Skip to main content

Connecting Human to Cyber-World: Security and Privacy Issues in Mobile Crowdsourcing Networks

  • Chapter
  • First Online:
Security and Privacy for Next-Generation Wireless Networks

Part of the book series: Wireless Networks ((WN))

Abstract

The mobile crowdsourcing network (MCN) is a rising network architecture that comprises both crowdsensing and crowdsourcing computing. It has attracted broad attention in the world because of its powerful ability to deal with increasingly hard problems. Compared to traditional network, it is more vulnerable to be attacked for its generous payment. At the same time, an amount of input data which comes from various sources is delivered among the service providers, end users and participants, and the involved sensitive information may be revealed during the transmission. Moreover, as the characteristics of MCNs, including task crowdsourcing, human involvement, dynamic topology and heterogeneity, both security and privacy issues are more challenging. In this chapter, we review the current MCN architecture and new challenges of security and privacy issues at first. Then, we present some proposed approaches for security assurance and privacy protection in MCNs from three aspects: authentication, reputation and incentive mechanisms. Finally, possible research directions of security and privacy issues in MCNs and plenty of related reference are given.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. M.-C. Yuen, I. King, and K.-S. Leung. (2012). A survey of crowdsourcing systems. In Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third International Conference on Social Computing (SocialCom), 2011 IEEE Third International Conference, pp. 766–773. Boston, MA, USA.

    Google Scholar 

  2. K. Yang, K. Zhang, J. Ren, and X. Shen. (2015). Security and privacy in mobile crowdsourcing networks: challenges and opportunities. IEEE Communications Magazine, vol. 53, pp. 75–81.

    Article  Google Scholar 

  3. P. Jollivet. (2011). Crowdsourced security, trust & cooperation for learning digital megacities: valuing social intangible assets for competitive advantage and harmonious development. In Smart and Sustainable City (ICSSC 2011), IET International Conference, pp. 1–4. Shanghai, China.

    Google Scholar 

  4. Y. Wang, Y. Huang, and C. Louis. (2013). Towards a framework for privacy-aware mobile crowdsourcing. In Social Computing (SocialCom), 2013 International Conference, pp. 454–459. Alexandria, VA, USA.

    Google Scholar 

  5. H. Kajino, H. Arai, and H. Kashima. (2014). Preserving worker privacy in crowdsourcing. Data Min Knowl Disc, vol. 28, no. 5C6, pp. 1314–1335.

    Article  MathSciNet  Google Scholar 

  6. T. Kandappu, A. Friedman, V. Sivaraman, and R. Boreli. (2015). Privacy in crowdsourced platforms. In Privacy in a Digital, Networked World, S. Zeadally and M. Badra, Eds. Springer International Publishing, pp. 57–84.

    Google Scholar 

  7. B. Zhang, C. H. Liu, J. Lu, Z. Song, Z. Ren, J. Ma, and W. Wang. (2016). Privacy-preserving QoI-aware participant coordination for mobile crowdsourcing. Computer Networks, pp. 29–41.

    Article  Google Scholar 

  8. S. Vaya. (2012). Robust reputation mechanisms for achieving fair compensation and quality assurance in crowdcomputing. In Social Informatics (SocialInformatics), 2012 International Conference, pp. 228–235. Lausanne, Switzerland.

    Google Scholar 

  9. J. Chang, P. Gebhard, A. Haeberlen, Z. Ives, I. Lee, O. Sokolsky, et al.(2013). TrustForge: Flexible access control for collaborative crowd-sourced environment. In Privacy, Security and Trust (PST), 2013 Eleventh Annual International Conference, pp. 291–300. Tarragona, Spain.

    Google Scholar 

  10. N. Nguyen. (2014). Microworkers crowdsourcing approach, challenges and solutions. In Proceedings of the 2014 International ACM Workshop on Crowdsourcing for Multimedia, pp. 1–1. Tarragona, Spain.

    Google Scholar 

  11. W. S. Lasecki, J. Teevan, and E. Kamar. (2014). Information extraction and manipulation threats in crowd-powered systems. In Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing, pp. 248–256. Baltimore, Maryland, USA.

    Google Scholar 

  12. X. Shen. (2015). Mobile crowdsourcing [Editor’s note]. IEEE Network, vol. 29, pp. 2–3.

    Article  Google Scholar 

  13. L. Cilliers and S. Flowerday.(2014). Information security in a public safety, participatory crowdsourcing smart city project. In Internet Security (WorldCIS), 2014 World Congress, pp. 36–41. London, UK.

    Book  Google Scholar 

  14. N. Haderer, V. Primault, P. Raveneau, C. Ribeiro, R. Rouvoy, and S. Ben Mokhtar. (2014). Towards a Practical Deployment of Privacy-preserving Crowd-sensing Tasks. In Proceedings of the Posters & Demos Session, pp. 43–44, New York, NY, USA.

    Google Scholar 

  15. R. K. Ganti, F. Ye, and H. Lei. (2011). Mobile crowdsensing: current state and future challenges. IEEE Communications Magazine, vol. 49, pp. 32–39.

    Article  Google Scholar 

  16. L. Zhang, X. Lu, P. Xiong, and T. Zhu. (2015). A differentially private method for reward-based spatial crowdsourcing. In Applications and Techniques in Information Security, ed: Springer, 2015, pp. 153–164.

    Article  Google Scholar 

  17. J. Hu, L. Huang, L. Li, M. Qi, and W. Yang. (2015). Protecting location privacy in spatial crowdsourcing. In Web Technologies and Applications, R. Cai, K. Chen, L. Hong, X. Yang, R. Zhang, and L. Zou, Eds. Springer International Publishing, pp. 113–124.

    Chapter  Google Scholar 

  18. P. Cheng, X. Lian, Z. Chen, R. Fu, L. Chen, J. Han, et al. (2015). Reliable diversity-based spatial crowdsourcing by moving workers. Proceedings of the VLDB Endowment, vol. 8, pp. 1022–1033.

    Article  Google Scholar 

  19. M. Hosseini, K. Phalp, J. Taylor, and R. Ali.(2014). The four pillars of crowdsourcing: A reference model. In Research Challenges in Information Science (RCIS), 2014 IEEE Eighth International Conference, pp. 1–12. Marrakech, Morocco.

    Google Scholar 

  20. H. To, L. Fan, L. Tran, and C. Shahabi. (2016). Real-time task assignment in hyper-local spatial crowdsourcing under budget constraints. Pervasive Computing and Communications (PerCom), 2016 IEEE International Conference, pp. 1–8. Sydney, NSW, Australia.

    Google Scholar 

  21. F. Fuchs-Kittowski, S. Simroth, S. Himberger, and F. Fischer. (2012). A content platform for smartphone-based mobile augmented reality. in EnviroInfo, pp. 403–411.

    Google Scholar 

  22. U. Meissen, D. Faust, and F. Fuchs-Kittowski. (2013). WIND-A meteorological early warning system and its extensions towards mobile services. in EnviroInfo, pp. 612–621.

    Google Scholar 

  23. A. Thiagarajan, L. Ravindranath, K. LaCurts, S. Madden, H. Balakrishnan, S. Toledo, et al. (2009). VTrack: accurate, energy-aware road traffic delay estimation using mobile phones. In Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems, pp. 85–98. New York, NY, USA.

    Book  Google Scholar 

  24. C. Laoudias, G. Constantinou, M. Constantinides, S. Nicolaou, D. Zeinalipour-Yazti, and C. G. Panayiotou. (2012). The airplace indoor positioning platform for android smartphones. In Mobile Data Management (MDM), 2012 IEEE 13th International Conference, pp. 312–315. Bengaluru, Karnataka, India.

    Google Scholar 

  25. E. Aubry, T. Silverston, A. Lahmadi, and O. Festor. (2014). CrowdOut: a mobile crowdsourcing service for road safety in digital cities. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 2014 IEEE International Conference, pp. 86–91. Budapest, Hungary.

    Google Scholar 

  26. C. Xu, S. Li, Y. Zhang, E. Miluzzo, and Y.-F. Chen. (2014). Crowdsensing the speaker count in the wild: implications and applications. IEEE Communications Magazine, vol. 52, pp. 92–99.

    Article  Google Scholar 

  27. H. M. V. Go, J. C. B. Pabico, J. D. Caro, and M. L. Tee. (2015). Crowdsourcing for healthcare resource allocation. In Information, Intelligence, Systems and Applications (IISA), 2015 6th International Conference, pp. 1–6. Corfu, Greece.

    Google Scholar 

  28. J. P. Bigham, C. Jayant, H. Ji, G. Little, A. Miller, R. C. Miller, et al. (2010). VizWiz: nearly real-time answers to visual questions. In Proceedings of the 23nd annual ACM symposium on User interface software and technology, pp. 333–342. New York, NY, USA.

    Google Scholar 

  29. W. S. Lasecki, P. Thiha, Y. Zhong, E. Brady, and J. P. Bigham. (2013). Answering visual questions with conversational crowd assistants. In Proceedings of the 15th International ACM SIGACCESS Conference on Computers and Accessibility, p. 18. Bellevue, Washington.

    Google Scholar 

  30. W. Lasecki, C. Miller, A. Sadilek, A. Abumoussa, D. Borrello, R. Kushalnagar, et al. (2012). Real-time captioning by groups of non-experts. In Proceedings of the 25th annual ACM symposium on User interface software and technology, pp. 23–34. Cambridge, Massachusetts, USA.

    Book  Google Scholar 

  31. M.-C. Yuen, I. King, and K.-S. Leung. (2011). A survey of crowdsourcing systems. In Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom), 2011 IEEE Third International Conference, pp. 766–773. Boston, MA, USA.

    Book  Google Scholar 

  32. W. S. Lasecki, Y. C. Song, H. Kautz, and J. P. Bigham. (2013). Real-time crowd labeling for deployable activity recognition. In Proceedings of the 2013 conference on Computer supported cooperative work, pp. 1203–1212. San Antonio, Texas, USA.

    Google Scholar 

  33. J. Deng, J. Krause, and L. Fei-Fei. (2013). Fine-grained crowdsourcing for fine-grained recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 580–587. Portland, OR, USA.

    Google Scholar 

  34. O. F. Zaidan and C. Callison-Burch. (2011). Crowdsourcing translation: Professional quality from non-professionals. In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies, vol. 1, pp. 1220–1229. Stroudsburg, PA, USA.

    Google Scholar 

  35. X. Chen, P. N. Bennett, K. Collins-Thompson, and E. Horvitz. (2013). Pairwise ranking aggregation in a crowdsourced setting. In Proceedings of the sixth ACM international conference on Web search and data mining, pp. 193–202. Rome, Italy.

    Google Scholar 

  36. L. R. Varshney. (2012). Privacy and reliability in crowdsourcing service delivery. In SRII Global Conference (SRII), 2012 Annual, pp. 55–60. San Jose, CA, USA.

    Book  Google Scholar 

  37. H. Kajino, H. Arai, and H. Kashima. (2014). Preserving worker privacy in crowdsourcing. Data Mining and Knowledge Discovery, vol. 28, pp. 1314–1335.

    Article  MathSciNet  Google Scholar 

  38. A. Xu, X. Feng, and Y. Tian. (2015). Revealing, characterizing, and detecting crowdsourcing spammers: A case study in community Q&A. In Computer Communications (INFOCOM), 2015 IEEE Conference on, pp. 2533–2541. Kowloon, Hong Kong.

    Google Scholar 

  39. ZhuBaJie.com. Available: http://www.zhubajie.com/

  40. D.-k. Kim, M. Motoyama, G. M. Voelker, and L. K. Saul. (2011). Topic modeling of freelance job postings to monitor web service abuse. In Proceedings of the 4th ACM workshop on Security and artificial intelligence, pp. 11–20. Chicago, Illinois, USA.

    Book  Google Scholar 

  41. C. Fu, Z. Shaobin, S. Guangjun, and G. Mengyuan. (2014). Crowdsourcing leakage of personally identifiable information via sina Microblog. In Internet of VehiclesCTechnologies and Services, ed: Springer, 2014, pp. 262–271.

    Google Scholar 

  42. I. Ben Amor, M. Ouziri, S. Sahri, and N. Karam. (2014). Be a collaborator and a competitor in crowdsourcing system. In Modelling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS), 2014 IEEE 22nd International Symposium on, pp. 158–167. Paris, France.

    Google Scholar 

  43. R. W. Ouyang, M. Srivastava, A. Toniolo, and T. J. Norman. (2014). Truth discovery in crowdsourced detection of spatial events. In Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, pp. 461–470. Shanghai, China.

    Google Scholar 

  44. K. Ahmed, S. Ren, V. Turnewitsch, and A. V. Vasilakos. (2013). Credibility optimization and power control for secure mobile crowdsourcing. In Communication, Control, and Computing (Allerton), 2013 51st Annual Allerton Conference, pp. 1501–1508. Monticello, IL, USA.

    Google Scholar 

  45. L. P. Cox. (2011). Truth in crowdsourcing. Security & Privacy, IEEE, vol. 9, pp. 74–76.

    Article  Google Scholar 

  46. C. G. Harris and P. Srinivasan. (2013). Crowdsourcing and ethics. In Security and Privacy in Social Networks, ed: Springer, 2013, pp. 67–83.

    Article  Google Scholar 

  47. A. Basu, J. Vaidya, J. C. Corena, S. Kiyomoto, S. Marsh, G. Guo, J. Zhang, and Y. Miyake. (2014). Opinions of People: Factoring in Privacy and Trust. SIGAPP Appl. Comput. Rev., vol. 14, no. 3, pp. 7–21.

    Article  Google Scholar 

  48. E. Toch. (2014). Crowdsourcing privacy preferences in context-aware applications. Personal Ubiquitous Comput., vol. 18, no. 1, pp. 129–141.

    Article  Google Scholar 

  49. A. R. Beresford and F. Stajano. (2003). Location privacy in pervasive computing. IEEE Pervasive computing, vol. 2, no. 1, pp. 46–55.

    Article  Google Scholar 

  50. E. Kaasinen. (2003). User needs for location-aware mobile services. Personal and ubiquitous computing, vol. 7, no. 1, pp. 70–79.

    Article  Google Scholar 

  51. J. B. Abdo, J. Demerjian, H. Chaouchi, T. Atechian, and C. Bassil. (2015). Privacy using mobile cloud computing. In Digital Information and Communication Technology and its Applications (DICTAP), 2015 Fifth International Conference, pp. 178–182. Beirut, Lebanon.

    Google Scholar 

  52. J. Krumm. (2009). A survey of computational location privacy. Personal and Ubiquitous Computing, vol. 13, pp. 391–399.

    Article  Google Scholar 

  53. I. B. Amor, S. Benbernou, M. Ouziri, M. Nadif, and A. Bouguettaya. (2013). Data leak aware crowdsourcing in social network. In Web Information Systems Engineering-WISE 2011 and 2012 Workshops, A. Haller, G. Huang, Z. Huang, H. Paik, and Q. Z. Sheng, Eds. Springer Berlin Heidelberg, 2013, pp. 226–236.

    Google Scholar 

  54. S. S. Kanhere. (2011). Participatory sensing: Crowdsourcing data from mobile smartphones in urban spaces. In Mobile Data Management (MDM), 2011 12th IEEE International Conference, pp. 3–6. Lulea, Sweden.

    Google Scholar 

  55. W. Enck, P. Gilbert, S. Han, V. Tendulkar, B.-G. Chun, L. P. Cox, et al. (2014). TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Transactions on Computer Systems (TOCS), vol. 32, p. 5.

    Article  Google Scholar 

  56. T. Kandappu, V. Sivaraman, A. Friedman, and R. Boreli. (2014). Loki: a privacy-conscious platform for crowdsourced surveys. In Communication Systems and Networks (COMSNETS), 2014 Sixth International Conference, pp. 1–8. Bangalore, India.

    Google Scholar 

  57. S. Wang, L. Huang, M. Tian, W. Yang, H. Xu, and H. Guo. (2015). Personalized privacy-preserving data aggregation for histogram estimation. In 2015 IEEE Global Communications Conference (GLOBECOM), pp. 1–6. San Diego, CA, USA.

    Google Scholar 

  58. J. Mineraud, F. Lancerin, S. Balasubramaniam, M. Conti, and S. Tarkoma. (2015). You are AIRing too much: Assessing the privacy of users in crowdsourcing environmental data. In Trustcom/BigDataSE/ISPA, 2015 IEEE, pp. 523–530. Helsinki, Finland.

    Google Scholar 

  59. Y. Gong, Y. Guo, and Y. Fang. (2014). A privacy-preserving task recommendation framework for mobile crowdsourcing. In Global Communications Conference (GLOBECOM), 2014 IEEE, pp. 588–593. Austin, TX, USA.

    Book  Google Scholar 

  60. Y. Gong, L. Wei, Y. Guo, C. Zhang, and Y. Fang. (2016). Optimal task recommendation for mobile crowdsourcing with privacy control. IEEE Internet of Things Journal, vol. 3, no. 5.

    Google Scholar 

  61. Y. Shen, L. Huang, L. Li, X. Lu, S. Wang, and W. Yang. (2015). Towards preserving worker location privacy in spatial crowdsourcing. In 2015 IEEE Global Communications Conference (GLOBECOM), pp. 1–6. San Diego, CA, USA.

    Google Scholar 

  62. S. Choi, G. Ghinita, and E. Bertino. (2014). Secure mutual proximity zone enclosure evaluation. In Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, pp. 133–142. Dallas, Texas.

    Google Scholar 

  63. A. Dua, N. Bulusu, W.-C. Feng, and W. Hu. (2009). Towards trustworthy participatory sensing. In Proceedings of the 4th USENIX conference on Hot topics in security, pp. 8–8. Montreal, Canada.

    Google Scholar 

  64. L. R. Varshney, A. Vempaty, and P. K. Varshney. (2014). Assuring privacy and reliability in crowdsourcing with coding. In Information Theory and Applications Workshop (ITA), pp. 1–6. San Diego, CA, USA.

    Google Scholar 

  65. R. Liu, J. Cao, L. Yang, and K. Zhang. (2015). PriWe: recommendation for privacy settings of mobile Apps based on crowdsourced users’ expectations. In Mobile Services (MS), 2015 IEEE International Conference, pp. 150–157. New York, NY, USA.

    Google Scholar 

  66. Y.-A. Sun, S. Roy, and G. Little. (2011).Beyond independent agreement: A tournament selection approach for quality assurance of human computation tasks. Human Computation, vol. 11, p. 11.

    Google Scholar 

  67. N. Kokkalis, T. Kohn, C. Pfeiffer, D. Chornyi, M. S. Bernstein, and S. R. Klemmer. (2013). EmailValet: managing email overload through private, accountable crowdsourcing. In Proceedings of the 2013 conference on Computer supported cooperative work, pp. 1291–1300. San Antonio, Texas, USA.

    Google Scholar 

  68. W. Li, S. A. Seshia, and S. Jha. (2012). CrowdMine: towards crowdsourced human-assisted verification. In Proceedings of the 49th Annual Design Automation Conference, pp. 1254–1255. San Francisco, CA, USA.

    Book  Google Scholar 

  69. J. Sun and H. Ma. (2014). Privacy-preserving verifiable incentive mechanism for online crowdsourcing markets. In Computer Communication and Networks (ICCCN), 2014 23rd International Conference, pp. 1–8. Shanghai, China.

    Google Scholar 

  70. W. Mason and D. J. Watts. (2010). Financial incentives and the performance of crowds. ACM SigKDD Explorations Newsletter, vol. 11, pp. 100–108.

    Article  Google Scholar 

  71. J.-S. Lee and B. Ho. (2010). Sell your experiences: a market mechanism based incentive for participatory sensing. In Pervasive Computing and Communications (PerCom), 2010 IEEE International Conference, pp. 60–68. Mannheim, Germany.

    Google Scholar 

  72. L. G. Jaimes, I. Vergara-Laurens, and M. A. Labrador. (2012). A location-based incentive mechanism for participatory sensing systems with budget constraints. In Pervasive Computing and Communications (PerCom), 2012 IEEE International Conference, pp. 103–108. Lugano, Switzerland.

    Google Scholar 

  73. A. J. Mashhadi, S. B. Mokhtar, and L. Capra. (2012). Fair content dissemination in participatory DTNs. Ad Hoc Networks, vol. 10, pp. 1633–1645.

    Article  Google Scholar 

  74. X. Wang, W. Cheng, P. Mohapatra, and T. Abdelzaher. (2013). Artsense: Anonymous reputation and trust in participatory sensing. In INFOCOM, 2013 Proceedings IEEE, pp. 2517–2525. Turin, Italy.

    Google Scholar 

  75. C.-J. Ho, Y. Zhang, J. Vaughan, and M. Van Der Schaar. (2012). Towards social norm design for crowdsourcing markets. In Twenty-Sixth AAAI Conference on Artificial Intelligence.

    Google Scholar 

  76. D. Yang, G. Xue, X. Fang, and J. Tang. (2012). Crowdsourcing to smartphones: incentive mechanism design for mobile phone sensing. In Proceedings of the 18th annual international conference on mobile computing and networking, pp. 173–184. Istanbul, Turkey.

    Google Scholar 

  77. Z. Feng, Y. Zhu, Q. Zhang, L. M. Ni, and A. V. Vasilakos. (2014).TRAC: Truthful auction for location-aware collaborative sensing in mobile crowdsourcing. In INFOCOM, 2014 Proceedings IEEE, pp. 1231–1239. Toronto, ON, Canada.

    Google Scholar 

  78. D. Zhao, X.-Y. Li, and H. Ma. (2014). How to crowdsource tasks truthfully without sacrificing utility: Online incentive mechanisms with budget constraint. In INFOCOM, 2014 Proceedings, pp. 1213–1221. Toronto, ON, Canada.

    Google Scholar 

  79. A. Singla, and A. Krause. (2013). Truthful incentives in crowdsourcing tasks using regret minimization mechanisms. In Proceedings of the 22nd international conference on World Wide Web, pp. 1167–1178. Rio de Janeiro, Brazil.

    Book  Google Scholar 

  80. Y. Fan, H. Sun, Y. Zhu, X. Liu, and J. Yuan. (2015). A truthful online auction for tempo-spatial crowdsourcing tasks. In Service-Oriented System Engineering (SOSE), 2015 IEEE Symposium on, pp. 332–338. San Francisco Bay, CA, USA.

    Google Scholar 

  81. C.-C. Wu, K.-T. Chen, Y.-C. Chang, and C.-L. Lei. (2013). Crowdsourcing multimedia QoE evaluation: A trusted framework. IEEE Transactions on Multimedia, vol. 15, pp. 1121–1137.

    Article  Google Scholar 

  82. T. Tian, J. Zhu, F. Xia, X. Zhuang, and T. Zhang. (2015). Crowd fraud detection in internet advertising. In Proceedings of the 24th International Conference on World Wide Web, pp. 1100–1110.

    Chapter  Google Scholar 

  83. Y. Zhang and M. Van der Schaar. (2012). Reputation-based incentive protocols in crowdsourcing applications. In INFOCOM, 2012 Proceedings IEEE, pp. 2140–2148. Orlando, FL, USA.

    Google Scholar 

  84. H. Yu, Z. Shen, C. Miao, and B. An. (2012). Challenges and opportunities for trust management in crowdsourcing. In Proceedings of the The 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology, vol. 2, pp. 486–493.

    Article  Google Scholar 

  85. K. LeFevre, D. J. DeWitt, and R. Ramakrishnan. (2005). Incognito: Efficient full-domain k-anonymity. In Proceedings of the 2005 ACM SIGMOD international conference on Management of data, pp. 49–60.

    Google Scholar 

  86. S. Wu, X. Wang, S. Wang, Z. Zhang, and A. K. Tung. (2014). K-anonymity for crowdsourcing database. IEEE Transactions on Knowledge and Data Engineering, vol. 26, pp. 2207–2221.

    Article  Google Scholar 

  87. Y. He, L. Sun, Z. Li, H. Li, and X. Cheng. (2014). An optimal privacy-preserving mechanism for crowdsourced traffic monitoring. In Proceedings of the 10th ACM international workshop on Foundations of mobile computing, pp. 11–18.

    Google Scholar 

  88. J. Sun, R. Zhang, X. Jin, and Y. Zhang. (2016). SecureFind: Secure and privacy-preserving object finding via mobile crowdsourcing. IEEE Transactions on Wireless Communications, vol. 15, no. 3, pp. 1716–1728.

    Article  Google Scholar 

  89. X. Chen, X. Wu, X.-Y. Li, X. Ji, Y. He, and Y. Liu. (2016). Privacy-aware high-quality map generation with participatory sensing. IEEE Transactions on Mobile Computing, vol. 15, no. 3, pp. 719–732.

    Article  Google Scholar 

  90. X. Chen, X. Wu, X.-Y. Li, Y. He, and Y. Liu. (2014). Privacy-preserving high-quality map generation with participatory sensing. In INFOCOM, 2014 Proceedings IEEE, pp. 2310–2318. Toronto, ON, Canada.

    Book  Google Scholar 

  91. X. Wu, P. Yang, S. Tang, X. Zheng, and Y. Xiong. (2015). Privacy preserving RSS map generation for a crowdsensing network. IEEE Wireless Communications, vol. 22, pp. 42–48.

    Article  Google Scholar 

  92. H. To, G. Ghinita, and C. Shahabi. (2014). A framework for protecting worker location privacy in spatial crowdsourcing. Proceedings of the VLDB Endowment, vol. 7, no. 10, pp. 919–930.

    Article  Google Scholar 

  93. M. Gruteser and D. Grunwald. (2003). Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the 1st international conference on Mobile systems, applications and services, pp. 31–42. San Francisco, California.

    Book  Google Scholar 

  94. G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan. (2008). Private queries in location based services: anonymizers are not necessary. In Proceedings of the 2008 ACM SIGMOD international conference on Management of data, pp. 121–132. Vancouver, Canada.

    Google Scholar 

  95. M. F. Mokbel, C.-Y. Chow, and W. G. Aref. (2006). The new Casper: query processing for location services without compromising privacy. In Proceedings of the 32nd international conference on Very large data bases, pp. 763–774. Seoul, Korea.

    Google Scholar 

  96. Z. Zhang, J. Han, J. Deng, X. Xu, F. Ringeval, and B. Schuller. (2018). Leveraging unlabeled data for emotion recognition with enhanced collaborative semi-supervised learning. IEEE Access, vol. 6, pp. 22196–22209.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Zhong, S. et al. (2019). Connecting Human to Cyber-World: Security and Privacy Issues in Mobile Crowdsourcing Networks. In: Security and Privacy for Next-Generation Wireless Networks. Wireless Networks. Springer, Cham. https://doi.org/10.1007/978-3-030-01150-5_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-01150-5_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-01149-9

  • Online ISBN: 978-3-030-01150-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics