IDEAS home Printed from https://ideas.repec.org/a/gam/jftint/v16y2024i9p311-d1466041.html
   My bibliography  Save this article

User Mobility Modeling in Crowdsourcing Application to Prevent Inference Attacks

Author

Listed:
  • Farid Yessoufou

    (Department of Computer Science, IMSP, University of Abomey Calavi, 01, Abomey-Calavi P.O. Box 526, Benin
    Department of Computer Science, E2S UPPA, LIUPPA, University Pau & Pays Adour, 64600 Anglet, France)

  • Salma Sassi

    (Department of Computer Science, E2S UPPA, LIUPPA, University Pau & Pays Adour, 64600 Anglet, France)

  • Elie Chicha

    (Department of Computer Science, E2S UPPA, LIUPPA, University Pau & Pays Adour, 64600 Anglet, France)

  • Richard Chbeir

    (Department of Computer Science, E2S UPPA, LIUPPA, University Pau & Pays Adour, 64600 Anglet, France)

  • Jules Degila

    (Department of Computer Science, IMSP, University of Abomey Calavi, 01, Abomey-Calavi P.O. Box 526, Benin)

Abstract

With the rise of the Internet of Things (IoT), mobile crowdsourcing has become a leading application, leveraging the ubiquitous presence of smartphone users to collect and process data. Spatial crowdsourcing, which assigns tasks based on users’ geographic locations, has proven to be particularly innovative. However, this trend raises significant privacy concerns, particularly regarding the precise geographic data required by these crowdsourcing platforms. Traditional methods, such as dummy locations, spatial cloaking, differential privacy, k-anonymity, and encryption, often fail to mitigate the risks associated with the continuous disclosure of location data. An unauthorized entity could access these data and infer personal information about individuals, such as their home address, workplace, religion, or political affiliations, thus constituting a privacy violation. In this paper, we propose a user mobility model designed to enhance location privacy protection by accurately identifying Points of Interest (POIs) and countering inference attacks. Our main contribution here focuses on user mobility modeling and the introduction of an advanced algorithm for precise POI identification. We evaluate our contributions using GPS data collected from 10 volunteers over a period of 3 months. The results show that our mobility model delivers significant performance and that our POI extraction algorithm outperforms existing approaches.

Suggested Citation

  • Farid Yessoufou & Salma Sassi & Elie Chicha & Richard Chbeir & Jules Degila, 2024. "User Mobility Modeling in Crowdsourcing Application to Prevent Inference Attacks," Future Internet, MDPI, vol. 16(9), pages 1-29, August.
  • Handle: RePEc:gam:jftint:v:16:y:2024:i:9:p:311-:d:1466041
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1999-5903/16/9/311/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1999-5903/16/9/311/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Hang Ye & Kai Han & Chaoting Xu & Jingxin Xu & Fei Gui, 2019. "Toward location privacy protection in Spatial crowdsourcing," International Journal of Distributed Sensor Networks, , vol. 15(3), pages 15501477198, March.
    2. Fotis Kitsios & Elpiniki Chatzidimitriou & Maria Kamariotou, 2023. "The ISO/IEC 27001 Information Security Management Standard: How to Extract Value from Data in the IT Sector," Sustainability, MDPI, vol. 15(7), pages 1-17, March.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Kemendi Agnes & Michelberger Pal, 2024. "Process security methods and measurement in the context of standard management systems," Engineering Management in Production and Services, Sciendo, vol. 16(2), pages 148-165.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:16:y:2024:i:9:p:311-:d:1466041. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.