Worker’s Privacy Protection in Mobile Crowdsourcing Platform

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 782)


The massive increase in smartphone devices capabilities have led to the development of mobile crowdsourcing applications (MCS). Many participants (individual workers) participates in performing different tasks, collecting data and sharing their work in a wide range of application areas. One of the most important issues in MCS applications is the privacy preservation for the participants, such as their identity and location. Most of the existing techniques and algorithms to protect the privacy of the participants focused on the identity or location as individual issues. However, in our research, we will implement an algorithm for protecting both the identity and location using RSA blind signature scheme to increase the privacy protection for the participants without using trusted third party. We demonstrated the efficiency of our approach to achieve the best performance in terms of reducing the communication overhead. Additionally, we approved our approach effectiveness in dealing with several attacks.


Privacy preservation Mobile crowdsourcing Worker identity Privacy 



This scientific paper contains studies and research results supported by King Abdulaziz City for Science and Technology, grant No. 1-17-00-009-0029.


  1. 1.
    Gong, Y., Wei, L., Guo, Y., Zhang, C., Fang, Y.: Optimal task recommendation for mobile crowdsourcing with privacy control. IEEE Internet Things J. 3(5), 745–756 (2016)CrossRefGoogle Scholar
  2. 2.
    Karnin, E.D., Walach, E., Drory, T.: Crowdsourcing in the document processing practice. In: Daniel, F., Facca, F.M. (eds.) Current Trends in Web Engineering, pp. 408–411. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  3. 3.
    Wang, Y., Jia, X., Jin, Q., Ma, J.: Mobile crowdsourcing: architecture, applications, and challenges. In: 2015 IEEE 12th International Conference on Ubiquitous Intelligence and Computing and 2015 IEEE 12th International Conference on Autonomic and Trusted Computing and 2015 IEEE 15th International Conference on Scalable Computing and Communications and its Associated Workshops (UIC-ATC-ScalCom), pp. 1127–1132 (2015)Google Scholar
  4. 4.
    Kandappu, T., Sivaraman, V., Friedman, A., Boreli, R.: Loki: A privacy-conscious platform for crowdsourced surveys. In: 2014 Sixth International Conference on Communication Systems and Networks (COMSNETS), pp. 1–8 (2014)Google Scholar
  5. 5.
    Cristofaro, E.D., Soriente, C.: Participatory privacy: Enabling privacy in participatory sensing. IEEE Netw. 27(1), 32–36 (2013)CrossRefGoogle Scholar
  6. 6.
    Wang, Y., Cai, Z., Yin, G., Gao, Y., Tong, X., Wu, G.: An incentive mechanism with privacy protection in mobile crowdsourcing systems. Comput. Netw. 102, 157–171 (2016)CrossRefGoogle Scholar
  7. 7.
    Kuppuswamy, P., Al-Khalidi, S.Q.Y.: Secured blinding signature protocol based on linear block public key algorithm. Int. J. Comput. Appl. 61(14), 14–17 (2013)Google Scholar
  8. 8.
    Shin, M., Cornelius, C., Kapadia, A., Triandopoulos, N., Kotz, D.: Location privacy for mobile crowd sensing through population mapping. Sensors 15(7), 15285–15310 (2015)CrossRefGoogle Scholar
  9. 9.
    Wang, X., Cheng, W., Mohapatra, P., Abdelzaher, T.: Enabling reputation and trust in privacy-preserving mobile sensing. IEEE Trans. Mob. Comput. 13(12), 2777–2790 (2014)CrossRefGoogle Scholar
  10. 10.
    Gao, S., Ma, J., Shi, W., Zhan, G., Sun, C.: TrPF: a trajectory privacy-preserving framework for participatory sensing. IEEE Trans. Inf. Forensics Secur. 8(6), 874–887 (2013)CrossRefGoogle Scholar
  11. 11.
    Boutsis, I., Kalogeraki, V.: Location privacy for crowdsourcing applications. In: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, New York, NY, USA, pp. 694–705 (2016)Google Scholar
  12. 12.
    Ni, J., Zhang, K., Lin, X., Xia, Q., Shen, X.S.: Privacy-preserving mobile crowdsensing for located-based applications. In: 2017 IEEE International Conference on Communications (ICC), pp. 1–6 (2017)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahSaudi Arabia

Personalised recommendations