SlideShare a Scribd company logo
1 of 33
Download to read offline
A	
  Framework	
  for	
  Protec/ng	
  Worker	
  Loca/on	
  
Privacy	
  in	
  Spa/al	
  Crowdsourcing	
  
VLDB	
  2014	
  
CSCI	
  587	
  Nov	
  12	
  2014	
  
Cyrus	
  Shahabi	
  
Privacy	
  in	
  spa/al	
  crowdsourcing	
  
1	
  
Mo/va/on	
  
[1]	
  hOp://mobithinking.com/mobile-­‐marke/ng-­‐tools/latest-­‐mobile-­‐stats/	
  
Ubiquity	
  of	
  
mobile	
  users	
  
Technology	
  
advances	
  on	
  
mobiles	
  
Network	
  
bandwidth	
  
improvements	
  
From	
  2.5G	
  (up	
  to	
  384Kbps)	
  
to	
  3G	
  (up	
  to	
  14.7Mbps)	
  
and	
  recently	
  4G	
  (up	
  to	
  100	
  
Mbps)	
  
Smartphone's	
  
sensors.	
  e.g.,	
  video	
  
cameras	
  
6.5	
  billion	
  mobile	
  
subscrip/ons,	
  93.5%	
  of	
  
the	
  world	
  popula/on	
  [1]	
  
VLDB	
  2014	
   2	
  
Spa/al	
  Crowdsourcing	
  
q Crowdsourcing	
  
–  Outsourcing	
  a	
  set	
  of	
  tasks	
  to	
  a	
  set	
  of	
  workers	
  
q Spa/al	
  Crowdsourcing	
  
–  Crowdsourcing	
  a	
  set	
  of	
  spa%al	
  tasks	
  to	
  a	
  set	
  of	
  workers.	
  
–  Spa%al	
  task	
  is	
  related	
  to	
  a	
  loca/on	
  .e.g.,	
  taking	
  pictures	
  
Loca/on	
  privacy	
  is	
  one	
  of	
  the	
  major	
  impediments	
  that	
  may	
  hinder	
  
workers	
  from	
  par/cipa/on	
  in	
  SC	
  
VLDB	
  2014	
   3	
  
Problem	
  Statement	
  
Workers	
  
Requesters	
  
SC-­‐server	
  
Report	
  loca+ons	
  
Current	
  solu/ons	
  require	
  the	
  workers	
  to	
  disclose	
  their	
  loca/ons	
  
to	
  untrustworthy	
  en//es,	
  i.e.,	
  SC-­‐server.	
  
	
  
A	
   framework	
   for	
   protec/ng	
   privacy	
   of	
   worker	
   loca/ons,	
  
whereby	
   the	
   SC-­‐server	
   only	
   has	
   access	
   to	
   data	
   sani/zed	
  
according	
  to	
  differen%al	
  privacy.	
  
	
   VLDB	
  2014	
   4	
  
Outline	
  
v Background	
  
v Privacy	
  Framework	
  
v Worker	
  PSD	
  (Private	
  Spa/al	
  Decomposi/on)	
  
v Task	
  Assignment	
  
v Experiments	
  
VLDB	
  2014	
   5	
  
U/lity-­‐Privacy	
  Trade-­‐off	
  
VLDB	
  2014	
  
Utility
100%
100%
0%Privacy
0%
6	
  
Related	
  Work	
  
v Pseudonymity	
  (using	
  fake	
  iden/ty)	
  
•  e.g.	
  fake	
  iden/ty	
  +	
  loca/on	
  ==	
  resident	
  of	
  the	
  home	
  
VLDB	
  2014	
   7	
  
v 	
  K-­‐anonymity	
  model	
  	
  (not	
  dis/nguish	
  among	
  other	
  k	
  records)	
  
iden//es	
  are	
  known	
  
the	
  loca/on	
  k-­‐anonymity	
  fails	
  to	
  prevent	
  the	
  loca/on	
  of	
  a	
  subject	
  
being	
  not	
  iden/fiable	
  
all	
  k	
  users	
  reside	
  in	
  the	
  exact	
  same	
  loca/on	
  
	
  k-­‐anonymity,	
  do	
  not	
  provide	
  rigorous	
  privacy	
  
v 	
  Cryptography	
  
such	
  technique	
  is	
  computa%onal	
  expensive	
  
=>not	
  suitable	
  for	
  SC	
  applica/ons	
  
Differen/al	
  Privacy	
  (DP)	
  
DP	
  ensures	
  an	
  adversary	
  do	
  not	
  know	
  from	
  the	
  sani/zed	
  data	
  whether	
  an	
  
individual	
  is	
  present	
  or	
  not	
  in	
  the	
  original	
  data	
  
Given	
  neighboring	
  datasets	
  	
  	
  	
  	
  	
  	
  	
  and	
  	
  	
  	
  	
  	
  	
  ,	
  the	
  sensi/vity	
  of	
  query	
  set	
  QS	
  is	
  the	
  
the	
  maximum	
  change	
  in	
  their	
  query	
  results	
  
∑=
−=
q
1i
21
,
|)()(|max)(
21
DQSDQSQS
DD
σ
1L	
  -­‐sensi+vity:	
  
1D 2D
[Dwork’06]	
  shows	
  that	
  it	
  is	
  sufficient	
  to	
  achieve	
  	
  	
  	
  	
  -­‐DP	
  by	
  adding	
  random	
  
Laplace	
  noise	
  with	
  mean	
   εσλ /)(QS=
ε
DP	
  allows	
  only	
  aggregate	
  queries,	
  e.g.,	
  count,	
  sum.	
  
ε ε≤
=
=
]Pr[
]Pr[
ln 2
1
UQS
UQS
D
D
A	
  database	
  produces	
  transcript	
  U	
  on	
  a	
  set	
  of	
  queries.	
  Transcript	
  U	
  sa/sfies	
  	
  	
  	
  	
  -­‐
dis/nguishability	
  if	
  for	
  every	
  pair	
  of	
  sibling	
  datasets	
  	
  	
  	
  	
  	
  	
  and	
  	
  	
  	
  	
  	
  	
   	
  	
  	
  	
  	
  and	
  	
  
they	
  differ	
  in	
  only	
  one	
  record,	
  it	
  holds	
  that	
  
1D ,2D 21 DD =
ε
:	
  privacy	
  budget	
  
-­‐dis$nguishability	
  [Dwork’06]	
  ε
VLDB	
  2014	
   8	
  
Outline	
  
v Background	
  
v Privacy	
  Framework	
  
v Worker	
  Private	
  Spa/al	
  Decomposi/on	
  
v Task	
  Assignment	
  
v Experiments	
  
VLDB	
  2014	
   9	
  
3. Geocast {t,GR}
2. Task Request t
Requesters
Workers
SC-Server
Worker
Database
1. Sanitized ReleasePSD
4. Consent
Cell Service
Provider
GR
0. Report Locations
Privacy	
  Framework	
  
0.	
  Workers	
  send	
  their	
  loca/ons	
  to	
  a	
  
trusted	
  CSP	
  
2.	
  SC-­‐server	
  receives	
  tasks	
  from	
  
requesters	
  
3.	
  When	
  SC-­‐server	
  receives	
  task	
  t,	
  it	
  
queries	
  the	
  PSD	
  to	
  determine	
  a	
  GR	
  that	
  
enclose	
  sufficient	
  workers.	
  Then,	
  SC-­‐
server	
  ini/alizes	
  geocast	
  communica/on	
  
to	
  disseminate	
  t	
  to	
  all	
  workers	
  within	
  GR	
  
4.	
  Workers	
  confirm	
  their	
  availability	
  to	
  
perform	
  the	
  assigned	
  task	
  
1.	
  CSP	
  releases	
  a	
  PSD	
  according	
  to	
  	
  	
  	
  	
  .	
  
PSD	
  is	
  accessed	
  by	
  SC-­‐server	
  
ε
Workers	
  	
  trust	
  SCP	
  
Workers	
  do	
  not	
  trust	
  SC-­‐server	
  
and	
  requesters	
  
Focus	
  on	
  private	
  task	
  assignment	
  
rather	
  than	
  post	
  assignment	
  
VLDB	
  2014	
   10	
  
Design	
  Goal	
  and	
  Performance	
  Metrics	
  
Assignment	
  Success	
  Rate	
  (ASR):	
  measures	
  the	
  ra/o	
  of	
  tasks	
  accepted	
  by	
  
workers	
  to	
  the	
  total	
  number	
  of	
  task	
  requests	
  
Worker	
  Travel	
  Distance	
  (WTD):	
  the	
  average	
  travel	
  distance	
  of	
  all	
  
workers	
  
System	
  Overhead:	
  the	
  average	
  number	
  of	
  no/fied	
  workers	
  (ANW).	
  ANW	
  
affects	
  both	
  communica%on	
  overhead	
  required	
  to	
  geocast	
  task	
  requests	
  
and	
  the	
  computa%on	
  overhead	
  of	
  matching	
  algorithm	
  
Protec/ng	
  worker	
  loca/on	
  may	
  reduce	
  the	
  effec/veness	
  and	
  efficiency	
  
of	
  worker-­‐task	
  matching,	
  captured	
  by	
  following	
  metrics:	
  
VLDB	
  2014	
   11	
  
Outline	
  
v Background	
  
v Privacy	
  Framework	
  
v Worker	
  PSD	
  (Private	
  Spa+al	
  Decomposi+on)	
  
v Task	
  Assignment	
  
v Experiments	
  
VLDB	
  2014	
   12	
  
Adap/ve	
  Grid	
  (Worker	
  PSD)	
  
A B
C D
Level 1
Level 2
1c 2c
3c 4c
5c 6c
7c 8c9c 10c
11c 12c
13c 14c
16c 17c
15c
18c
19c 20c 21c
)100( '
=AN )100( '
=BN
)100( '
=CN )200( '
=DN
⎟
⎟
⎠
⎞
⎜
⎜
⎝
⎛
⎥
⎥
⎤
⎢
⎢
⎡ ×
=
2
1
4
1
,10max
k
N
m
ε
Creates	
  a	
  coarse-­‐grained,	
  fixed	
  size	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  grid	
  over	
  data	
  domain.	
  Then	
  issues	
  
	
  	
  	
  	
  	
  	
  	
  	
  count	
  queries	
  for	
  each	
  level-­‐1	
  cell	
  using	
  	
  
11 mm ×2
1m 1ε
Par//ons	
  each	
  level-­‐1	
  cell	
  into	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  level-­‐2	
  cells,	
  	
  	
  	
  	
  	
  	
  	
  is	
  adap/vely	
  chosen	
  
based	
  on	
  noisy	
  count	
  	
  	
  	
  	
  	
  	
  	
  	
  of	
  level-­‐1	
  cell	
  
22 mm × 2m
'N
⎥
⎥
⎤
⎢
⎢
⎡ ×
=
2
2
2
'
4
1
k
N
m
ε
21 εεε +=
[Qardaji’13]	
  	
  
VLDB	
  2014	
   13	
  
Customized	
  AG	
  
Expected	
  #workers	
  (noisy	
  count)	
  in	
  level-­‐2	
  cells	
   22
2
2 //' εkmNn ==
large	
  	
  	
  	
  	
  	
  leads	
  to	
  high	
  communica+on	
  cost	
  n
Increase	
  	
  	
  	
  	
  	
  	
  	
  to	
  decrease	
  overhead,	
  but	
  only	
  to	
  the	
  point	
  where	
  there	
  is	
  at	
  
least	
  one	
  worker	
  in	
  a	
  cell	
  	
  
2m
1	
   0.5	
   	
  6	
   2.8	
  
0.5	
   0.25	
   5	
   5.6	
  
0.1	
   0.05	
   2	
   28	
  
J	
  	
  Customized	
  AG	
  	
  	
   %)88,2( 2 == hpk
ε 2ε 2m n
1	
   0.5	
   3	
   11	
  
0.5	
   0.25	
   2	
   25	
  
0.1	
   0.05	
   1	
   100	
  
L	
  	
  Original	
  AG	
  	
  	
   )5( 2 =k
ε 2ε 2m n
100'=N
⎟⎟
⎠
⎞
⎜⎜
⎝
⎛
−−=
2/1
exp
2
1
1
ε
PSD
h
count
p
The	
  probability	
  that	
  the	
  real	
  count	
  is	
  larger	
  than	
  zero:	
  
VLDB	
  2014	
   14	
  
Customized	
  AG	
  
•  Original	
  AG	
  and	
  Customized	
  AG	
  adapts	
  to	
  data	
  distribu/ons	
  
•  Original	
  AG	
  minimizes	
  overall	
  es/ma/on	
  error	
  of	
  region	
  
queries	
  while	
  customized	
  AG	
  increases	
  the	
  number	
  of	
  2nd	
  
level	
  cells	
  
VLDB	
  2014	
   15	
  
Original	
  AG	
   Customized	
  AG	
  Yelp	
  Dataset	
  
Outline	
  
v Background	
  
v Privacy	
  Framework	
  
v Worker	
  PSD	
  (Private	
  Spa/al	
  Decomposi/on)	
  
v Task	
  Assignment	
  
v Experiments	
  
VLDB	
  2014	
   16	
  
Analy/cal	
  U/lity	
  Model	
  
SC-­‐server	
  establishes	
  an	
  Expected	
  U%lity	
  (	
  	
  	
  	
  	
  	
  	
  )	
  threshold,	
  which	
  is	
  the	
  
targeted	
  success	
  rate	
  for	
  a	
  task.	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  >	
  	
  	
  	
  	
  	
  	
  .	
  	
  
EU
a
pEU
	
  	
  	
  	
  	
  	
  is	
  a	
  random	
  variable	
  for	
  an	
  event	
  that	
  a	
  worker	
  accepts	
  a	
  received	
  task	
  
aa
pFalseXPpTrueXP −==== 1)(;)(
X
wa
a
pU
pwBinomialX
)1(1
),(~
−−=⇒
Assuming	
  	
  	
  	
  	
  	
  	
  independent	
  workers.	
  	
  	
  	
  	
  	
  	
  is	
  the	
  probability	
  that	
  at	
  least	
  one	
  
worker	
  accepts	
  the	
  task	
  	
  
Uw
We	
  define	
  Acceptance	
  Rate	
  as	
  a	
  decreasing	
  func/on	
  of	
  task-­‐worker	
  
distance	
  (e.g.	
  linear,	
  Zipian)	
  
10);( ≤≤= aa
pdFp
VLDB	
  2014	
   17	
  
Acceptance	
  Rate	
  Func/ons	
  
VLDB	
  2014	
   18	
  
Acceptacerate	
  
distance	
  0	
   MTD	
  
0.5	
  
Geocast	
  Region	
  Construc/on	
  
Determines	
  a	
  small	
  region	
  that	
  contains	
  sufficient	
  workers	
  
2.	
  	
   Qci ←
4.	
  	
  	
  If	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  ,	
  return	
  GR	
  	
  EUU ≥
5.	
  	
   MTDGRneighborsscneighbors i ∩−= }'{
6.	
   	
   	
   	
  	
  	
  ;	
  	
  Go	
  to	
  2.	
  neighborsQQ ∪=
1.	
  	
  	
  Init	
  GR	
  =	
  {},	
  max-­‐heap	
  	
  	
  	
  	
  	
  	
  	
  of	
  candidates	
  	
  
	
  	
  	
  	
  	
  	
  	
  Q	
  =	
  {	
  the	
  cell	
  that	
  contains	
  	
  	
  	
  	
  	
  }	
  	
  
	
  
t
Q
t
1c 2c
3c 4c
5c 6c
7c 8c
9c 10c
11c 12c
14c
16c 17c
15c
18c
19c 20c 21c
13c
3.	
  	
   )1)(1(1 icUUU −−−←
Greedy	
  Algorithm	
  (GDY)	
  
VLDB	
  2014	
   19	
  
Par/al	
  Cell	
  Selec/on	
  
t
0t
ic
Sub-cell 'ic
1t 2t 3t
4t
5t
6t
7t
8t
Splisng	
   ic
13c
1c 2c
3c 4c
5c 6c
7c 8c
9c 10c
11c 12c
14c
16c 17c
15c
18c
19c 20c 21c
Splisng	
   7c
L	
  The	
  number	
  of	
  workers	
  can	
  s/ll	
  be	
  large	
  with	
  AG,	
  especially	
  when	
  	
  	
  	
  	
  	
  	
  small	
  	
  2ε
Allow	
  par$al	
  cell	
  inclusion	
  on	
  the	
  lastly	
  added	
  cell	
  	
   ic
VLDB	
  2014	
   20	
  
Internet WLAN
Cellular
Mobile	
  Ad-­‐hoc	
  Networks
Communica/on	
  Cost	
  
t
1c 2c
3c
4c
5c 6c
7c 8c
9c 10c
11c 12c
14c
16c 17c
15c
18c
19c 20c 21c
13c
The	
  more	
  compact	
  the	
  GR,	
  
the	
  lower	
  the	
  cost	
  
Measurement:	
  
rangeionCommunicat
countHop
×
=
2
workerstwobetweendistanceFarthest
Infrastructure-­‐based	
  Mode	
  v.s	
  Infrastructure-­‐less	
  Mode	
  
)(
)(
BALLMINarea
GRarea
DCM =
Digital	
  Compactness	
  Measurement	
  [Kim’84]	
  
VLDB	
  2014	
   21	
  
Geocast	
  Regions	
  
VLDB	
  2014	
   22	
  
A	
   B	
  
C	
  
D	
  
Outline	
  
•  Background	
  
•  Privacy	
  Framework	
  
•  Worker	
  PSD	
  (Private	
  Spa/al	
  Decomposi/on)	
  
•  Task	
  Assignment	
  
•  Experiments	
  
VLDB	
  2014	
   23	
  
Experimental	
  Setup	
  
•  Datasets	
  
•  Assump/ons	
  
–  Gowalla	
  and	
  Yelp	
  users	
  are	
  workers	
  
–  Check-­‐in	
  points	
  (i.e.,	
  of	
  restaurants)	
  are	
  task	
  loca/ons	
  
•  Parameter	
  sesngs	
  
	
  
•  1000	
  random	
  tasks	
  x	
  10	
  seeds	
  
Name	
   #Tasks	
   #Workers	
   MTD	
  (km)	
  
Gowalla	
   151,075	
   6,160	
   3.6	
  
Yelp	
   15,583	
   70,817	
   13.5	
  
}1,7.0,4.0,1.0{=ε
}9.0,7.0,5.0,3.0{=EU
}1,7.0,4.0,1.0{=MaxAR
VLDB	
  2014	
   24	
  
GR	
  Construc/on	
  Heuris/cs	
  
(Gow.-­‐Linear)	
  
0
20
40
60
80
100
120
Eps=0.1 Eps=0.4 Eps=0.7 Eps=1
GDY G-GR
G-PA G-GP
0
0.1
0.2
0.3
0.4
0.5
Eps=0.1 Eps=0.4 Eps=0.7 Eps=1
GDY G-GR
G-PA G-GP
0
2
4
6
8
Eps=0.1 Eps=0.4 Eps=0.7 Eps=1
GDY G-GR
G-PA G-GP
ANW	
   WTD-­‐FC	
   HOP	
  
VLDB	
  2014	
  
GDY	
  =	
  geocast	
  (GREedy	
  algorithm)	
  +	
  original	
  Adap/ve	
  grid	
  (AG)	
   [Qardaji’13]	
  	
  
G-­‐GR	
  =	
  geocast	
  +	
  AG	
  with	
  customized	
  GRanularity	
  
G-­‐PA	
  =	
  geocast	
  	
  with	
  PAr/al	
  cell	
  selec/on	
  +	
  original	
  Adap/ve	
  grid	
  (AG)	
  
G-­‐GP	
  =	
  geocast	
  	
  with	
  Par/al	
  cell	
  selec/on	
  +	
  AG	
  with	
  customized	
  Granularity	
  
25	
  
Effect	
  of	
  Grid	
  Size	
  to	
  ASR	
  
50
60
70
80
90
100
0.1 0.2 0.4 0.8 1.41 1.6 3.2 6.4 12.8 25.6
ASR
k2
Gowalla-Linear Gowalla-Zipf
Yelp-Linear Yelp-Zipf
Over-provision
Under-provision
Average	
  ASR	
  over	
  all	
  values	
  of	
  budget	
  by	
  varying	
  
k2	
   VLDB	
  2014	
   26	
  
Compactness-­‐based	
  Heuris/cs	
  
(Yelp-­‐Zipf)	
  
HOP	
   ANW	
  
0
2
4
6
8
10
Eps=0.1 Eps=0.4 Eps=0.7 Eps=1
G-GP-Pure
G-GP-Hybrid
G-GP-Compact
0
20
40
60
80
Eps=0.1 Eps=0.4 Eps=0.7 Eps=1
G-GP-Pure
G-GP-Hybrid
G-GP-Compact
VLDB	
  2014	
   27	
  
ANW	
   WTD-­‐FC	
   ASR	
  
Overhead	
  of	
  Archieving	
  Privacy	
  
(Gow.-­‐Zipf)	
  
0
20
40
60
Eps=0.1 Eps=0.4 Eps=0.7 Eps=1
Privacy
Non-Privacy
0
0.1
0.2
0.3
0.4
Eps=0.1 Eps=0.4 Eps=0.7 Eps=1
Privacy
Non-Privacy
0
20
40
60
80
100
Eps=0.1 Eps=0.4 Eps=0.7 Eps=1
Privacy
Non-Privacy
VLDB	
  2014	
  
28	
  
Effect	
  of	
  Varying	
  MAR	
  
(Yelp-­‐Linear)	
  
0
10
20
30
40
50
AR=0.1 AR=0.4 AR=0.7 AR=1
Eps=0.1 Eps=0.4
Eps=0.7 Eps=1
ANW	
   CELL	
  
0
0.1
0.2
0.3
0.4
AR=0.1 AR=0.4 AR=0.7 AR=1
Eps=0.1 Eps=0.4
Eps=0.7 Eps=1
WTD-­‐FC	
  
0
2
4
6
8
AR=0.1 AR=0.4 AR=0.7 AR=1
Eps=0.1 Eps=0.4
Eps=0.7 Eps=1
29	
  VLDB	
  2014	
  
Effect	
  of	
  Varying	
  EU	
  
(Yelp-­‐Linear)	
  
ANW	
   CELL	
  WTD-­‐FC	
  
0
10
20
30
40
50
EU=30 EU=50 EU=70 EU=90
Eps=0.1 Eps=0.4
Eps=0.7 Eps=1
0
0.1
0.2
0.3
0.4
EU=30 EU=50 EU=70 EU=90
Eps=0.1 Eps=0.4
Eps=0.7 Eps=1
0
2
4
6
8
EU=30 EU=50 EU=70 EU=90
Eps=0.1 Eps=0.4
Eps=0.7 Eps=1
VLDB	
  2014	
  
30	
  
Demo	
  
VLDB	
  2014	
  
hOps://www.youtube.com/watch?v=4zkiJ9gk79s	
  
hOp://geocast.azurewebsites.net/geocast/	
  
31	
  
Conclusion	
  
Iden/fied	
  geocas/ng	
  as	
  a	
  needed	
  step	
  to	
  preseve	
  privacy	
  prior	
  
to	
  workers	
  consen/ng	
  to	
  a	
  task	
  
Introduced	
  a	
  novel	
  privacy-­‐aware	
  framework	
  in	
  SC,	
  which	
  
enables	
  workers	
  par/cipa/on	
  without	
  compromising	
  their	
  
loca/on	
  privacy	
  
Provided	
  heuris/cs	
  and	
  op/miza/ons	
  for	
  determining	
  effec/ve	
  
geocast	
  regions	
  that	
  achieve	
  high	
  assignment	
  success	
  rate	
  with	
  
low	
  overhead	
  
Experimental	
  results	
  on	
  real	
  datasets	
  shows	
  that	
  the	
  proposed	
  
techniques	
  are	
  effec/ve	
  and	
  the	
  cost	
  of	
  privacy	
  is	
  prac/cal	
  
VLDB	
  2014	
   32	
  
References	
  
VLDB	
  2014	
  
Hien	
  To,	
  Gabriel	
  Ghinita,	
  Cyrus	
  Shahabi.	
  A	
  Framework	
  for	
  Protec%ng	
  Worker	
  
Loca%on	
  Privacy	
  in	
  Spa%al	
  Crowdsourcing.	
  In	
  Proceedings	
  of	
  the	
  40th	
  
Interna/onal	
  Conference	
  on	
  Very	
  Large	
  Data	
  Bases	
  (VLDB	
  2014)	
  
Hien	
  To,	
  Gabriel	
  Ghinita,	
  Cyrus	
  Shahabi.	
  PriGeoCrowd:	
  A	
  Toolbox	
  for	
  Private	
  
Spa%al	
  Crowdsourcing.	
  (demo)	
  In	
  Proceedings	
  of	
  the	
  31st	
  IEEE	
  Interna/onal	
  
Conference	
  on	
  Data	
  Engineering	
  (ICDE	
  2015)	
  
33	
  

More Related Content

What's hot

Task Scheduling in Grid Computing.
Task Scheduling in Grid Computing.Task Scheduling in Grid Computing.
Task Scheduling in Grid Computing.Ramandeep Kaur
 
CoryCookFinalProject535
CoryCookFinalProject535CoryCookFinalProject535
CoryCookFinalProject535Cory Cook
 
TASK SCHEDULING USING AMALGAMATION OF MET HEURISTICS SWARM OPTIMIZATION ALGOR...
TASK SCHEDULING USING AMALGAMATION OF MET HEURISTICS SWARM OPTIMIZATION ALGOR...TASK SCHEDULING USING AMALGAMATION OF MET HEURISTICS SWARM OPTIMIZATION ALGOR...
TASK SCHEDULING USING AMALGAMATION OF MET HEURISTICS SWARM OPTIMIZATION ALGOR...Journal For Research
 
Data Replication In Cloud Computing
Data Replication In Cloud ComputingData Replication In Cloud Computing
Data Replication In Cloud ComputingRahul Garg
 
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMS
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMSIMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMS
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMScsandit
 
dmapply: A functional primitive to express distributed machine learning algor...
dmapply: A functional primitive to express distributed machine learning algor...dmapply: A functional primitive to express distributed machine learning algor...
dmapply: A functional primitive to express distributed machine learning algor...Bikash Chandra Karmokar
 
Network Simulation
Network SimulationNetwork Simulation
Network Simulationlohch3
 
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...IJSRD
 
Energy in Wireless Sensor Network
Energy in Wireless Sensor NetworkEnergy in Wireless Sensor Network
Energy in Wireless Sensor NetworkBADALKUMAR56
 
Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...Pvrtechnologies Nellore
 
6 intelligent-placement-of-datacenters
6 intelligent-placement-of-datacenters6 intelligent-placement-of-datacenters
6 intelligent-placement-of-datacenterszafargilani
 
Jet Energy Corrections with Deep Neural Network Regression
Jet Energy Corrections with Deep Neural Network RegressionJet Energy Corrections with Deep Neural Network Regression
Jet Energy Corrections with Deep Neural Network RegressionDaniel Holmberg
 
Cloudian dynamic consistency
Cloudian dynamic consistencyCloudian dynamic consistency
Cloudian dynamic consistencyCLOUDIAN KK
 
Autonomic Resource Provisioning for Cloud-Based Software
Autonomic Resource Provisioning for Cloud-Based SoftwareAutonomic Resource Provisioning for Cloud-Based Software
Autonomic Resource Provisioning for Cloud-Based SoftwarePooyan Jamshidi
 
Reference broadcast synchronization and time division multiple access impleme...
Reference broadcast synchronization and time division multiple access impleme...Reference broadcast synchronization and time division multiple access impleme...
Reference broadcast synchronization and time division multiple access impleme...TELKOMNIKA JOURNAL
 

What's hot (20)

Sustainability: Actors, Behavior, and Transparency
Sustainability: Actors, Behavior, and TransparencySustainability: Actors, Behavior, and Transparency
Sustainability: Actors, Behavior, and Transparency
 
Task Scheduling in Grid Computing.
Task Scheduling in Grid Computing.Task Scheduling in Grid Computing.
Task Scheduling in Grid Computing.
 
CoryCookFinalProject535
CoryCookFinalProject535CoryCookFinalProject535
CoryCookFinalProject535
 
TASK SCHEDULING USING AMALGAMATION OF MET HEURISTICS SWARM OPTIMIZATION ALGOR...
TASK SCHEDULING USING AMALGAMATION OF MET HEURISTICS SWARM OPTIMIZATION ALGOR...TASK SCHEDULING USING AMALGAMATION OF MET HEURISTICS SWARM OPTIMIZATION ALGOR...
TASK SCHEDULING USING AMALGAMATION OF MET HEURISTICS SWARM OPTIMIZATION ALGOR...
 
H04502048051
H04502048051H04502048051
H04502048051
 
Data Replication In Cloud Computing
Data Replication In Cloud ComputingData Replication In Cloud Computing
Data Replication In Cloud Computing
 
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMS
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMSIMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMS
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMS
 
dmapply: A functional primitive to express distributed machine learning algor...
dmapply: A functional primitive to express distributed machine learning algor...dmapply: A functional primitive to express distributed machine learning algor...
dmapply: A functional primitive to express distributed machine learning algor...
 
Network Simulation
Network SimulationNetwork Simulation
Network Simulation
 
40520130101004
4052013010100440520130101004
40520130101004
 
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
 
Energy in Wireless Sensor Network
Energy in Wireless Sensor NetworkEnergy in Wireless Sensor Network
Energy in Wireless Sensor Network
 
Resource management
Resource managementResource management
Resource management
 
Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...
 
Handout3o
Handout3oHandout3o
Handout3o
 
6 intelligent-placement-of-datacenters
6 intelligent-placement-of-datacenters6 intelligent-placement-of-datacenters
6 intelligent-placement-of-datacenters
 
Jet Energy Corrections with Deep Neural Network Regression
Jet Energy Corrections with Deep Neural Network RegressionJet Energy Corrections with Deep Neural Network Regression
Jet Energy Corrections with Deep Neural Network Regression
 
Cloudian dynamic consistency
Cloudian dynamic consistencyCloudian dynamic consistency
Cloudian dynamic consistency
 
Autonomic Resource Provisioning for Cloud-Based Software
Autonomic Resource Provisioning for Cloud-Based SoftwareAutonomic Resource Provisioning for Cloud-Based Software
Autonomic Resource Provisioning for Cloud-Based Software
 
Reference broadcast synchronization and time division multiple access impleme...
Reference broadcast synchronization and time division multiple access impleme...Reference broadcast synchronization and time division multiple access impleme...
Reference broadcast synchronization and time division multiple access impleme...
 

Similar to A Framework for Protecting Worker Location Privacy in Spatial Crowdsourcing

A simulation-based approach for straggler tasks detection in Hadoop MapReduce
A simulation-based approach for straggler tasks detection in Hadoop MapReduceA simulation-based approach for straggler tasks detection in Hadoop MapReduce
A simulation-based approach for straggler tasks detection in Hadoop MapReduceIRJET Journal
 
IRJET- Survey on Adaptive Routing Algorithms
IRJET- Survey on Adaptive Routing AlgorithmsIRJET- Survey on Adaptive Routing Algorithms
IRJET- Survey on Adaptive Routing AlgorithmsIRJET Journal
 
The Data Center and Hadoop
The Data Center and HadoopThe Data Center and Hadoop
The Data Center and HadoopMichael Zhang
 
FAULTY NODE RECOVERY AND REPLACEMENT ALGORITHM FOR WIRELESS SENSOR NETWORKF
FAULTY NODE RECOVERY AND REPLACEMENT ALGORITHM FOR WIRELESS SENSOR NETWORKFFAULTY NODE RECOVERY AND REPLACEMENT ALGORITHM FOR WIRELESS SENSOR NETWORKF
FAULTY NODE RECOVERY AND REPLACEMENT ALGORITHM FOR WIRELESS SENSOR NETWORKFprj_publication
 
Faulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor networkFaulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor networkprjpublications
 
When Two Choices Are not Enough: Balancing at Scale in Distributed Stream Pro...
When Two Choices Are not Enough: Balancing at Scale in Distributed Stream Pro...When Two Choices Are not Enough: Balancing at Scale in Distributed Stream Pro...
When Two Choices Are not Enough: Balancing at Scale in Distributed Stream Pro...Anis Nasir
 
IRJET- Underwater Acoustic Wsn:Routing Protocol
IRJET- Underwater Acoustic Wsn:Routing ProtocolIRJET- Underwater Acoustic Wsn:Routing Protocol
IRJET- Underwater Acoustic Wsn:Routing ProtocolIRJET Journal
 
IRJET- Security Efficiency of Transfering the Data for Wireless Sensor Ne...
IRJET-  	  Security Efficiency of Transfering the Data for Wireless Sensor Ne...IRJET-  	  Security Efficiency of Transfering the Data for Wireless Sensor Ne...
IRJET- Security Efficiency of Transfering the Data for Wireless Sensor Ne...IRJET Journal
 
IRJET-Securing Data in Cloud using Graphical Password Authentication and AES ...
IRJET-Securing Data in Cloud using Graphical Password Authentication and AES ...IRJET-Securing Data in Cloud using Graphical Password Authentication and AES ...
IRJET-Securing Data in Cloud using Graphical Password Authentication and AES ...IRJET Journal
 
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...ijgca
 
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural NetworksSecuring Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networkstheijes
 
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...IRJET Journal
 
Ship Detection from SAR Imagery Using CUDA and Performance Analysis of the Sy...
Ship Detection from SAR Imagery Using CUDA and Performance Analysis of the Sy...Ship Detection from SAR Imagery Using CUDA and Performance Analysis of the Sy...
Ship Detection from SAR Imagery Using CUDA and Performance Analysis of the Sy...IJERA Editor
 
Digital watermarking with a new algorithm
Digital watermarking with a new algorithmDigital watermarking with a new algorithm
Digital watermarking with a new algorithmeSAT Journals
 
Digital watermarking with a new algorithm
Digital watermarking with a new algorithmDigital watermarking with a new algorithm
Digital watermarking with a new algorithmeSAT Publishing House
 
Self-Tuning and Managing Services
Self-Tuning and Managing ServicesSelf-Tuning and Managing Services
Self-Tuning and Managing ServicesReza Rahimi
 
Refining the Estimation of the Available Bandwidth in Inter-Cloud Links for T...
Refining the Estimation of the Available Bandwidth in Inter-Cloud Links for T...Refining the Estimation of the Available Bandwidth in Inter-Cloud Links for T...
Refining the Estimation of the Available Bandwidth in Inter-Cloud Links for T...Thiago Genez
 
Ieeepro techno solutions 2014 ieee dotnet project - cloud bandwidth and cos...
Ieeepro techno solutions   2014 ieee dotnet project - cloud bandwidth and cos...Ieeepro techno solutions   2014 ieee dotnet project - cloud bandwidth and cos...
Ieeepro techno solutions 2014 ieee dotnet project - cloud bandwidth and cos...ASAITHAMBIRAJAA
 
Ieeepro techno solutions 2014 ieee java project - cloud bandwidth and cost ...
Ieeepro techno solutions   2014 ieee java project - cloud bandwidth and cost ...Ieeepro techno solutions   2014 ieee java project - cloud bandwidth and cost ...
Ieeepro techno solutions 2014 ieee java project - cloud bandwidth and cost ...hemanthbbc
 

Similar to A Framework for Protecting Worker Location Privacy in Spatial Crowdsourcing (20)

A simulation-based approach for straggler tasks detection in Hadoop MapReduce
A simulation-based approach for straggler tasks detection in Hadoop MapReduceA simulation-based approach for straggler tasks detection in Hadoop MapReduce
A simulation-based approach for straggler tasks detection in Hadoop MapReduce
 
IRJET- Survey on Adaptive Routing Algorithms
IRJET- Survey on Adaptive Routing AlgorithmsIRJET- Survey on Adaptive Routing Algorithms
IRJET- Survey on Adaptive Routing Algorithms
 
The Data Center and Hadoop
The Data Center and HadoopThe Data Center and Hadoop
The Data Center and Hadoop
 
FAULTY NODE RECOVERY AND REPLACEMENT ALGORITHM FOR WIRELESS SENSOR NETWORKF
FAULTY NODE RECOVERY AND REPLACEMENT ALGORITHM FOR WIRELESS SENSOR NETWORKFFAULTY NODE RECOVERY AND REPLACEMENT ALGORITHM FOR WIRELESS SENSOR NETWORKF
FAULTY NODE RECOVERY AND REPLACEMENT ALGORITHM FOR WIRELESS SENSOR NETWORKF
 
Faulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor networkFaulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor network
 
When Two Choices Are not Enough: Balancing at Scale in Distributed Stream Pro...
When Two Choices Are not Enough: Balancing at Scale in Distributed Stream Pro...When Two Choices Are not Enough: Balancing at Scale in Distributed Stream Pro...
When Two Choices Are not Enough: Balancing at Scale in Distributed Stream Pro...
 
IRJET- Underwater Acoustic Wsn:Routing Protocol
IRJET- Underwater Acoustic Wsn:Routing ProtocolIRJET- Underwater Acoustic Wsn:Routing Protocol
IRJET- Underwater Acoustic Wsn:Routing Protocol
 
IRJET- Security Efficiency of Transfering the Data for Wireless Sensor Ne...
IRJET-  	  Security Efficiency of Transfering the Data for Wireless Sensor Ne...IRJET-  	  Security Efficiency of Transfering the Data for Wireless Sensor Ne...
IRJET- Security Efficiency of Transfering the Data for Wireless Sensor Ne...
 
IRJET-Securing Data in Cloud using Graphical Password Authentication and AES ...
IRJET-Securing Data in Cloud using Graphical Password Authentication and AES ...IRJET-Securing Data in Cloud using Graphical Password Authentication and AES ...
IRJET-Securing Data in Cloud using Graphical Password Authentication and AES ...
 
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...
 
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural NetworksSecuring Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
 
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...
 
Ship Detection from SAR Imagery Using CUDA and Performance Analysis of the Sy...
Ship Detection from SAR Imagery Using CUDA and Performance Analysis of the Sy...Ship Detection from SAR Imagery Using CUDA and Performance Analysis of the Sy...
Ship Detection from SAR Imagery Using CUDA and Performance Analysis of the Sy...
 
Digital watermarking with a new algorithm
Digital watermarking with a new algorithmDigital watermarking with a new algorithm
Digital watermarking with a new algorithm
 
Digital watermarking with a new algorithm
Digital watermarking with a new algorithmDigital watermarking with a new algorithm
Digital watermarking with a new algorithm
 
Self-Tuning and Managing Services
Self-Tuning and Managing ServicesSelf-Tuning and Managing Services
Self-Tuning and Managing Services
 
Refining the Estimation of the Available Bandwidth in Inter-Cloud Links for T...
Refining the Estimation of the Available Bandwidth in Inter-Cloud Links for T...Refining the Estimation of the Available Bandwidth in Inter-Cloud Links for T...
Refining the Estimation of the Available Bandwidth in Inter-Cloud Links for T...
 
Bn25384390
Bn25384390Bn25384390
Bn25384390
 
Ieeepro techno solutions 2014 ieee dotnet project - cloud bandwidth and cos...
Ieeepro techno solutions   2014 ieee dotnet project - cloud bandwidth and cos...Ieeepro techno solutions   2014 ieee dotnet project - cloud bandwidth and cos...
Ieeepro techno solutions 2014 ieee dotnet project - cloud bandwidth and cos...
 
Ieeepro techno solutions 2014 ieee java project - cloud bandwidth and cost ...
Ieeepro techno solutions   2014 ieee java project - cloud bandwidth and cost ...Ieeepro techno solutions   2014 ieee java project - cloud bandwidth and cost ...
Ieeepro techno solutions 2014 ieee java project - cloud bandwidth and cost ...
 

More from University of Southern California

Selecting User-Generated Videos for Augmented Reality Applications
Selecting User-Generated Videos  for Augmented Reality ApplicationsSelecting User-Generated Videos  for Augmented Reality Applications
Selecting User-Generated Videos for Augmented Reality ApplicationsUniversity of Southern California
 
Crowdsourcing the Acquisition and Analysis of Mobile Videos for Disaster Resp...
Crowdsourcing the Acquisition and Analysis of Mobile Videos for Disaster Resp...Crowdsourcing the Acquisition and Analysis of Mobile Videos for Disaster Resp...
Crowdsourcing the Acquisition and Analysis of Mobile Videos for Disaster Resp...University of Southern California
 
A Benchmark to Evaluate Mobile Video Upload to Cloud Infrastructures
A Benchmark to Evaluate Mobile Video Upload to Cloud InfrastructuresA Benchmark to Evaluate Mobile Video Upload to Cloud Infrastructures
A Benchmark to Evaluate Mobile Video Upload to Cloud InfrastructuresUniversity of Southern California
 
Harvesting Crowdsourced Mobile Videos under Bandwidth Constraint
Harvesting Crowdsourced Mobile Videos under Bandwidth ConstraintHarvesting Crowdsourced Mobile Videos under Bandwidth Constraint
Harvesting Crowdsourced Mobile Videos under Bandwidth ConstraintUniversity of Southern California
 
Crowdsourcing the Acquisition and Analysis of Mobile Videos for Disaster Resp...
Crowdsourcing the Acquisition and Analysis of Mobile Videos for Disaster Resp...Crowdsourcing the Acquisition and Analysis of Mobile Videos for Disaster Resp...
Crowdsourcing the Acquisition and Analysis of Mobile Videos for Disaster Resp...University of Southern California
 

More from University of Southern California (12)

A Crowdsourcing Tool for Analyzing User-Generated Videos
A Crowdsourcing Tool for Analyzing User-Generated VideosA Crowdsourcing Tool for Analyzing User-Generated Videos
A Crowdsourcing Tool for Analyzing User-Generated Videos
 
Selecting User-Generated Videos for Augmented Reality Applications
Selecting User-Generated Videos  for Augmented Reality ApplicationsSelecting User-Generated Videos  for Augmented Reality Applications
Selecting User-Generated Videos for Augmented Reality Applications
 
Crowdsourcing the Acquisition and Analysis of Mobile Videos for Disaster Resp...
Crowdsourcing the Acquisition and Analysis of Mobile Videos for Disaster Resp...Crowdsourcing the Acquisition and Analysis of Mobile Videos for Disaster Resp...
Crowdsourcing the Acquisition and Analysis of Mobile Videos for Disaster Resp...
 
Entropy-based Histograms for Selectivity Estimation
Entropy-based Histograms for Selectivity EstimationEntropy-based Histograms for Selectivity Estimation
Entropy-based Histograms for Selectivity Estimation
 
A Server-Assigned Crowdsourcing Framework
A Server-Assigned Crowdsourcing FrameworkA Server-Assigned Crowdsourcing Framework
A Server-Assigned Crowdsourcing Framework
 
Maximum Complex Task Assignment in Spatial Crowdsourcing
Maximum Complex Task Assignment in Spatial CrowdsourcingMaximum Complex Task Assignment in Spatial Crowdsourcing
Maximum Complex Task Assignment in Spatial Crowdsourcing
 
Spatial Crowdsourcing Research @ Infolab, USC Fall 2013
Spatial Crowdsourcing Research @ Infolab, USC Fall 2013Spatial Crowdsourcing Research @ Infolab, USC Fall 2013
Spatial Crowdsourcing Research @ Infolab, USC Fall 2013
 
Mediaq Upload Metadata First
Mediaq Upload Metadata FirstMediaq Upload Metadata First
Mediaq Upload Metadata First
 
A Benchmark to Evaluate Mobile Video Upload to Cloud Infrastructures
A Benchmark to Evaluate Mobile Video Upload to Cloud InfrastructuresA Benchmark to Evaluate Mobile Video Upload to Cloud Infrastructures
A Benchmark to Evaluate Mobile Video Upload to Cloud Infrastructures
 
Harvesting Crowdsourced Mobile Videos under Bandwidth Constraint
Harvesting Crowdsourced Mobile Videos under Bandwidth ConstraintHarvesting Crowdsourced Mobile Videos under Bandwidth Constraint
Harvesting Crowdsourced Mobile Videos under Bandwidth Constraint
 
Crowdsourcing the Acquisition and Analysis of Mobile Videos for Disaster Resp...
Crowdsourcing the Acquisition and Analysis of Mobile Videos for Disaster Resp...Crowdsourcing the Acquisition and Analysis of Mobile Videos for Disaster Resp...
Crowdsourcing the Acquisition and Analysis of Mobile Videos for Disaster Resp...
 
iCampus Mobile 2012
iCampus Mobile 2012iCampus Mobile 2012
iCampus Mobile 2012
 

Recently uploaded

All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...Sérgio Sacani
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Nistarini College, Purulia (W.B) India
 
A relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfA relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfnehabiju2046
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Patrick Diehl
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfmuntazimhurra
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhousejana861314
 
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...Sérgio Sacani
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Sérgio Sacani
 
Cultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxCultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxpradhanghanshyam7136
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRDelhi Call girls
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxyaramohamed343013
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Luciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptxLuciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptxAleenaTreesaSaji
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bSérgio Sacani
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCEPRINCE C P
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSarthak Sekhar Mondal
 
Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...RohitNehra6
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTSérgio Sacani
 
Boyles law module in the grade 10 science
Boyles law module in the grade 10 scienceBoyles law module in the grade 10 science
Boyles law module in the grade 10 sciencefloriejanemacaya1
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfSELF-EXPLANATORY
 

Recently uploaded (20)

All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...
 
A relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfA relative description on Sonoporation.pdf
A relative description on Sonoporation.pdf
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdf
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhouse
 
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
 
Cultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxCultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptx
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docx
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
 
Luciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptxLuciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptx
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
 
Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOST
 
Boyles law module in the grade 10 science
Boyles law module in the grade 10 scienceBoyles law module in the grade 10 science
Boyles law module in the grade 10 science
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
 

A Framework for Protecting Worker Location Privacy in Spatial Crowdsourcing

  • 1. A  Framework  for  Protec/ng  Worker  Loca/on   Privacy  in  Spa/al  Crowdsourcing   VLDB  2014   CSCI  587  Nov  12  2014   Cyrus  Shahabi   Privacy  in  spa/al  crowdsourcing   1  
  • 2. Mo/va/on   [1]  hOp://mobithinking.com/mobile-­‐marke/ng-­‐tools/latest-­‐mobile-­‐stats/   Ubiquity  of   mobile  users   Technology   advances  on   mobiles   Network   bandwidth   improvements   From  2.5G  (up  to  384Kbps)   to  3G  (up  to  14.7Mbps)   and  recently  4G  (up  to  100   Mbps)   Smartphone's   sensors.  e.g.,  video   cameras   6.5  billion  mobile   subscrip/ons,  93.5%  of   the  world  popula/on  [1]   VLDB  2014   2  
  • 3. Spa/al  Crowdsourcing   q Crowdsourcing   –  Outsourcing  a  set  of  tasks  to  a  set  of  workers   q Spa/al  Crowdsourcing   –  Crowdsourcing  a  set  of  spa%al  tasks  to  a  set  of  workers.   –  Spa%al  task  is  related  to  a  loca/on  .e.g.,  taking  pictures   Loca/on  privacy  is  one  of  the  major  impediments  that  may  hinder   workers  from  par/cipa/on  in  SC   VLDB  2014   3  
  • 4. Problem  Statement   Workers   Requesters   SC-­‐server   Report  loca+ons   Current  solu/ons  require  the  workers  to  disclose  their  loca/ons   to  untrustworthy  en//es,  i.e.,  SC-­‐server.     A   framework   for   protec/ng   privacy   of   worker   loca/ons,   whereby   the   SC-­‐server   only   has   access   to   data   sani/zed   according  to  differen%al  privacy.     VLDB  2014   4  
  • 5. Outline   v Background   v Privacy  Framework   v Worker  PSD  (Private  Spa/al  Decomposi/on)   v Task  Assignment   v Experiments   VLDB  2014   5  
  • 6. U/lity-­‐Privacy  Trade-­‐off   VLDB  2014   Utility 100% 100% 0%Privacy 0% 6  
  • 7. Related  Work   v Pseudonymity  (using  fake  iden/ty)   •  e.g.  fake  iden/ty  +  loca/on  ==  resident  of  the  home   VLDB  2014   7   v   K-­‐anonymity  model    (not  dis/nguish  among  other  k  records)   iden//es  are  known   the  loca/on  k-­‐anonymity  fails  to  prevent  the  loca/on  of  a  subject   being  not  iden/fiable   all  k  users  reside  in  the  exact  same  loca/on    k-­‐anonymity,  do  not  provide  rigorous  privacy   v   Cryptography   such  technique  is  computa%onal  expensive   =>not  suitable  for  SC  applica/ons  
  • 8. Differen/al  Privacy  (DP)   DP  ensures  an  adversary  do  not  know  from  the  sani/zed  data  whether  an   individual  is  present  or  not  in  the  original  data   Given  neighboring  datasets                and              ,  the  sensi/vity  of  query  set  QS  is  the   the  maximum  change  in  their  query  results   ∑= −= q 1i 21 , |)()(|max)( 21 DQSDQSQS DD σ 1L  -­‐sensi+vity:   1D 2D [Dwork’06]  shows  that  it  is  sufficient  to  achieve          -­‐DP  by  adding  random   Laplace  noise  with  mean   εσλ /)(QS= ε DP  allows  only  aggregate  queries,  e.g.,  count,  sum.   ε ε≤ = = ]Pr[ ]Pr[ ln 2 1 UQS UQS D D A  database  produces  transcript  U  on  a  set  of  queries.  Transcript  U  sa/sfies          -­‐ dis/nguishability  if  for  every  pair  of  sibling  datasets              and                        and     they  differ  in  only  one  record,  it  holds  that   1D ,2D 21 DD = ε :  privacy  budget   -­‐dis$nguishability  [Dwork’06]  ε VLDB  2014   8  
  • 9. Outline   v Background   v Privacy  Framework   v Worker  Private  Spa/al  Decomposi/on   v Task  Assignment   v Experiments   VLDB  2014   9  
  • 10. 3. Geocast {t,GR} 2. Task Request t Requesters Workers SC-Server Worker Database 1. Sanitized ReleasePSD 4. Consent Cell Service Provider GR 0. Report Locations Privacy  Framework   0.  Workers  send  their  loca/ons  to  a   trusted  CSP   2.  SC-­‐server  receives  tasks  from   requesters   3.  When  SC-­‐server  receives  task  t,  it   queries  the  PSD  to  determine  a  GR  that   enclose  sufficient  workers.  Then,  SC-­‐ server  ini/alizes  geocast  communica/on   to  disseminate  t  to  all  workers  within  GR   4.  Workers  confirm  their  availability  to   perform  the  assigned  task   1.  CSP  releases  a  PSD  according  to          .   PSD  is  accessed  by  SC-­‐server   ε Workers    trust  SCP   Workers  do  not  trust  SC-­‐server   and  requesters   Focus  on  private  task  assignment   rather  than  post  assignment   VLDB  2014   10  
  • 11. Design  Goal  and  Performance  Metrics   Assignment  Success  Rate  (ASR):  measures  the  ra/o  of  tasks  accepted  by   workers  to  the  total  number  of  task  requests   Worker  Travel  Distance  (WTD):  the  average  travel  distance  of  all   workers   System  Overhead:  the  average  number  of  no/fied  workers  (ANW).  ANW   affects  both  communica%on  overhead  required  to  geocast  task  requests   and  the  computa%on  overhead  of  matching  algorithm   Protec/ng  worker  loca/on  may  reduce  the  effec/veness  and  efficiency   of  worker-­‐task  matching,  captured  by  following  metrics:   VLDB  2014   11  
  • 12. Outline   v Background   v Privacy  Framework   v Worker  PSD  (Private  Spa+al  Decomposi+on)   v Task  Assignment   v Experiments   VLDB  2014   12  
  • 13. Adap/ve  Grid  (Worker  PSD)   A B C D Level 1 Level 2 1c 2c 3c 4c 5c 6c 7c 8c9c 10c 11c 12c 13c 14c 16c 17c 15c 18c 19c 20c 21c )100( ' =AN )100( ' =BN )100( ' =CN )200( ' =DN ⎟ ⎟ ⎠ ⎞ ⎜ ⎜ ⎝ ⎛ ⎥ ⎥ ⎤ ⎢ ⎢ ⎡ × = 2 1 4 1 ,10max k N m ε Creates  a  coarse-­‐grained,  fixed  size                                  grid  over  data  domain.  Then  issues                  count  queries  for  each  level-­‐1  cell  using     11 mm ×2 1m 1ε Par//ons  each  level-­‐1  cell  into                                    level-­‐2  cells,                is  adap/vely  chosen   based  on  noisy  count                  of  level-­‐1  cell   22 mm × 2m 'N ⎥ ⎥ ⎤ ⎢ ⎢ ⎡ × = 2 2 2 ' 4 1 k N m ε 21 εεε += [Qardaji’13]     VLDB  2014   13  
  • 14. Customized  AG   Expected  #workers  (noisy  count)  in  level-­‐2  cells   22 2 2 //' εkmNn == large            leads  to  high  communica+on  cost  n Increase                to  decrease  overhead,  but  only  to  the  point  where  there  is  at   least  one  worker  in  a  cell     2m 1   0.5    6   2.8   0.5   0.25   5   5.6   0.1   0.05   2   28   J    Customized  AG       %)88,2( 2 == hpk ε 2ε 2m n 1   0.5   3   11   0.5   0.25   2   25   0.1   0.05   1   100   L    Original  AG       )5( 2 =k ε 2ε 2m n 100'=N ⎟⎟ ⎠ ⎞ ⎜⎜ ⎝ ⎛ −−= 2/1 exp 2 1 1 ε PSD h count p The  probability  that  the  real  count  is  larger  than  zero:   VLDB  2014   14  
  • 15. Customized  AG   •  Original  AG  and  Customized  AG  adapts  to  data  distribu/ons   •  Original  AG  minimizes  overall  es/ma/on  error  of  region   queries  while  customized  AG  increases  the  number  of  2nd   level  cells   VLDB  2014   15   Original  AG   Customized  AG  Yelp  Dataset  
  • 16. Outline   v Background   v Privacy  Framework   v Worker  PSD  (Private  Spa/al  Decomposi/on)   v Task  Assignment   v Experiments   VLDB  2014   16  
  • 17. Analy/cal  U/lity  Model   SC-­‐server  establishes  an  Expected  U%lity  (              )  threshold,  which  is  the   targeted  success  rate  for  a  task.                    >              .     EU a pEU            is  a  random  variable  for  an  event  that  a  worker  accepts  a  received  task   aa pFalseXPpTrueXP −==== 1)(;)( X wa a pU pwBinomialX )1(1 ),(~ −−=⇒ Assuming              independent  workers.              is  the  probability  that  at  least  one   worker  accepts  the  task     Uw We  define  Acceptance  Rate  as  a  decreasing  func/on  of  task-­‐worker   distance  (e.g.  linear,  Zipian)   10);( ≤≤= aa pdFp VLDB  2014   17  
  • 18. Acceptance  Rate  Func/ons   VLDB  2014   18   Acceptacerate   distance  0   MTD   0.5  
  • 19. Geocast  Region  Construc/on   Determines  a  small  region  that  contains  sufficient  workers   2.     Qci ← 4.      If                                            ,  return  GR    EUU ≥ 5.     MTDGRneighborsscneighbors i ∩−= }'{ 6.            ;    Go  to  2.  neighborsQQ ∪= 1.      Init  GR  =  {},  max-­‐heap                of  candidates                  Q  =  {  the  cell  that  contains            }       t Q t 1c 2c 3c 4c 5c 6c 7c 8c 9c 10c 11c 12c 14c 16c 17c 15c 18c 19c 20c 21c 13c 3.     )1)(1(1 icUUU −−−← Greedy  Algorithm  (GDY)   VLDB  2014   19  
  • 20. Par/al  Cell  Selec/on   t 0t ic Sub-cell 'ic 1t 2t 3t 4t 5t 6t 7t 8t Splisng   ic 13c 1c 2c 3c 4c 5c 6c 7c 8c 9c 10c 11c 12c 14c 16c 17c 15c 18c 19c 20c 21c Splisng   7c L  The  number  of  workers  can  s/ll  be  large  with  AG,  especially  when              small    2ε Allow  par$al  cell  inclusion  on  the  lastly  added  cell     ic VLDB  2014   20  
  • 21. Internet WLAN Cellular Mobile  Ad-­‐hoc  Networks Communica/on  Cost   t 1c 2c 3c 4c 5c 6c 7c 8c 9c 10c 11c 12c 14c 16c 17c 15c 18c 19c 20c 21c 13c The  more  compact  the  GR,   the  lower  the  cost   Measurement:   rangeionCommunicat countHop × = 2 workerstwobetweendistanceFarthest Infrastructure-­‐based  Mode  v.s  Infrastructure-­‐less  Mode   )( )( BALLMINarea GRarea DCM = Digital  Compactness  Measurement  [Kim’84]   VLDB  2014   21  
  • 22. Geocast  Regions   VLDB  2014   22   A   B   C   D  
  • 23. Outline   •  Background   •  Privacy  Framework   •  Worker  PSD  (Private  Spa/al  Decomposi/on)   •  Task  Assignment   •  Experiments   VLDB  2014   23  
  • 24. Experimental  Setup   •  Datasets   •  Assump/ons   –  Gowalla  and  Yelp  users  are  workers   –  Check-­‐in  points  (i.e.,  of  restaurants)  are  task  loca/ons   •  Parameter  sesngs     •  1000  random  tasks  x  10  seeds   Name   #Tasks   #Workers   MTD  (km)   Gowalla   151,075   6,160   3.6   Yelp   15,583   70,817   13.5   }1,7.0,4.0,1.0{=ε }9.0,7.0,5.0,3.0{=EU }1,7.0,4.0,1.0{=MaxAR VLDB  2014   24  
  • 25. GR  Construc/on  Heuris/cs   (Gow.-­‐Linear)   0 20 40 60 80 100 120 Eps=0.1 Eps=0.4 Eps=0.7 Eps=1 GDY G-GR G-PA G-GP 0 0.1 0.2 0.3 0.4 0.5 Eps=0.1 Eps=0.4 Eps=0.7 Eps=1 GDY G-GR G-PA G-GP 0 2 4 6 8 Eps=0.1 Eps=0.4 Eps=0.7 Eps=1 GDY G-GR G-PA G-GP ANW   WTD-­‐FC   HOP   VLDB  2014   GDY  =  geocast  (GREedy  algorithm)  +  original  Adap/ve  grid  (AG)   [Qardaji’13]     G-­‐GR  =  geocast  +  AG  with  customized  GRanularity   G-­‐PA  =  geocast    with  PAr/al  cell  selec/on  +  original  Adap/ve  grid  (AG)   G-­‐GP  =  geocast    with  Par/al  cell  selec/on  +  AG  with  customized  Granularity   25  
  • 26. Effect  of  Grid  Size  to  ASR   50 60 70 80 90 100 0.1 0.2 0.4 0.8 1.41 1.6 3.2 6.4 12.8 25.6 ASR k2 Gowalla-Linear Gowalla-Zipf Yelp-Linear Yelp-Zipf Over-provision Under-provision Average  ASR  over  all  values  of  budget  by  varying   k2   VLDB  2014   26  
  • 27. Compactness-­‐based  Heuris/cs   (Yelp-­‐Zipf)   HOP   ANW   0 2 4 6 8 10 Eps=0.1 Eps=0.4 Eps=0.7 Eps=1 G-GP-Pure G-GP-Hybrid G-GP-Compact 0 20 40 60 80 Eps=0.1 Eps=0.4 Eps=0.7 Eps=1 G-GP-Pure G-GP-Hybrid G-GP-Compact VLDB  2014   27  
  • 28. ANW   WTD-­‐FC   ASR   Overhead  of  Archieving  Privacy   (Gow.-­‐Zipf)   0 20 40 60 Eps=0.1 Eps=0.4 Eps=0.7 Eps=1 Privacy Non-Privacy 0 0.1 0.2 0.3 0.4 Eps=0.1 Eps=0.4 Eps=0.7 Eps=1 Privacy Non-Privacy 0 20 40 60 80 100 Eps=0.1 Eps=0.4 Eps=0.7 Eps=1 Privacy Non-Privacy VLDB  2014   28  
  • 29. Effect  of  Varying  MAR   (Yelp-­‐Linear)   0 10 20 30 40 50 AR=0.1 AR=0.4 AR=0.7 AR=1 Eps=0.1 Eps=0.4 Eps=0.7 Eps=1 ANW   CELL   0 0.1 0.2 0.3 0.4 AR=0.1 AR=0.4 AR=0.7 AR=1 Eps=0.1 Eps=0.4 Eps=0.7 Eps=1 WTD-­‐FC   0 2 4 6 8 AR=0.1 AR=0.4 AR=0.7 AR=1 Eps=0.1 Eps=0.4 Eps=0.7 Eps=1 29  VLDB  2014  
  • 30. Effect  of  Varying  EU   (Yelp-­‐Linear)   ANW   CELL  WTD-­‐FC   0 10 20 30 40 50 EU=30 EU=50 EU=70 EU=90 Eps=0.1 Eps=0.4 Eps=0.7 Eps=1 0 0.1 0.2 0.3 0.4 EU=30 EU=50 EU=70 EU=90 Eps=0.1 Eps=0.4 Eps=0.7 Eps=1 0 2 4 6 8 EU=30 EU=50 EU=70 EU=90 Eps=0.1 Eps=0.4 Eps=0.7 Eps=1 VLDB  2014   30  
  • 31. Demo   VLDB  2014   hOps://www.youtube.com/watch?v=4zkiJ9gk79s   hOp://geocast.azurewebsites.net/geocast/   31  
  • 32. Conclusion   Iden/fied  geocas/ng  as  a  needed  step  to  preseve  privacy  prior   to  workers  consen/ng  to  a  task   Introduced  a  novel  privacy-­‐aware  framework  in  SC,  which   enables  workers  par/cipa/on  without  compromising  their   loca/on  privacy   Provided  heuris/cs  and  op/miza/ons  for  determining  effec/ve   geocast  regions  that  achieve  high  assignment  success  rate  with   low  overhead   Experimental  results  on  real  datasets  shows  that  the  proposed   techniques  are  effec/ve  and  the  cost  of  privacy  is  prac/cal   VLDB  2014   32  
  • 33. References   VLDB  2014   Hien  To,  Gabriel  Ghinita,  Cyrus  Shahabi.  A  Framework  for  Protec%ng  Worker   Loca%on  Privacy  in  Spa%al  Crowdsourcing.  In  Proceedings  of  the  40th   Interna/onal  Conference  on  Very  Large  Data  Bases  (VLDB  2014)   Hien  To,  Gabriel  Ghinita,  Cyrus  Shahabi.  PriGeoCrowd:  A  Toolbox  for  Private   Spa%al  Crowdsourcing.  (demo)  In  Proceedings  of  the  31st  IEEE  Interna/onal   Conference  on  Data  Engineering  (ICDE  2015)   33