thivya MISRA, Archan CHENG, Shih-Fen TANDRIANSYAH, Randy LAU, Hoong Chuin |
author_facet |
KANDAPPU, Thivya MISRA, Archan CHENG, Shih-Fen TANDRIANSYAH, Randy LAU, Hoong Chuin |
author_sort |
KANDAPPU, Thivya |
title |
Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing |
title_short |
Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing |
title_full |
Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing |
title_fullStr |
Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing |
title_full_unstemmed |
Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing |
title_sort |
obfuscation at-source: privacy in context-aware mobile crowd-sourcing |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2018 |
url |
https://ink.library.smu.edu.sg/sis_research/5428 https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=6431&context=sis_research |
_version_ |
1712305231302230016 |