{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T19:29:48Z","timestamp":1774553388440,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T00:00:00Z","timestamp":1501545600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Geoinformatica"],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1007\/s10707-017-0305-2","type":"journal-article","created":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T00:50:59Z","timestamp":1501548659000},"page":"335-362","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":93,"title":["Efficient task assignment in spatial crowdsourcing with worker and task privacy protection"],"prefix":"10.1007","volume":"22","author":[{"given":"An","family":"Liu","sequence":"first","affiliation":[]},{"given":"Weiqi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Shuo","family":"Shang","sequence":"additional","affiliation":[]},{"given":"Qing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiangliang","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,1]]},"reference":[{"issue":"3","key":"305_CR1","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1145\/1525856.1525858","volume":"5","author":"C Castelluccia","year":"2009","unstructured":"Castelluccia C, Chan AC, Mykletun E, Tsudik G (2009) Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Transactions on Sensor Networks (TOSN) 5(3):20","journal-title":"ACM Transactions on Sensor Networks (TOSN)"},{"issue":"4","key":"305_CR2","first-page":"14","volume":"39","author":"L Chen","year":"2016","unstructured":"Chen L, Shahabi C (2016) Spatial crowdsourcing: challenges and opportunities. IEEE Data Eng Bull 39(4):14\u201325","journal-title":"IEEE Data Eng Bull"},{"issue":"10","key":"305_CR3","doi-asserted-by":"crossref","first-page":"1022","DOI":"10.14778\/2794367.2794372","volume":"8","author":"P Cheng","year":"2015","unstructured":"Cheng P, Lian X, Chen Z, Fu R, Chen L, Han J, Zhao J (2015) Reliable diversity-based spatial crowdsourcing by moving workers. Proc VLDB Endowment 8(10):1022\u20131033","journal-title":"Proc VLDB Endowment"},{"issue":"8","key":"305_CR4","doi-asserted-by":"crossref","first-page":"2201","DOI":"10.1109\/TKDE.2016.2550041","volume":"28","author":"P Cheng","year":"2016","unstructured":"Cheng P, Lian X, Chen L, Han J, Zhao J (2016) Task assignment on multi-skill oriented spatial crowdsourcing. IEEE Trans Knowl Data Eng 28(8):2201\u20132215","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"7307","key":"305_CR5","doi-asserted-by":"crossref","first-page":"756","DOI":"10.1038\/nature09304","volume":"466","author":"S Cooper","year":"2010","unstructured":"Cooper S, Khatib F, Treuille A, Barbero J, Lee J, Beenen M, Leaver-Fay A, Baker D, Popovi\u0107 Z (2010) Predicting protein structures with a multiplayer online game. Nature 466(7307):756\u2013760","journal-title":"Nature"},{"key":"305_CR6","unstructured":"Dai W (2010) Commutative-like encryption: a new characterization of ElGamal. arXiv: 1011.3718"},{"issue":"3","key":"305_CR7","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1007\/s10707-016-0251-4","volume":"20","author":"D Deng","year":"2016","unstructured":"Deng D, Shahabi C, Demiryurek U, Zhu L (2016) Task selection in spatial crowd- sourcing from workers perspective. GeoInformatica 20(3):529\u2013568","journal-title":"GeoInformatica"},{"key":"305_CR8","unstructured":"DigitalGlobe: http:\/\/blog.digitalglobe.com\/2015\/05\/29\/digitalglobe-winding-down-nepal-earthquake-response-activities\/"},{"key":"305_CR9","doi-asserted-by":"crossref","unstructured":"Dwork C (2008) Differential privacy: a survey of results. TAMC, pp 1\u201319","DOI":"10.1007\/978-3-540-79228-4_1"},{"issue":"4","key":"305_CR10","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T ELGAMAL","year":"1985","unstructured":"ELGAMAL T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469\u2013472","journal-title":"IEEE Trans Inf Theory"},{"key":"305_CR11","doi-asserted-by":"crossref","unstructured":"Elmehdwi Y, Samanthula BK, Jiang W (2014) Secure k-nearest neighbor query over encrypted data in outsourced environments. ICDE, pp 664\u2013675","DOI":"10.1109\/ICDE.2014.6816690"},{"issue":"12","key":"305_CR12","doi-asserted-by":"crossref","first-page":"3659","DOI":"10.1109\/TPDS.2016.2536024","volume":"27","author":"Y Feng","year":"2016","unstructured":"Feng Y, Wang J, Zhang Z, Zhong H, Ming Z, Yang X, Mao R (2016) The edge weight computation with mapreduce for extracting weighted graphs. IEEE Trans Parallel Distrib Syst 27(12):3659\u20133672","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"305_CR13","unstructured":"GalaxyZoo: https:\/\/www.galaxyzoo.org\/"},{"key":"305_CR14","doi-asserted-by":"crossref","unstructured":"Gentry C (2009) Fully homomorphic encryption using ideal lattices. STOC, pp 169\u2013169","DOI":"10.1145\/1536414.1536440"},{"key":"305_CR15","doi-asserted-by":"crossref","unstructured":"Gentry C, Halevi S (2011) Implementing Gentry\u2019s fully-homomorphic encryption scheme. EUROCRYPT, pp 129\u2013148","DOI":"10.1007\/978-3-642-20465-4_9"},{"key":"305_CR16","doi-asserted-by":"crossref","unstructured":"Ghinita G, Kalnis P, Khoshgozaran A, Shahabi C, Tan KL (2008) Private queries in location based services: anonymizers are not necessary. SIGMOD, pp 121\u2013132","DOI":"10.1145\/1376616.1376631"},{"key":"305_CR17","doi-asserted-by":"crossref","unstructured":"Goldreich O (2004) Foundations of cryptography: volume 2, basic applications. Cambridge University Press","DOI":"10.1017\/CBO9780511721656"},{"issue":"1","key":"305_CR18","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/BF02422942","volume":"41","author":"GH Hardy","year":"1916","unstructured":"Hardy GH, Littlewood JE (1916) Contributions to the theory of the Riemann zeta-function and the theory of the distribution of primes. Acta Mathematica 41(1):119\u2013196","journal-title":"Acta Mathematica"},{"key":"305_CR19","unstructured":"Howe J (2006) Crowdsourcing: a definition http:\/\/crowdsourcing.typepad.com\/cs\/2006\/06\/crowdsourcing_a.html"},{"key":"305_CR20","doi-asserted-by":"crossref","unstructured":"Kazemi L, Shahabi C (2012) Geocrowd: enabling query answering with spatial crowdsourcing. SIGSPATIAL, pp 189\u2013198","DOI":"10.1145\/2424321.2424346"},{"issue":"1","key":"305_CR21","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/TSC.2009.28","volume":"3","author":"A Liu","year":"2010","unstructured":"Liu A, Li Q, Huang L, Xiao M (2010) FACTS: a framework for fault-tolerant composition of transactional web services. IEEE Trans Serv Comput 3(1):46\u201359","journal-title":"IEEE Trans Serv Comput"},{"issue":"3","key":"305_CR22","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1109\/TSC.2012.12","volume":"6","author":"A Liu","year":"2013","unstructured":"Liu A, Li Q, Huang L, Ying S, Xiao M (2013) Coalitional game for community-based autonomous web services cooperation. IEEE Trans Services Computing 6(3):387\u2013399","journal-title":"IEEE Trans Services Computing"},{"key":"305_CR23","doi-asserted-by":"crossref","unstructured":"Liu A, Zheng K, Li L, Liu G, Zhao L, Zhou X (2015) Efficient secure similarity computation on encrypted trajectory data. ICDE, pp 66\u201377","DOI":"10.1109\/ICDE.2015.7113273"},{"key":"305_CR24","doi-asserted-by":"crossref","unstructured":"Liu S, Liu A, Zhao L, Liu G, Li Z, Zhao P, Zheng K, Qin L (2016) Efficient query processing with mutual privacy protection for location-based services. DASFAA, pp 299\u2013313","DOI":"10.1007\/978-3-319-32049-6_19"},{"issue":"1","key":"305_CR25","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MCOM.2015.7010514","volume":"53","author":"R Mao","year":"2015","unstructured":"Mao R, Xu H, Wu W, Li J, Li Y, Lu M (2015) Overcoming the challenge of variety: big data abstraction, the next evolution of data management for AAL communication systems. IEEE Commun Mag 53(1):42\u201347","journal-title":"IEEE Commun Mag"},{"issue":"2","key":"305_CR26","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1007\/s13042-016-0504-4","volume":"7","author":"R Mao","year":"2016","unstructured":"Mao R, Zhang P, Li X, Liu X, Lu M (2016) Pivot selection for metric-space indexing. Int J Mach Learn Cybern 7(2):311\u2013323","journal-title":"Int J Mach Learn Cybern"},{"key":"305_CR27","doi-asserted-by":"crossref","unstructured":"Paillier P (1999) Public-Key cryptosystems based on composite degree residuosity classes. EUROCRYPT, pp 223\u2013238","DOI":"10.1007\/3-540-48910-X_16"},{"key":"305_CR28","doi-asserted-by":"crossref","unstructured":"Paulet R, Kaosar MG, Yi X, Bertino E (2012) Privacy-Preserving and Content-Protecting Location Based Queries. ICDE, pp 44\u201353","DOI":"10.1109\/ICDE.2012.95"},{"issue":"5","key":"305_CR29","doi-asserted-by":"crossref","first-page":"1200","DOI":"10.1109\/TKDE.2013.87","volume":"26","author":"R Paulet","year":"2014","unstructured":"Paulet R, Kaosar MG, Yi X, Bertino E (2014) Privacy-preserving and content-protecting location based queries. IEEE Trans Knowl Data Eng 26(5):1200\u20131210","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"3","key":"305_CR30","doi-asserted-by":"crossref","first-page":"467","DOI":"10.1007\/s10707-011-0144-5","volume":"16","author":"S Shang","year":"2012","unstructured":"Shang S, Yuan B, Deng K, Xie K, Zheng K, Zhou X (2012) PNN query processing on compressed trajectories. GeoInformatica 16(3):467\u2013496","journal-title":"GeoInformatica"},{"key":"305_CR31","doi-asserted-by":"crossref","unstructured":"Shang S, Ding R, Yuan B, Xie K, Zheng K, Kalnis P (2012) User oriented trajectory search for trip recommendation. EDBT, pp 156\u2013167","DOI":"10.1145\/2247596.2247616"},{"issue":"3","key":"305_CR32","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1007\/s00778-013-0331-0","volume":"23","author":"S Shang","year":"2014","unstructured":"Shang S, Ding R, Zheng K, Jensen CS, Kalnis P, Zhou X (2014) Personalized trajectory matching in spatial networks. VLDB J 23(3):449\u2013468","journal-title":"VLDB J"},{"issue":"4","key":"305_CR33","doi-asserted-by":"crossref","first-page":"723","DOI":"10.1007\/s10707-015-0227-9","volume":"19","author":"S Shang","year":"2015","unstructured":"Shang S, Liu J, Zheng K, Lu H, Pedersen TB, Wen JR (2015) Planning unobstructed paths in traffic-aware spatial networks. GeoInformatica 19(4):723\u2013746","journal-title":"GeoInformatica"},{"issue":"6","key":"305_CR34","doi-asserted-by":"crossref","first-page":"1505","DOI":"10.1109\/TKDE.2014.2382583","volume":"27","author":"S Shang","year":"2015","unstructured":"Shang S, Zheng K, Jensen CS, Yang B, Kalnis P, Li G, Wen JR (2015) Discovery of path nearby clusters in spatial networks. IEEE Trans Knowl Data Eng 27(6):1505\u20131518","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"5","key":"305_CR35","doi-asserted-by":"crossref","first-page":"1132","DOI":"10.1109\/TKDE.2015.2509998","volume":"28","author":"S Shang","year":"2016","unstructured":"Shang S, Chen L, Wei Z, Jensen CS, Wen JR, Kalnis P (2016) Collective travel planning in spatial networks. IEEE Trans Knowl Data Eng 28(5):1132\u20131146","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"305_CR36","doi-asserted-by":"crossref","unstructured":"Shove E, Trentmann F, Wilk R (2009) Time, consumption and everyday life: practice, materiality and culture. Berg","DOI":"10.5040\/9781474215862"},{"issue":"10","key":"305_CR37","first-page":"919","volume":"7","author":"H To","year":"2014","unstructured":"To H., Ghinita G., Shahabi C. (2014) A framework for protecting worker location privacy in spatial crowdsourcing. PVLDB 7(10):919\u2013930","journal-title":"PVLDB"},{"key":"305_CR38","doi-asserted-by":"crossref","unstructured":"To H, Ghinita G, Shahabi C (2015) Privgeocrowd: a toolbox for studying private spatial crowdsourcing. ICDE, pp 1404\u20131407","DOI":"10.1109\/ICDE.2015.7113387"},{"issue":"1","key":"305_CR39","first-page":"2","volume":"1","author":"H To","year":"2015","unstructured":"To H., Shahabi C., Kazemi L. (2015) A server-assigned spatial crowdsourcing framework. ACM Transactions on Spatial Algorithms and Systems 1(1):2","journal-title":"ACM Transactions on Spatial Algorithms and Systems"},{"key":"305_CR40","doi-asserted-by":"crossref","unstructured":"Tong Y, She J, Ding B, Wang L, Chen L (2016) Online mobile micro-task allocation in spatial crowdsourcing. ICDE, pp 49\u201360","DOI":"10.1109\/ICDE.2016.7498228"},{"issue":"5895","key":"305_CR41","doi-asserted-by":"crossref","first-page":"1465","DOI":"10.1126\/science.1160379","volume":"321","author":"L Von Ahn","year":"2008","unstructured":"Von Ahn L, Maurer B, McMillen C, Abraham D, Blum M (2008) Recaptcha: Human-based character recognition via web security measures. Science 321(5895):1465\u20131468","journal-title":"Science"},{"key":"305_CR42","unstructured":"Waze: https:\/\/www.waze.com\/"},{"key":"305_CR43","unstructured":"Yao B., Li F., Xiao X. (2013) Secure nearest neighbor revisited. ICDE, pp 733\u2013744"},{"key":"305_CR44","doi-asserted-by":"crossref","unstructured":"Yi X, Paulet R, Bertino E, Varadharajan V (2014) Practical k nearest neighbor queries with location privacy. ICDE, pp 640\u2013651","DOI":"10.1109\/ICDE.2014.6816688"},{"issue":"6","key":"305_CR45","doi-asserted-by":"crossref","first-page":"1546","DOI":"10.1109\/TKDE.2016.2520473","volume":"28","author":"X Yi","year":"2016","unstructured":"Yi X, Paulet R, Bertino E, Varadharajan V (2016) Practical approximate k nearest neighbor queries with location and query privacy. IEEE Trans Knowl Data Eng 28(6):1546\u20131559","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"3","key":"305_CR46","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1007\/s00778-009-0169-7","volume":"19","author":"ML Yiu","year":"2010","unstructured":"Yiu ML, Ghinita G, Jensen CS, Kalnis P (2010) Enabling search services on outsourced private spatial data. VLDB J 19(3):363\u2013384","journal-title":"VLDB J"},{"issue":"6","key":"305_CR47","doi-asserted-by":"crossref","first-page":"1464","DOI":"10.1109\/TPDS.2013.243","volume":"25","author":"D Zhang","year":"2014","unstructured":"Zhang D, Lu K, Mao R, Feng Y, Liu Y, Ming Z, Ni LM (2014) Fine-grained localization for multiple transceiver-free objects by using RF-based technologies. IEEE Trans Parallel Distrib Syst 25(6):1464\u20131475","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"305_CR48","doi-asserted-by":"crossref","unstructured":"Zheng L, Chen L (2016) Mutual benefit aware task assignment in a bipartite labor market. ICDE, pp 73\u201384","DOI":"10.1109\/ICDE.2016.7498230"}],"container-title":["GeoInformatica"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10707-017-0305-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10707-017-0305-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10707-017-0305-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T17:46:10Z","timestamp":1569951970000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10707-017-0305-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,1]]},"references-count":48,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,4]]}},"alternative-id":["305"],"URL":"https:\/\/doi.org\/10.1007\/s10707-017-0305-2","relation":{},"ISSN":["1384-6175","1573-7624"],"issn-type":[{"value":"1384-6175","type":"print"},{"value":"1573-7624","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,8,1]]}}}