<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Role of privacy attacks and utility metrics in crowdsourcing for urban data analysis.</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Information Science and Engineering, JSS Academy of Technical Education</institution>
          ,
          <addr-line>Bengaluru, Karnataka</addr-line>
          ,
          <country country="IN">India</country>
        </aff>
      </contrib-group>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>In current era, excessive usage of mobile devices and internet people often participate in the surveys, questionnaires, usability tests, performance measures and quantitative reviews. This process of outsourcing the data collection from the crowd is called mobile crowdsourcing. It involves large group of participating people and allows the researcher or analyst to gather data in real time at relatively lower cost when compared to the traditional methods of data collection. Mobile crowdsourcing has applications in idea generation, urban planning and urban mobility, public participation in problem solving and decision making, collective intelligence, crowd wisdom and human computation. There is a threat to individual's sensitive or personal information when the data is shared. Privacy preservation is a major concern in mobile crowdsourcing as enormous amount of data is being collected from the crowd and used for analytics, forecasting and decision making by extracting useful information. These data contain private or sensitive information related to individual/person who owns it. If the data is used in its original form, it may lead to privacy disclosure as it contains person-specific data. Hence, it is the duty of data curator to anonymize the data, before it is published for public use. The original data should be anonymized in such a way that, it should be very challenging for intruder to obtain sensitive information by means of any privacy attack model.</p>
      </abstract>
      <kwd-group>
        <kwd>Mobile crowdsourcing</kwd>
        <kwd>Privacy Preserving Data publishing</kwd>
        <kwd>Data Anonymization</kwd>
        <kwd>Privacy attack</kwd>
        <kwd>Data utility</kwd>
        <kwd>Privacy breach</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Urban data analysis is a process of collecting, protecting the data and analyzing the data
to improve the city living. Even though the traditional methods of data collection such
as surveys conducted through person provide detailed information it is time consuming
and cost in- efficient [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. In recent years crowdsourcing, crowd sensing or mobile
crowdsourcing are found to be efficient methods [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] of populating the data, on which
Copyright © 2020 for this paper by its authors. Use permitted under Creative
Commons License Attribution 4.0 International (CC BY 4.0).
the researchers and analyst can work upon and come up with some decision or create
policies.
      </p>
      <p>
        Mobile crowdsourcing is one of the main strategies to carry out real time urban planning
tasks such as municipal monitoring, smart city construction and last mile logistics by
coordinating with mobile users. However, the success of such outsourcing depends
upon how well the crowd workers response and their commitments. Micro Workers [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ],
Amazon Mechanical Turk [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], crowd SPRING [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] and Google consumer surveys [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]
are some of the crowdsourcing tools, they make the task of data collection simpler for
individuals as well as business organizations. The advantage of mobile crowdsourcing
lies in converting the time-consuming tasks that is expensive and difficult to complete.
The tasks are broken down into more manageable tasks and are outsourced to the crowd
across the internet, called as microtasks. Figure 1 shows the process of crowdsourced
data collection and management system for urban data analysis.
      </p>
      <p>The crowd maybe human beings or the mobile applications that get involved in
conducting various surveys of health care, political data, property information and
mobility/transport data. The data thus collected gets stored in a fog/cloud/internet and
is utilized for various purposes- planning and decision making, analysis, building
models, urban planning and urban mobility, by various users such as researcher,
statistician, analyst or an intruder.</p>
      <p>Data requestor’s job is to publish the task, monitor the task and to collect the
answers. The task types may be single choice, multiple choices, fill in the blanks or
collection of information. The workers participate in the tasks that are published and
sends answers. When series of such tasks are participated by the workers there may be
chances of identifying them. For example, in task 1 the survey may be conducted on
astrology/horoscope services and hence the date of birth, time and place of birth gets
collected. In the next task the survey may be on market survey of a specific product,
here the age, workplace and salary of the person is collected. Now when we take the
common people who have participated in both surveys and assign an identifier to them,
we clearly get the date of birth, salary and age information of the specific person. Table
1 presents the applications of mobile crowdsourcing and the information collected in
such application that may result in disclosure.</p>
      <p>
        Every crowdsourcing marketplace has its own policies (for example Amazon Turk
machine’s policies [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]) that prevent the requestor to collect the personally identifiable
information (PII) from the workers that disclose the identity of the workers directly.
The attributes like age, zip code, salary information that gets collected as a part of
survey may not directly identify the individual (such attributes are called quasi
identifiers.) but when combined with other data set, there is high probability of
individual disclosure. Despite of policies restrictions, it is not possible to prevent the
mis use or combination of information. Hence there is a high need for an anonymization
technique to protect the individual’s disclosure in any form. The basics of any
anonymization technique is presented here.
      </p>
      <p>Let A be the original mobile crowdsourced data table, the identifiers (if present) are
removed and anonymization methods are applied on Quasi-Identifier’s. The
anonymized table A` consist of (Quasi-Identifier’s and Sensitive Attributes). From the
literature, the attributes can be classified and defined as follows:</p>
      <p>1. QuasiIdentifiers also called as (QIDs)- Used to identify the individuals but not
uniquely for example- person’s age, zip code and place of work. This is shown in Table
2.</p>
      <p>2. Confidential/sensitive attributes (SA)- Person’s sensitive information which needs
to be secured and anonymized, for example disease, salary information, political
interest etc. as shown in Table 2.</p>
      <p>The objective of any anonymization technique is to prevent any third party from
identifying an individual
Contribution of the paper- The paper discusses role of privacy attacks and utility
metrices by presenting various attacks that may occur in the mobile crowdsourced data
and at the same time various available metrices for measuring the information loss that
happens due to anonymization. The paper is organized as follows Section 2 presents
the existing system. Section 3 provides details of privacy attacks in crowdsourcing.
Section 4 discusses the utility metrices for measuring the information losses incurred
during the process of anonymization. Section 5 presents conclusion and future work.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Existing systems</title>
      <p>
        There is always a tradeoff between data utility and privacy. If we preserve more
information without disclosing it in its original form, it leads to less data utility. If the
data is disclosed in original form, complete data is utilized which in turn may lead to
privacy breach. Data Anonymization uses one or more techniques to make it impossible
or difficult to identify a particular individual in the stored data. In order to enhance the
utility of the collected data and to preserve the privacy many techniques are available
in the literature [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13 ref14 ref7 ref8 ref9">7-14</xref>
        ]. These techniques use either generalization, suppression or data
swapping mechanisms to achieve privacy. For example, consider Table 2, here the zip
code and the age are quasi-identifiers, the values are suppressed to prevent further
disclosures. K- anonymity [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], is a privacy preserving method that groups similar QID
valued attributes into k group, hence Table 3 is 3-anonymous version of table 2.
      </p>
      <p>ID
1
2
3
Anonymous</p>
      <p>Disease
Heart Disease
Heart Disease
Heart Disease</p>
      <p>Gastritis
Heart Disease</p>
      <p>Cancer
Heart Disease</p>
      <p>Cancer
Cancer
version of original table
Here k=3, indicates number of records grouped into one class where, QID values are
same in all three records leading to 3-anonymity.</p>
      <p>
        Differential Privacy (DP) [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ][
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] was initially developed for interactive query and
response system. The query results are randomized using the distributions like the
Laplace, Gaussian or Geometric distributions. The variant of DP is non interactive DP,
here the sanitized dataset is released to for public use regardless of type of the requestor.
Such non interactive DP measures [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ][
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] suffer badly with ‘curse of dimensionality’
which means as the number of dimensions increases with applications of privacy
techniques to the individual attributes having high correlations gets weakened [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ],
[
        <xref ref-type="bibr" rid="ref21">21</xref>
        ], this increases the threats as well as reduces the utility. Even worse, the privacy
guarantee of DP degrades exponentially when multiple correlated queries are
processed. Xuebin Ren et.al [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] uses a Local Differential Privacy (LDP) technique
for high dimensional crowd sourced data publication. It is particularly useful in
crowdsourced data, where each user contributes the single private data record to an
untrusted server. LDP has its own practical applications in collecting user statistics
without harming user privacy. For example, RAPPOR [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ], it is a Chrome extension.
It collects Windows process names and Chrome Homepages from user devices in an
LDP manner. Microsoft has deployed a data collection mechanism that is LDP-enabled
in Windows Insiders program to collect application usage statistics. Therefore, the users
as well as the software companies gets benefitted from the LDP usage because users
obviously need of privacy, the appreciation of preserving user privacy may gains
positive reputation for companies. Lastly, the intruders may be able to retrieve or even
steal the user data, that violates user privacy.
      </p>
    </sec>
    <sec id="sec-3">
      <title>Privacy attacks in crowd sourced data</title>
      <p>
        Privacy is major concern in mobile crowdsourcing. The essential entities of mobile
crowdsourcing are the data requestors/end users – these entities request the data through
the tasks and then utilizes the data provided by the participants. Data workers/
Participants- provides the response by participating in the surveys/collecting the data
of their interest. The tasks are the entities that are distributed or shared across the
participants. The privacy threat may occur on the participant or an individual may be
disclosed on the data provided by the participant. Many privacy attacks have been
researched in the literature [
        <xref ref-type="bibr" rid="ref49">49</xref>
        ] with respect to different domains. This section provides
the overview of the possible privacy attacks in mobile crowdsourced environment.
3.1 Task tracing attack [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ][
        <xref ref-type="bibr" rid="ref25">25</xref>
        ] occurs on the crowd workers, the crowd workers
pulls the tasks from the market place or distribution servers based on their
interest. When the tasks are downloaded the worker shares some of the sensitive
attributes such as age, location, time, preferences and the type of sensing device. The
tasks pulled by the workers include details of traffic information, political surveys, real
time weather information etc. By studying the type and preferences of tasks pulled by
the worker there is possibility of leakage of the sensitive information of the participants
such as age, location, race, organization, location and other related attributes of the
participants. However, tracing more than one tasks pulled by the worker and collecting
the information about the participant may disclose the sensitive attributes and lead to
privacy threat. For example, consider table 4, the crowd worker is an engineering
undergraduate student with his original information in university database. Table 5 and
Table 6 contain the information of the tasks pulled by the participant and the list of
accepted tasks. The tasks may be are related to traffic, weather conditions and
recommendation system.
Task_1
Task_2
Task_3
26
26
25
      </p>
      <p>M
M
F</p>
      <sec id="sec-3-1">
        <title>Android</title>
        <p>
          Android
Windows
560098
560098
560098
3.2 Malicious attack. In crowd sourcing, there may be a malicious requestor or
malicious worker or a malicious task, such attacks are called as malicious attacks [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ].
It is an intentionally attack projected by the requestor on the participant or vice versa.
The requestor creates the malicious tasks and pushes them to the participants and
imposes strict limitations to participant attributes or sensing devices. These attacks are
also called as narrow tasking attack [
          <xref ref-type="bibr" rid="ref37">37</xref>
          ] which are malicious and intentionally created
to collect specific attributes to violate their privacy. The other variation of malicious
attacks are selective attacks [
          <xref ref-type="bibr" rid="ref37">37</xref>
          ] where in the task may be pushed and assigned to
selective group of participants to trace their attributes or to learn about them. If a
participant cannot differentiate between genuine and a malicious task he might be under
the attack.
3.3 Collusion attack [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ] happens when the requestors are conspired. Consider table 7
and table 8 that consist of information collected by the requestor 1 and 2 separately.
10-5-19 560098 M
They create the tasks separately and distribute to the workers. The response for each of
these tasks do not reveal any identity however when the requesters share the crowd
workers information collision attack take place that may lead to disclosure.
3.4 Sybil attacks are common in network domain where in node in the network
operates as multiple identities actively at the same time. The same type of attack may
occur in crowdsourcing also [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ][
          <xref ref-type="bibr" rid="ref27">27</xref>
          ]. The requestors may create fake identities to
collect more data from the participants. By aggregating or linking the data provided by
the participant, the attacker identifies the crowd workers and get access to their sensitive
data. It is very difficult for workers to differentiate sybil attackers to the normal
requesters. As a measure for such attacks spatial cloaking or perturbation methods are
used that perturbs the original location of the participant [
          <xref ref-type="bibr" rid="ref38">38</xref>
          ][
          <xref ref-type="bibr" rid="ref39">39</xref>
          ][
          <xref ref-type="bibr" rid="ref40">40</xref>
          ].
3.5 Background knowledge attack an adversary has some background knowledge of
the participant by having access to other data sources such as census, voter’s
information or medical history. He now acts as the requestor and assigns tasks to the
workers. The result obtained may be mapped with prior information to get more
knowledge about a specific individual. Consider an example of Kiva micro funds, it is
a nonprofit organization that allows people to lend money via internet to low income
entrepreneur’s and students across 80 countries [
          <xref ref-type="bibr" rid="ref41">41</xref>
          ]. The basic objective of the
organization is to connect the borrowers and the lenders across the world. The dataset
published by the organization is available in Kaggle Dataset’s inaugural Data Science
for Good challenge [
          <xref ref-type="bibr" rid="ref42">42</xref>
          ]. There are 20 columns in the dataset that is publicly available,
consisting of sensitive information like purpose of borrowing loan, Number of lenders
and Funded amount. Non sensitive attributes such as gender, country and region. Using
this data set and with background knowledge of gender, country and region the attacker
plots Voronoi diagram and discloses the sensitive information about the individual. As
a measure to this attack, privacy preserving using Voronoi Polygon (PP-Voronoi) [
          <xref ref-type="bibr" rid="ref43">43</xref>
          ]
is used. The participant forms a cloaked region to prevent his actual identity.
3.6 Location based attacks [
          <xref ref-type="bibr" rid="ref44">44</xref>
          ]- When the participant participates in the tasking his
location information such as home address, working information living habit etc. may
be revealed through the sensing device, that the participant doesn’t want to disclose.
When the task is submitted along with the location information it reveals lot of personal
information of the participant [
          <xref ref-type="bibr" rid="ref45">45</xref>
          ]. Two examples of such sensing applications are
Gigwalk [
          <xref ref-type="bibr" rid="ref46">46</xref>
          ] and mCrowd [
          <xref ref-type="bibr" rid="ref47">47</xref>
          ]. They provide the marketplace for tasks that can be
performed through smartphones such as confirming some products available on the
shelves by taking images, verifying the prices of the products, traffic related
information, weather conditions etc. Location homogeneity attack [
          <xref ref-type="bibr" rid="ref28">28</xref>
          ] and Location
inference attack [
          <xref ref-type="bibr" rid="ref29">29</xref>
          ]- these attacks are based on the location and background
knowledge When k-anonymity is used as privacy preserving technique there is
possibility of such attacks. The requestor with the background knowledge of some
sensitive information creates the tasks and based on the response provided by the
participant he gets more information.
Consider the table 3 that is publicly available and the information in Table 9 is compiled
based on the responses obtained by the participant. The participant pulls the task based
on his interests and also updates the location data that is in the form of longitude and
latitude. By comparing both the tables sensitive inferences such as type of disease can
be drawn.
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>Counter Measures</title>
        <p>Anonymization
methods and
strong policies.</p>
        <p>Policies and
preferences.</p>
        <p>Policies and
preferences.</p>
        <p>Anonymization
Methods
Spatial cloaking,
Special
transformation
Generalization and
perturbation
PP-Voronoi</p>
      </sec>
      <sec id="sec-3-3">
        <title>Spatial cloaking</title>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Utility metrics for quantifying information loss and privacy.</title>
      <p>Mobile crowdsourcing has many advantages like it helps to collect large amount of data
samples, speed of data collection, inexpensiveness of data collections and better quality
of data collected. The collected data is published for monetary purpose or it is utilized
for making decisions and to carry out research. Such a data contains sensitive attributes
and quasi identifiers and when published it may result in individual disclosures. Hence
there is a need to anonymization techniques that balances between the privacy and
utility of the published data. This section discusses the metrics to quantify the
information loss that is incurred when carrying out the anonymization.
These metrices can be classified into two categories based on the objectives of
anonymization. Privacy level measuring metrices measures the privacy level like how
well the technique safeguards the privacy from known privacy breaches. Information
loss metrices measures the amount of information loss incurred when the data is
processed. In former case higher the value better is the technique, in latter case lower
the value better is the technique.
4.1</p>
      <p>
        Privacy Metrices
It is essential to measure the amount of privacy that is preserved by a specific technique.
Most of the existing techniques for anonymization are either based on discretization or
randomization. In discretization the values of attributes are partitioned into intervals,
for example the age attribute with value =8, can be anonymized as interval data
[1020]. In randomization the original value xi is returned as xi+r, where r is the random
value drawn from some distribution. The first proposed metric to measure privacy level
is confidence level [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ]. The metric is used for technique that uses discretization for
anonymization, it measures how the original values can be estimated from the
anonymized values. If it can be estimated with c% confidence that the original value x
lies in the interval [x1,x2], then the width of the interval (x2-x1) defines the amount of
privacy at c% confidence level. For example, for the age attribute, if width of interval
is 10, the level of privacy for such technique is 10% confidence.
      </p>
      <p>
        For randomization-based methods, the distribution of random variable is taken into
consideration. Average conditional entropy [
        <xref ref-type="bibr" rid="ref31 ref32">31,32</xref>
        ] is the metric based on the concept
of information entropy is used to measure the level of privacy.
      </p>
      <p>
        Let X be original data distribution and Z be noisy distribution, the average conditional
privacy of X given Z is P(X|Z)= 2p(X|Z) (1)
The level of privacy may also be measured using variance between the original data
and the anonymized data [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ]. If x is the original variable and y is the distorted variable
variance(x-y)/ variance(x) expresses how closely one can estimate original values using
the distorted data.
Privacy preserving techniques reduce the quality of the data, that leads to information
loss. Information loss metrices quantify this loss of utility.
      </p>
      <p>Definition: Given two values v and v` where v is original value and v` is treated value,
the deviation of v` from v is the information loss.</p>
      <p>
        Loss Metric[
        <xref ref-type="bibr" rid="ref34">34</xref>
        ] was proposed to determine the amount of loss incurred when
generalizations are applied on the categorical data. For example, consider the hierarchy
for work class, the ontology of work class tree is shown in Figure 2.
      </p>
      <p>Un Employed
No pay</p>
      <p>
        Not worked
(2)
(3)
where, i is the attribute and j are the value of the attribute for an individual record. For
Table 3 (anonymous form of table 2), loss for each equivalence class is 0.3, 0.6 and .3
respectively. It can be further computed that total information loss incurred is 13%.
Per record information loss metric [
        <xref ref-type="bibr" rid="ref35">35</xref>
        ]- The probabilities of generalized to original
are considered to determine the information loss. If a variable B is place of residence
that is generalized to B` that could be a state or country then the information loss is
given by ∑. ɛ0 (, `, 1, 2), where r1 is value taken by B in record r of F and
Self Employed
workclass
      </p>
      <p>Government
inc
not inc</p>
      <p>State Govt</p>
      <p>Local</p>
      <p>Federal
Let Q denote number of leaf nodes in the hierarchy tree T and let Qp denote number of
leaf nodes in subtree rooted at P. With generalization, the loss is given by
(Qp-1)/(Q1) For example if the attribute value is State govt and if this attribute is generalized to
Government, the amount of loss incurred is computed to be = 2/6. For numeric
attributes the loss metric compares the size of generalized domain to the total domain
size of attribute.</p>
      <p>Here m is the maximum attribute value and ‘n’ is the generalized or suppressed attribute
value in the anonymous table. For the domain of attribute there exist maximum(max)
and minimum(min) values. For example, if age is considered as an attribute then the
domain range is 1-100. Total loss is summation of loss incurred for individual records.</p>
      <p>LM i, j= (m-n)/ (maxj- minj)</p>
      <p>LM(T)= ∑|iT=|1 (LM i,j)
r2 is value taken by B` in record r of G.For Example: If the place of residence in a
record is Madhya Pradesh or Bhopal, it could be generalized to India. P (B=Bhopal |
B`= India) &lt; P (B= Madhya Pradesh | B` =India). Since population of India is 1300
million, Madhya Pradesh is 72.6 million and Bhopal is 17.9 million. PRIL scores for P
(B=Bhopal | B`= India) = 0.013 and P (B= Madhya Pradesh | B` =India) = 0.055. Lesser
this value there is more data loss.</p>
      <p>
        Discernibility Metric (DM) [
        <xref ref-type="bibr" rid="ref36">36</xref>
        ] measures number of records that are identical to a
given record. The higher the value, the more information that is lost. For example, in
the k-anonymity, k −1 record is identical to any given record, therefore the
discernibility value will be at least k −1 for any record. More the value k, will increase
generalization and suppression, and consequently the discernibility value. For this
reason, this metric is considered to be the opposite concept of the k-anonymity. The
metric is mathematically represented as
      </p>
      <p>DM(m,k)=∑∀89 ;.=|89|@? ||4 + ∑∀89 ;.=|89|&gt;?||||
EQ represents the equivalence class generated by anonymization method m and T
represents total number of tuples. The first sum computes penalties for each non
suppressed or generalized records and second sum for the suppressed records. In
anonymized Table 3, since age attribute of all records are generalized, information loss
using discernibility metric is 3*9=27. This indicates that with increase in equivalence
class size the information loss also increases.</p>
      <p>
        Many other privacy and information loss metrices are discussed in the literature [
        <xref ref-type="bibr" rid="ref48">48</xref>
        ]
however the discussed metrics are suitable and easy to evaluate for crowdsourced data.
Table 11 shows the summary of privacy loss and information loss metrices.
(4)
      </p>
      <sec id="sec-4-1">
        <title>Name</title>
        <p>Confidence level
Average
conditional entropy
Variance
Loss Metric
Per
information
metric
Discernibility
metric
record
loss</p>
      </sec>
      <sec id="sec-4-2">
        <title>Attribute type Numeric Numeric</title>
      </sec>
      <sec id="sec-4-3">
        <title>Numeric Categorical numerical Numerical</title>
      </sec>
      <sec id="sec-4-4">
        <title>Categorical/Numerical</title>
        <p>and
Measuring the information loss is important if the applications that uses the data carry
out statistics on the collected information. As discussed previously crowdsourced data
finds its applications in many areas, therefore it is essential to anonymize the data as
well as check the amount of loss incurred by application of methods. If there is no
utilization of the data then it simply becomes a liability.
5</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Conclusion and future work</title>
      <p>The essential feature of mobile crowd sourcing is collecting large amount of data
efficiently and in a cost-effective manner. Diverse and large work force contribute in
performing the task. Hence mobile crowdsourcing finds its applications in problem
solving, decision making and wisdom sharing. The privacy of the crowd workers may
be at stake and they may be subjected to any of the attacks as discussed in this paper.
Therefore, there is a great need of robust privacy preserving technique which is not
vulnerable to existing attack. Added to this there is requirement of an efficient privacy
preserving technique that protects the privacy and also does not harm the utility of the
data. In future, the aim of this study is to explore emerging privacy attacks, evolving
existing attacks, to mitigate these attacks by proposing and developing an efficient
privacy preserving technique for mobile crowdsourcing.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Pilloni</surname>
          </string-name>
          , Virginia.
          <article-title>"How data will transform industrial processes: Crowdsensing, crowdsourcing and big data as pillars of Industry 4.0."</article-title>
          <source>Future Internet 10.3</source>
          (
          <year>2018</year>
          ):
          <fpage>24</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Mansor</surname>
            ,
            <given-names>M. F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Abdul</surname>
            <given-names>Halim</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            , &amp;
            <surname>Ahmad</surname>
          </string-name>
          ,
          <string-name>
            <surname>N. H.</surname>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>Exploring crowdsourcing practices and benefits: Validation from small and medium enterprises (SMEs) business owners</article-title>
          .
          <source>In Proceedings of the 2nd Conference on Technology &amp; Operations Management (2nd CTOM)</source>
          . pp.
          <fpage>17</fpage>
          -
          <lpage>20</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>Nhatvi</given-names>
            <surname>Nguyen</surname>
          </string-name>
          (
          <year>2010</year>
          ). microWorkers. Retrieved from https://www.microworkers.com.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>Venky</given-names>
            <surname>Harinarayan</surname>
          </string-name>
          (
          <year>2001</year>
          ),
          <article-title>Amazon turk machine</article-title>
          , Retrieved from https://www.mturk.com/
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Ross</surname>
          </string-name>
          (
          <year>2007</year>
          ). crowdSpring, Retrieved from https://www.crowdspring.com.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Google</surname>
          </string-name>
          (
          <year>2012</year>
          ),
          <article-title>Google consumer surveys</article-title>
          , Retrieved from https://surveys.google.com
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>Xiaoxun</given-names>
            <surname>Sun; Hua Wang; Lili Sun “Extended K-Anonymity Models Against Attribute Disclosure</surname>
          </string-name>
          ”
          <source>Third International Conference on Network and System Security</source>
          ,
          <year>2009</year>
          . NSS '
          <volume>09</volume>
          . pp.
          <fpage>130</fpage>
          -
          <lpage>136</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>Xiaoxun</given-names>
            <surname>Sun; Hua Wang; Jiuyong Li; Ross</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            “
            <surname>Achieving P-Sensitive</surname>
          </string-name>
          <string-name>
            <surname>K</surname>
          </string-name>
          -Anonymity via Anatomy” ICEBE '
          <fpage>09</fpage>
          . IEEE International Conference on e-Business
          <string-name>
            <surname>Engineering</surname>
          </string-name>
          ,
          <year>2009</year>
          , pp.
          <fpage>199</fpage>
          --
          <lpage>205</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>TRUTA T M ， VINAY</surname>
            <given-names>B</given-names>
          </string-name>
          , “
          <article-title>Privacy protection: p-Sensitive k-anonymity property</article-title>
          ,
          <source>” Proceedings of the 22nd on Data Engineering Workshops</source>
          , IEEE Computer Society, Washington Dc,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Xiaoxun</surname>
            <given-names>Sun</given-names>
          </string-name>
          , Hua Wang,
          <string-name>
            <given-names>Jiuyong</given-names>
            <surname>Li</surname>
          </string-name>
          , Truta,
          <string-name>
            <given-names>T.M</given-names>
            ,
            <surname>Ping</surname>
          </string-name>
          <string-name>
            <surname>Li</surname>
          </string-name>
          , “
          <article-title>(p+, α) -sensitive k-anonymity: A new enhanced privacy protection model</article-title>
          ”,
          <year>2008</year>
          , pp.
          <fpage>59</fpage>
          -
          <lpage>64</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Yingjie Wu; Xiaowen Ruan; Shangbin Liao; Xiaodong Wang; “P-Cover</surname>
            <given-names>K</given-names>
          </string-name>
          -anonymity
          <source>model for Protecting Multiple Sensitive Attributes” The 5th International Conference on Computer Science &amp; Education Hefei, China. August 24-27</source>
          ,
          <year>2010</year>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12. Jianmin Han;
          <article-title>Huiqun Yu; Juan Yu “An improved l-diversity model for numerical sensitive attributes”</article-title>
          <source>Third International Conference on Communications and Networking in China</source>
          ,
          <year>2008</year>
          .
          <article-title>ChinaCom 2008</article-title>
          . Year:
          <year>2008</year>
          . Pp.
          <volume>938</volume>
          -
          <fpage>943</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Tripathy</surname>
            ,
            <given-names>B.K.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Maity</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Ranajit</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Chowdhuri</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <article-title>"A fast p-sensitive l-diversity Anonymisation algorithm,"</article-title>
          <source>Recent Advances in Intelligent Computational Systems (RAICS)</source>
          ,
          <year>2011</year>
          IEEE, vol., no., pp.
          <volume>741</volume>
          ,
          <issue>744</issue>
          ,
          <fpage>22</fpage>
          -
          <lpage>24</lpage>
          Sept. 2011
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Qian</surname>
            <given-names>Wang</given-names>
          </string-name>
          ;
          <article-title>Xiangling Shi “(a</article-title>
          , d)-
          <source>Diversity: Privacy Protection Based on l-Diversity WRI World Congress on Software Engineering”</source>
          ,
          <year>2009</year>
          . WCSE '
          <volume>09</volume>
          . Volume:
          <volume>3</volume>
          , pp.
          <fpage>367</fpage>
          -
          <lpage>372</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Sweeney</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          (
          <year>2002</year>
          ).
          <article-title>k-anonymity: A model for protecting privacy</article-title>
          .
          <source>International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems</source>
          ,
          <volume>10</volume>
          (
          <issue>05</issue>
          ),
          <fpage>557</fpage>
          -
          <lpage>570</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Dwork</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Roth</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2014</year>
          ).
          <article-title>The Algorithmic Foundations of Differential Privacy: Foundations and Trends in Theoretical Computer Science</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Dwork</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Lei</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2009</year>
          , May).
          <article-title>Differential privacy and robust statistics</article-title>
          .
          <source>In STOC (Vol. 9</source>
          , pp.
          <fpage>371</fpage>
          -
          <lpage>380</lpage>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18. C. Dwork, “
          <article-title>Differential privacy: A survey of results,”</article-title>
          <source>in Proc. TAMC</source>
          ,
          <year>2008</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>19</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>C. Dwork</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>McSherry</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Nissim</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Smith</surname>
          </string-name>
          , “
          <article-title>Calibrating noise to sensitivity in private data analysis,”</article-title>
          <source>in Proc. TCC</source>
          ,
          <year>2006</year>
          , pp.
          <fpage>265</fpage>
          -
          <lpage>284</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>C. Liu</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Chakraborty</surname>
            , and
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Mittal</surname>
          </string-name>
          , “
          <article-title>Dependence makes you Vulnerable: Differential privacy under dependent tuples,”</article-title>
          <source>in Proc. NDSS</source>
          ,
          <year>2016</year>
          , pp.
          <fpage>21</fpage>
          -
          <lpage>24</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , G. Cormode,
          <string-name>
            <given-names>C. M.</given-names>
            <surname>Procopiuc</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Srivastava</surname>
          </string-name>
          , and
          <string-name>
            <given-names>X.</given-names>
            <surname>Xiao</surname>
          </string-name>
          , “PrivBayes:
          <article-title>Private data release via Bayesian networks</article-title>
          ,”
          <source>in Proc. ACM SIGMOD</source>
          ,
          <year>2014</year>
          , pp.
          <fpage>1423</fpage>
          -
          <lpage>1434</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Ren</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yu</surname>
            ,
            <given-names>C. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yu</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yang</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yang</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McCann</surname>
            ,
            <given-names>J. A.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Philip</surname>
            ,
            <given-names>S. Y.</given-names>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>High-Dimensional Crowdsourced Data Publication with Local Differential Privacy</article-title>
          .
          <source>IEEE Transactions on Information Forensics and Security</source>
          ,
          <volume>13</volume>
          (
          <issue>9</issue>
          ),
          <fpage>2151</fpage>
          -
          <lpage>2166</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <given-names>U.</given-names>
            <surname>Erlingsson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Pihur</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Korolova</surname>
          </string-name>
          , “RAPPOR:
          <article-title>Randomized aggregatable privacypreserving ordinal response,”</article-title>
          <source>in Proc. ACM CCS</source>
          ,
          <year>2014</year>
          , pp.
          <fpage>1054</fpage>
          -
          <lpage>1067</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>M. Shin</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Cornelius</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Peebles</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Kapadia</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Kotz</surname>
            , and
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Triandopoulos</surname>
          </string-name>
          , “
          <article-title>Anonysense: A system for anonymous opportunistic sensing</article-title>
          ,
          <source>” Pervasive and Mobile Computing</source>
          , vol.
          <volume>7</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>16</fpage>
          -
          <lpage>30</lpage>
          ,
          <year>2011</year>
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25. L.
          <string-name>
            <surname>Pournajaf</surname>
            ,
            <given-names>D. A.</given-names>
          </string-name>
          <string-name>
            <surname>Garcia-Ulloa</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Xiong</surname>
            , and
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Sunderam</surname>
          </string-name>
          , “
          <article-title>Participant privacy in mobile crowd sensing task management: A survey of methods and challenges,” ACM SIGMOD Record</article-title>
          , vol.
          <volume>44</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>23</fpage>
          -
          <lpage>34</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <given-names>D.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Abdelzaher</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Kaplan</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C. C.</given-names>
            <surname>Aggarwal</surname>
          </string-name>
          , “
          <article-title>Recursive fact-finding: A streaming approach to truth estimation in crowdsourcing applications,” in Distributed Computing Systems</article-title>
          (ICDCS),
          <source>2013 IEEE 33rd International Conference on. IEEE</source>
          ,
          <year>2013</year>
          , pp.
          <fpage>530</fpage>
          -
          <lpage>539</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <given-names>K.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Liang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Shen</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Lu</surname>
          </string-name>
          , “
          <article-title>Exploiting multimedia services in mobile social networks from security and privacy perspectives,” IEEE Communications Magazine</article-title>
          , vol.
          <volume>52</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>58</fpage>
          -
          <lpage>65</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <given-names>Y.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Yin</surname>
          </string-name>
          , L. Liu, and
          <string-name>
            <given-names>S.</given-names>
            <surname>Xin</surname>
          </string-name>
          , “
          <article-title>Toward inference attacks for k anonymity,” Personal and ubiquitous computing</article-title>
          , vol.
          <volume>18</volume>
          , no.
          <issue>8</issue>
          , pp.
          <fpage>1871</fpage>
          -
          <lpage>1880</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <given-names>K.</given-names>
            <surname>Minami</surname>
          </string-name>
          and
          <string-name>
            <given-names>N.</given-names>
            <surname>Borisov</surname>
          </string-name>
          , “
          <article-title>Protecting location privacy against inference attacks,” in Proceedings of the 9th annual ACM workshop on Privacy in the electronic society</article-title>
          . ACM,
          <year>2010</year>
          , pp.
          <fpage>123</fpage>
          -
          <lpage>126</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <given-names>R.</given-names>
            <surname>Agrawal</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Srikant</surname>
          </string-name>
          , '
          <article-title>'Privacy-preserving data mining,'' ACM SIGMOD Rec</article-title>
          ., vol.
          <volume>29</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>439</fpage>
          -
          <lpage>450</lpage>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <given-names>D.</given-names>
            <surname>Agrawal</surname>
          </string-name>
          and
          <string-name>
            <given-names>C. C.</given-names>
            <surname>Aggarwal</surname>
          </string-name>
          ,'
          <article-title>'On the design and quantification of privacy preserving data mining algorithms,'' in Proc. 20th ACM SIGMOD SIG ACT-SIGART Symp</article-title>
          .
          <article-title>Principles Database Syst</article-title>
          .,
          <year>2001</year>
          , pp.
          <fpage>247</fpage>
          -
          <lpage>255</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Mendes</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Vilela</surname>
            ,
            <given-names>J. P.</given-names>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>Privacy-preserving data mining: methods, metrics, and applications</article-title>
          .
          <source>IEEE Access</source>
          ,
          <volume>5</volume>
          ,
          <fpage>10562</fpage>
          -
          <lpage>10582</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <given-names>S. R. M.</given-names>
            <surname>Oliveira</surname>
          </string-name>
          and
          <string-name>
            <given-names>O. R.</given-names>
            <surname>Zaıane</surname>
          </string-name>
          , '
          <article-title>'Privacy preserving clustering by data transformation,''</article-title>
          <string-name>
            <given-names>J.</given-names>
            <surname>Inf</surname>
          </string-name>
          . Data Manage., vol.
          <volume>1</volume>
          , no.
          <issue>1</issue>
          , p.
          <fpage>37</fpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Iyengar</surname>
          </string-name>
          , V.S, “
          <article-title>Transforming data to satisfy privacy constraints</article-title>
          ,
          <source>”: SIGKDD</source>
          <year>2002</year>
          , pp.
          <fpage>279</fpage>
          -
          <lpage>288</lpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35.
          <string-name>
            <surname>Domingo-Ferrer</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Mateo-Sanz</surname>
            ,
            <given-names>J. M.</given-names>
          </string-name>
          “
          <article-title>Resampling for statistical confidentiality in contingency tables</article-title>
          ,
          <source>” Computers and Mathematics with Applications</source>
          ,
          <volume>38</volume>
          (
          <issue>11</issue>
          ),
          <fpage>13</fpage>
          -
          <lpage>32</lpage>
          ,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          36.
          <string-name>
            <given-names>R. J.</given-names>
            <surname>Bayardo</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Agrawal</surname>
          </string-name>
          , '
          <article-title>'Data privacy through optimal k-anonymization</article-title>
          ,''
          <source>in Proc. IEEE 21st Int. Conf. Data Eng. (ICDE)</source>
          ,
          <year>Apr</year>
          .
          <year>2005</year>
          , pp.
          <fpage>217</fpage>
          -
          <lpage>228</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          37.
          <string-name>
            <surname>Shin</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cornelius</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peebles</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kapadia</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kotz</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Triandopoulos</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          (
          <year>2011</year>
          ).
          <article-title>AnonySense: A system for anonymous opportunistic sensing</article-title>
          .
          <source>Pervasive and Mobile Computing</source>
          ,
          <volume>7</volume>
          (
          <issue>1</issue>
          ),
          <fpage>16</fpage>
          -
          <lpage>30</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          38.
          <string-name>
            <surname>Kalnis</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ghinita</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mouratidis</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Papadias</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          (
          <year>2007</year>
          ).
          <article-title>Preventing location-based identity inference in anonymous spatial queries</article-title>
          .
          <source>IEEE transactions on knowledge and data engineering</source>
          ,
          <volume>19</volume>
          (
          <issue>12</issue>
          ),
          <fpage>1719</fpage>
          -
          <lpage>1733</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          39.
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>X. S.</given-names>
          </string-name>
          (
          <year>2010</year>
          ,
          <article-title>May)</article-title>
          .
          <article-title>In-device spatial cloaking for mobile user privacy assisted by the cloud</article-title>
          .
          <source>In 2010 Eleventh International Conference on Mobile Data Management</source>
          (pp.
          <fpage>381</fpage>
          -
          <lpage>386</lpage>
          ). IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          40.
          <string-name>
            <surname>Kido</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yanagisawa</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Satoh</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          (
          <year>2005</year>
          ,
          <article-title>July)</article-title>
          .
          <article-title>An anonymous communication technique using dummies for location-based services</article-title>
          .
          <source>In ICPS'05. Proceedings. International Conference on Pervasive Services</source>
          ,
          <year>2005</year>
          . (pp.
          <fpage>88</fpage>
          -
          <lpage>97</lpage>
          ). IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          41.
          <string-name>
            <given-names>About</given-names>
            <surname>Kiva</surname>
          </string-name>
          . Retrieved from https://www.kiva.org/about.
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          42.
          <string-name>
            <surname>Elliott</surname>
          </string-name>
          <article-title>Collins (Kiva Impact Team), Retrieved from</article-title>
          , https://www.kaggle.com/kiva/datascience
          <article-title>-for-good-kiva-crowdfunding#kiva_loans</article-title>
          .csv
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          43.
          <string-name>
            <surname>Long</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          , Zhang,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Lin</surname>
          </string-name>
          ,
          <string-name>
            <surname>C. K.</surname>
          </string-name>
          , &amp; Cheng,
          <string-name>
            <surname>J. J.</surname>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>Privacy preserving method based on Voronoi diagram in mobile crowd computing</article-title>
          .
          <source>International Journal of Distributed Sensor Networks</source>
          ,
          <volume>13</volume>
          (
          <issue>10</issue>
          ),
          <fpage>1550147717739156</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          44.
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cai</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chi</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tong</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>A differentially k-anonymity-based location privacy-preserving for mobile crowdsourcing systems</article-title>
          .
          <source>Procedia Computer Science</source>
          ,
          <volume>129</volume>
          ,
          <fpage>28</fpage>
          -
          <lpage>34</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          45.
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>X. O.</given-names>
          </string-name>
          , Cheng, W.,
          <string-name>
            <surname>Mohapatra</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Abdelzaher</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          (
          <year>2013</year>
          , April).
          <article-title>Artsense: Anonymous reputation and trust in participatory sensing</article-title>
          .
          <source>In 2013 Proceedings IEEE INFOCOM</source>
          (pp.
          <fpage>2517</fpage>
          -
          <lpage>2525</lpage>
          ). IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          46.
          <string-name>
            <surname>Gigwalk</surname>
          </string-name>
          . From http://www.gigwalk.com/
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          47.
          <string-name>
            <surname>Tingxin</surname>
            <given-names>Yan</given-names>
          </string-name>
          , Matt Marzilli, Ryan Holmes, Deepak Ganesan,
          <article-title>Mark Corner, mCrowd: a platform for mobile crowdsourcing</article-title>
          ,
          <source>Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems, November 04-06</source>
          ,
          <year>2009</year>
          , Berkeley, California.
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          48.
          <string-name>
            <surname>Wagner</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Eckhoff</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>Technical privacy metrics: a systematic survey</article-title>
          .
          <source>ACM Computing Surveys (CSUR)</source>
          ,
          <volume>51</volume>
          (
          <issue>3</issue>
          ),
          <fpage>57</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          49.
          <string-name>
            <surname>Sowmyarani</surname>
            ,
            <given-names>C. N.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Dayananda</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>Analytical Study on Privacy Attack Models in Privacy Preserving Data Publishing</article-title>
          .
          <source>In Security Solutions and Applied Cryptography in Smart Grid Communications</source>
          (pp.
          <fpage>98</fpage>
          -
          <lpage>116</lpage>
          ).
          <source>IGI Global.</source>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>