Skip to main content
Erschienen in: The Journal of Supercomputing 12/2018

23.07.2018

Privacy-aware task data management using TPR*-Tree for trajectory-based crowdsourcing

verfasst von: Yan Li, Byeong-Seok Shin

Erschienen in: The Journal of Supercomputing | Ausgabe 12/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Spatial crowdsourcing is a promising architecture for collecting various types of data online with the aid of participants’ powerful mobile devices. However, it is also associated with certain privacy and security issues, which can reduce the quality of the crowdsourcing service. Some crowd tasks require the collection of connected data points. When a location-anonymous method is employed to ensure the privacy of location data points, the location trajectory data may become meaningless. To solve the privacy problem for trajectory data in large-scale crowdsourcing systems, we proposed a spatial task management method for privacy-preserving trajectory-based crowdsourcing, using a 3DES encryption and compressive-sensing-based trajectory data decryption method which is called DES-TraVec (3DES-based trajectory vector) cryptography algorithm. To provide a real-time crowdsourcing service, we proposed the use of an extended TPR*-Tree to bulk load the crowdsourcing results and manage the benders service requests so that the proposed method could support participants’ privacy and ensure quick answers for crowdsourcing services. The experimental results demonstrated that the proposed method is efficient in preserving trajectory-based crowdsourcing data and is faster than the current method.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Han Y-H, Lim H-K, Gil J-M (2017) Hierarchical location caching scheme for mobile object tracking in the internet of things. J Inf Process Syst 13(5):1410–1429 Han Y-H, Lim H-K, Gil J-M (2017) Hierarchical location caching scheme for mobile object tracking in the internet of things. J Inf Process Syst 13(5):1410–1429
2.
Zurück zum Zitat Kim J-J (2017) Spatio-temporal sensor data processing techniques. J Inf Process Syst 13(5):1259–1276 Kim J-J (2017) Spatio-temporal sensor data processing techniques. J Inf Process Syst 13(5):1259–1276
3.
Zurück zum Zitat To H, Asghari M, Deng D, Shahabi C (2016) SCAWG: a toolbox for generating synthetic workload for spatial crowdsourcing. In: Proceedings of International Workshop on Benchmarks for Ubiquitous Crowdsourcing: Metrics, Methodologies, and Datasets To H, Asghari M, Deng D, Shahabi C (2016) SCAWG: a toolbox for generating synthetic workload for spatial crowdsourcing. In: Proceedings of International Workshop on Benchmarks for Ubiquitous Crowdsourcing: Metrics, Methodologies, and Datasets
4.
Zurück zum Zitat Vanus J et al (2017) Monitoring of the daily living activities in smart home care. Hum Centric Comput Inf Sci 7(1):30CrossRef Vanus J et al (2017) Monitoring of the daily living activities in smart home care. Hum Centric Comput Inf Sci 7(1):30CrossRef
5.
Zurück zum Zitat Xiao F et al (2018) An information-aware visualization for privacy-preserving accelerometer data sharing. Hum Centric Comput Inf Sci 8(1):13CrossRef Xiao F et al (2018) An information-aware visualization for privacy-preserving accelerometer data sharing. Hum Centric Comput Inf Sci 8(1):13CrossRef
6.
Zurück zum Zitat Tao Y, Papadias D, Sun J (2003) The TPR*-tree: an optimized spatio-temporal access method for predictive queries. In: International Conference on Very Large Data Bases. VLDB Endowment, pp 790–801 Tao Y, Papadias D, Sun J (2003) The TPR*-tree: an optimized spatio-temporal access method for predictive queries. In: International Conference on Very Large Data Bases. VLDB Endowment, pp 790–801
7.
Zurück zum Zitat Perez AJ, Zeadally S, Jabeur N (2018) Security and privacy in ubiquitous sensor networks. J Inf Process Syst 14(2):268–308 Perez AJ, Zeadally S, Jabeur N (2018) Security and privacy in ubiquitous sensor networks. J Inf Process Syst 14(2):268–308
8.
Zurück zum Zitat Kazemi L, Shahabi C (2012) Geocrowd: enabling query answering with spatial crowdsourcing. In: Proceedings of the 20th International Conference on Advances in Geographic Information Systems. ACM Kazemi L, Shahabi C (2012) Geocrowd: enabling query answering with spatial crowdsourcing. In: Proceedings of the 20th International Conference on Advances in Geographic Information Systems. ACM
9.
Zurück zum Zitat Van BN, Lee S, Kwon K (2017) Selective encryption algorithm using hybrid transform for GIS vector map. J Inf Process Syst 13(1):68–82 Van BN, Lee S, Kwon K (2017) Selective encryption algorithm using hybrid transform for GIS vector map. J Inf Process Syst 13(1):68–82
10.
Zurück zum Zitat Kong L, He L, Liu X Y et al (2015) Privacy-preserving compressive sensing for crowdsensing based trajectory recovery IEEE. In: International Conference on Distributed Computing Systems. IEEE, pp 31–40 Kong L, He L, Liu X Y et al (2015) Privacy-preserving compressive sensing for crowdsensing based trajectory recovery IEEE. In: International Conference on Distributed Computing Systems. IEEE, pp 31–40
12.
Zurück zum Zitat Hao F, Park D-S, Pei Z (2018) When social computing meets soft computing: opportunities and insights. Hum Centric Comput Inf Sci 8(8):1–18 Hao F, Park D-S, Pei Z (2018) When social computing meets soft computing: opportunities and insights. Hum Centric Comput Inf Sci 8(8):1–18
13.
Zurück zum Zitat Arthur J, Azadegan S (2005) Spring framework for rapid open source J2EE web application development: a case study. In: Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, and First ACIS International Workshop on Self-Assembling Wireless Networks, SNPD/SAWN 2005. IEEE Arthur J, Azadegan S (2005) Spring framework for rapid open source J2EE web application development: a case study. In: Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, and First ACIS International Workshop on Self-Assembling Wireless Networks, SNPD/SAWN 2005. IEEE
14.
Zurück zum Zitat Jain N, Mangal P, Mehta D (2015) AngularJS: a modern MVC framework in JavaScript. J Glob Res Comput Sci 5(12):17–23 Jain N, Mangal P, Mehta D (2015) AngularJS: a modern MVC framework in JavaScript. J Glob Res Comput Sci 5(12):17–23
15.
Zurück zum Zitat To H, Ghinita G, Shahabi C (2014) A framework for protecting worker location privacy in spatial crowdsourcing. Proc VLDB Endow 7(10):919–930CrossRef To H, Ghinita G, Shahabi C (2014) A framework for protecting worker location privacy in spatial crowdsourcing. Proc VLDB Endow 7(10):919–930CrossRef
16.
Zurück zum Zitat Li Y, Yiu ML, Xu W (2015) Oriented online route recommendation for spatial crowdsourcing task workers. LNCS 9239:137–156MathSciNet Li Y, Yiu ML, Xu W (2015) Oriented online route recommendation for spatial crowdsourcing task workers. LNCS 9239:137–156MathSciNet
17.
Zurück zum Zitat Lee C, Lee S, Li Y, Shin B-S (2016) Design and Implementation of spatial crowdsourcing platform for geospatial knowledge acquisition and dissemination. J Korean Inst Next Gen Comput 12(3):61–74 Lee C, Lee S, Li Y, Shin B-S (2016) Design and Implementation of spatial crowdsourcing platform for geospatial knowledge acquisition and dissemination. J Korean Inst Next Gen Comput 12(3):61–74
18.
Zurück zum Zitat Pournajaf L et al (2014) Spatial task assignment for crowd sensing with cloaked locations. In: IEEE 15th International Conference on Mobile Data Management (MDM), vol 1. IEEE Pournajaf L et al (2014) Spatial task assignment for crowd sensing with cloaked locations. In: IEEE 15th International Conference on Mobile Data Management (MDM), vol 1. IEEE
19.
Zurück zum Zitat Manly BFJ (2006) Randomization, bootstrap and Monte Carlo methods in biology, vol 70. CRC Press, Boca RatonMATH Manly BFJ (2006) Randomization, bootstrap and Monte Carlo methods in biology, vol 70. CRC Press, Boca RatonMATH
20.
Zurück zum Zitat Santiago A (2015) The book of OpenLayers 3. Theory and practice. Leanpub, Victoria, BC Google Scholar Santiago A (2015) The book of OpenLayers 3. Theory and practice. Leanpub, Victoria, BC Google Scholar
21.
Zurück zum Zitat Huang KL, Kanhere SS, Wen H (2009) Towards privacy-sensitive participatory sensing. In: IEEE International Conference on Pervasive Computing and Communications, PerCom 2009. IEEE, pp 1–6 Huang KL, Kanhere SS, Wen H (2009) Towards privacy-sensitive participatory sensing. In: IEEE International Conference on Pervasive Computing and Communications, PerCom 2009. IEEE, pp 1–6
22.
Zurück zum Zitat Liu B et al (2017) Protecting location privacy in spatial crowdsourcing using encrypted data. In: EDBT Liu B et al (2017) Protecting location privacy in spatial crowdsourcing using encrypted data. In: EDBT
23.
Zurück zum Zitat To H, Ghinita G, Shahabi C (2015) PrivGeoCrowd: a toolbox for studying private spatial crowdsourcing. In: IEEE 31st International Conference on Data Engineering, pp 1404–1407 To H, Ghinita G, Shahabi C (2015) PrivGeoCrowd: a toolbox for studying private spatial crowdsourcing. In: IEEE 31st International Conference on Data Engineering, pp 1404–1407
24.
Zurück zum Zitat Yang K et al (2015) Security and privacy in mobile crowdsourcing networks: challenges and opportunities. IEEE Commun Mag 53(8):75–81CrossRef Yang K et al (2015) Security and privacy in mobile crowdsourcing networks: challenges and opportunities. IEEE Commun Mag 53(8):75–81CrossRef
25.
Zurück zum Zitat To H, Shahabi C (2015) A server assigned spatial crowdsourcing framework. ACM Trans Spat Algorithms Syst 1(1):2 To H, Shahabi C (2015) A server assigned spatial crowdsourcing framework. ACM Trans Spat Algorithms Syst 1(1):2
26.
Zurück zum Zitat Wernke M et al (2014) A classification of location privacy attacks and approaches. Pers Ubiquit Comput 18(1):163–175CrossRef Wernke M et al (2014) A classification of location privacy attacks and approaches. Pers Ubiquit Comput 18(1):163–175CrossRef
27.
Zurück zum Zitat Wang H et al (2010) Index-based selective audio encryption for wireless multimedia sensor networks. IEEE Trans Multimed 12(3):215–223CrossRef Wang H et al (2010) Index-based selective audio encryption for wireless multimedia sensor networks. IEEE Trans Multimed 12(3):215–223CrossRef
28.
Zurück zum Zitat Guha S, Jain M, Padmanabhan VN (2012) Koi: a location-privacy platform for smartphone apps. In: Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation. USENIX Association Guha S, Jain M, Padmanabhan VN (2012) Koi: a location-privacy platform for smartphone apps. In: Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation. USENIX Association
29.
Zurück zum Zitat Chen C et al (2012) Fused matrix factorization with geographical and social influence in location-based social networks. In: Aaai, vol 12 Chen C et al (2012) Fused matrix factorization with geographical and social influence in location-based social networks. In: Aaai, vol 12
30.
Zurück zum Zitat Candes EJ, Plan Y (2010) Matrix completion with noise. Proc IEEE 98(6):925–936CrossRef Candes EJ, Plan Y (2010) Matrix completion with noise. Proc IEEE 98(6):925–936CrossRef
31.
Zurück zum Zitat Roy JA et al (2009) CRISP: congestion reduction by iterated spreading during placement. In: Proceedings of the 2009 International Conference on Computer-Aided Design. ACM Roy JA et al (2009) CRISP: congestion reduction by iterated spreading during placement. In: Proceedings of the 2009 International Conference on Computer-Aided Design. ACM
32.
Zurück zum Zitat Singh G (2013) A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. Int J Comput Appl 67(19):33–38 Singh G (2013) A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. Int J Comput Appl 67(19):33–38
Metadaten
Titel
Privacy-aware task data management using TPR*-Tree for trajectory-based crowdsourcing
verfasst von
Yan Li
Byeong-Seok Shin
Publikationsdatum
23.07.2018
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 12/2018
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-018-2486-3

Weitere Artikel der Ausgabe 12/2018

The Journal of Supercomputing 12/2018 Zur Ausgabe