{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T13:30:17Z","timestamp":1774618217523,"version":"3.50.1"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T00:00:00Z","timestamp":1771632000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T00:00:00Z","timestamp":1774569600000},"content-version":"vor","delay-in-days":34,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"DOI":"10.1186\/s13677-026-00864-y","type":"journal-article","created":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T10:48:17Z","timestamp":1771670897000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["PP-WBHSTM: privacy-preserving weighted bidirectional heterogeneous spatial task matching"],"prefix":"10.1186","volume":"15","author":[{"given":"Faezeh","family":"Nayyeri","sequence":"first","affiliation":[]},{"given":"Ziba","family":"Eslami","sequence":"additional","affiliation":[]},{"given":"Nasrollah","family":"Pakniat","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,21]]},"reference":[{"issue":"7","key":"864_CR1","doi-asserted-by":"publisher","first-page":"4981","DOI":"10.1109\/TII.2021.3103547","volume":"18","author":"T Wang","year":"2021","unstructured":"Wang T (2021) A privacy-enhanced retrieval technology for the cloud-assisted internet of things. IEEE Trans Ind Inf 18(7):4981\u20134989","journal-title":"IEEE Trans Ind Inf"},{"key":"864_CR2","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1007\/s40812-023-00295-9","volume":"51","author":"O Bazaluk","year":"2024","unstructured":"Bazaluk O (2024) Crowdsourcing review: the crowd workers\u2019 perspective. J Ind Bus Econ 51:647\u2013666","journal-title":"J Ind Bus Econ"},{"key":"864_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3291933","volume":"44","author":"SRB Gummidi","year":"2019","unstructured":"Gummidi SRB (2019) A survey of spatial crowdsourcing. ACM Trans Database Syst 44:1\u201346","journal-title":"ACM Trans Database Syst"},{"key":"864_CR4","doi-asserted-by":"crossref","unstructured":"Kazemi L, Shahabi C (2012) Geocrowd: enabling query answering with spatial crowdsourcing. In Proceedings of the 20th international conference on advances in geographic information systems","DOI":"10.1145\/2424321.2424346"},{"key":"864_CR5","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.jnca.2018.09.007","volume":"123","author":"J Shu","year":"2018","unstructured":"Shu J (2018) Dual-side privacy-preserving task matching for spatial crowdsourcing. Network Comput Appl 123:101\u2013111","journal-title":"Network Comput Appl"},{"issue":"3","key":"864_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3078853","volume":"9","author":"L Tran","year":"2018","unstructured":"Tran L et al (2018) A real-time framework for task assignment in hyperlocal spatial crowdsourcing. ACM Trans Intell Syst Technol (TIST) 9(3):1\u201326","journal-title":"ACM Trans Intell Syst Technol (TIST)"},{"key":"864_CR7","doi-asserted-by":"crossref","unstructured":"Deng D, Shahabi C, Demiryurek U (2013) Maximizing the number of worker\u2019s self-selected tasks in spatial crowdsourcing. In Proceedings of the 21st acm sigspatial international conference on advances in geographic information systems","DOI":"10.1145\/2525314.2525370"},{"key":"864_CR8","doi-asserted-by":"crossref","unstructured":"Li Y, Yiu ML, Xu W (2015) Oriented online route recommendation for spatial crowdsourcing task workers. In: International symposium on spatial and temporal databases. Springer","DOI":"10.1007\/978-3-319-22363-6_8"},{"issue":"1","key":"864_CR9","first-page":"235","volume":"14","author":"J Shu","year":"2018","unstructured":"Shu J (2018) Privacy-preserving task recommendation services for crowdsourcing. Trans Serv Comput 14(1):235\u2013247","journal-title":"Trans Serv Comput"},{"key":"864_CR10","doi-asserted-by":"crossref","unstructured":"Zhang G, Zhao P, Zhang A (2024) Synthesizing privacy-preserving traces: enhancing plausibility with social networks. In: Privacy preservation in distributed systems: algorithms and applications. Springer, pp 25\u201352","DOI":"10.1007\/978-3-031-58013-0_2"},{"issue":"4","key":"864_CR11","first-page":"934","volume":"16","author":"H To","year":"2016","unstructured":"To H et al (2016) Differentially private location protection for worker datasets in spatial crowdsourcing. IEEE Trans Mob Comput 16(4):934\u2013949","journal-title":"IEEE Trans Mob Comput"},{"issue":"2","key":"864_CR12","doi-asserted-by":"publisher","first-page":"572","DOI":"10.1109\/JIOT.2016.2585592","volume":"4","author":"G Zhuo","year":"2016","unstructured":"Zhuo G et al (2016) Privacy-preserving verifiable set operation in big data for cloud-assisted mobile crowdsourcing. IEEE Internet Things J 4(2):572\u2013582","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"864_CR13","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/s10707-017-0305-2","volume":"22","author":"A Liu","year":"2018","unstructured":"Liu A et al (2018) Efficient task assignment in spatial crowdsourcing with worker and task privacy protection. GeoInformatica 22(2):335\u2013362","journal-title":"GeoInformatica"},{"key":"864_CR14","doi-asserted-by":"crossref","unstructured":"To H, Shahabi C, Xiong L Privacy-preserving online task assignment in spatial crowdsourcing with untrusted server. In 2018 IEEE 34th international conference on data engineering (ICDE). 2018, IEEE","DOI":"10.1109\/ICDE.2018.00080"},{"issue":"4","key":"864_CR15","first-page":"3068","volume":"5","author":"J Shu","year":"2021","unstructured":"Shu J (2021) Anonymous privacy-preserving task matching in crowdsourcing. Internet Things J 5(4):3068\u20133078","journal-title":"Internet Things J"},{"issue":"1","key":"864_CR16","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1186\/s13677-024-00633-9","volume":"13","author":"D Shiraly","year":"2024","unstructured":"Shiraly D (2024) Hierarchical Identity\u2011Based authenticated encryption with keyword search over encrypted cloud data. J Cloud Comput: Adv, Syst Appl 13(1):112","journal-title":"J Cloud Comput: Adv, Syst Appl"},{"issue":"3","key":"864_CR17","doi-asserted-by":"publisher","first-page":"1749","DOI":"10.1109\/JIOT.2018.2815982","volume":"5","author":"B Guo","year":"2018","unstructured":"Guo B (2018) Task Allocation in spatial crowdsourcing: current state and future directions. IEEE Internet Things J 5(3):1749\u20131764","journal-title":"IEEE Internet Things J"},{"key":"864_CR18","first-page":"167","volume-title":"inHandbook of Mobile data privacy location privacy in spatial crowdsourcing","author":"H To","year":"2018","unstructured":"To H (2018) Handbook of Mobile data privacy in location privacy in spatial crowdsourcing. Springer, pp 167\u2013194"},{"key":"864_CR19","doi-asserted-by":"crossref","unstructured":"Liu A (2017) Privacy-preserving task assignment in spatial crowdsourcing. J Comput Sci Technol 905\u2013918","DOI":"10.1007\/s11390-017-1772-5"},{"key":"864_CR20","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/s10707-017-0305-2","volume":"22","author":"A Liu","year":"2018","unstructured":"Liu A (2018) Efficient task assignment in spatial crowdsourcing withworker and task privacy protection. GeoInformatica 22:335\u2013362","journal-title":"GeoInformatica"},{"key":"864_CR21","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/7298518","volume-title":"Efficient searchable symmetric encryption Supporting dynamic Multikeyword Ranked search","author":"Y Zhang","year":"2020","unstructured":"Zhang Y (2020) Efficient searchable symmetric encryption Supporting dynamic Multikeyword Ranked search. Security and Communication Networks"},{"issue":"5","key":"864_CR22","doi-asserted-by":"publisher","first-page":"813","DOI":"10.1109\/TSC.2016.2622697","volume":"12","author":"Z Fu","year":"2019","unstructured":"Fu Z (2019) Enabling semantic search based on conceptual graphs over encrypted outsourced. Trans Serv Comput 12(5):813\u2013823","journal-title":"Trans Serv Comput"},{"issue":"2","key":"864_CR23","doi-asserted-by":"publisher","first-page":"1416","DOI":"10.1109\/TII.2020.2982942","volume":"17","author":"C Huang","year":"2021","unstructured":"Huang C (2021) Achieving accountable and Efficient data sharing in Industrial Internet of Things. Trans Ind Inf 17(2):1416\u20131427","journal-title":"Trans Ind Inf"},{"issue":"6","key":"864_CR24","doi-asserted-by":"publisher","first-page":"1231","DOI":"10.1007\/s11390-017-1797-9","volume":"32","author":"Q Liu","year":"2017","unstructured":"Liu Q (2017) Effective query grouping strategy in clouds. Comput Sci Technol 32(6):1231\u20131249","journal-title":"Comput Sci Technol"},{"key":"864_CR25","doi-asserted-by":"crossref","unstructured":"Zhou F (2020) A Secure and Efficient task matching scheme for spatial crowdsourcing 8:155819\u2013155831","DOI":"10.1109\/ACCESS.2020.3018940"},{"issue":"8","key":"864_CR26","first-page":"2201","volume":"28","author":"PR Adhau","year":"2016","unstructured":"Adhau PR (2016) Task assignment on multi-skill Oriented spatial crowd sourcing. Int Res J Eng Technol (IRJET) 28(8):2201\u20132215","journal-title":"Int Res J Eng Technol (IRJET)"},{"issue":"1","key":"864_CR27","first-page":"284","volume":"4","author":"H Chen","year":"2017","unstructured":"Chen H (2017) A generic framework for Constraint Constraint-driven data selection in mobile crowd photographing. Internet Things 4(1):284\u2013296","journal-title":"Internet Things"},{"key":"864_CR28","doi-asserted-by":"crossref","unstructured":"Jiang Y, L.C YC, Liu L, He W, Pan L, Zheng Y, Li Q (2018) Spatial crowdsourcing task assignment based on the quality of workers. 3rd Int Conf Crowd Sci Eng. (ICCSE)","DOI":"10.1145\/3265689.3265717"},{"key":"864_CR29","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.jnca.2019.01.008","volume":"130","author":"M Abououf","year":"2019","unstructured":"Abououf M (2019) Multiworker multi-task selection framework in mobile crowd sourcing. J Netw Comput Appl 130:52\u201362","journal-title":"J Netw Comput Appl"},{"key":"864_CR30","doi-asserted-by":"crossref","unstructured":"Chen Z (2014) GMission: a general spatial crowdsourcing platform proc. VLDB Endow 7(13):1629\u20131632","DOI":"10.14778\/2733004.2733047"},{"key":"864_CR31","unstructured":"Liu B, Chen L, Zhu X, Zhang Y, Zhang C, Qiu W (2017) Protecting location privacy in spatial crowdsourcing using encrypted data. In Proceedings of the 20th International conference on extending database technology"},{"issue":"1","key":"864_CR32","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1109\/TDSC.2018.2875682","volume":"18","author":"J Shu","year":"2018","unstructured":"Shu J (2018) Proxy-free privacy-preserving task matching with efficient revocation in crowdsourcing. Trans Dependable Secure Comput 18(1):117\u2013130","journal-title":"Trans Dependable Secure Comput"},{"issue":"3","key":"864_CR33","doi-asserted-by":"publisher","first-page":"367","DOI":"10.3233\/JCS-2010-0415","volume":"19","author":"C Dong","year":"2011","unstructured":"Dong C (2011) Shared and searchable encrypted data for untrusted servers. J Comput Secur 19(3):367\u2013397","journal-title":"J Comput Secur"},{"key":"864_CR34","unstructured":"Jianbing Ni XL, Zhang K, Yu Y Secure and deduplicated spatial crowdsourcing a fog-based approach. in Global Commun. 2016. IEEE"},{"key":"864_CR35","doi-asserted-by":"crossref","unstructured":"Yang K, ASD Secure and Efficient task matching with multi-keyword in multi-requester and multi-worker crowdsourcing. In 29th International Symposium on Quality of Service (IWQOS). 2021, IEEE\/ACM","DOI":"10.1109\/IWQOS52092.2021.9521265"},{"issue":"7","key":"864_CR36","doi-asserted-by":"publisher","first-page":"7161","DOI":"10.1109\/TVT.2021.3088869","volume":"70","author":"F Song","year":"2021","unstructured":"Song F (2021) Privacy-preserving task matching with threshold similarity search via Vehicular crowdsourcing. Trans Veh Technol 70(7):7161\u20137175","journal-title":"Trans Veh Technol"},{"issue":"1","key":"864_CR37","first-page":"1","volume":"54","author":"H Jiang","year":"2021","unstructured":"Jiang H et al (2021) Location privacy-preserving mechanisms in location-based services: a comprehensive survey. ACM Comput Surv (CSUR) 54(1):1\u201336","journal-title":"ACM Comput Surv (CSUR)"},{"issue":"1","key":"864_CR38","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/s00778-019-00568-7","volume":"29","author":"Y Tong","year":"2020","unstructured":"Tong Y et al (2020) Spatial crowdsourcing: a survey. The VLDB J 29(1):217\u2013250","journal-title":"The VLDB J"},{"key":"864_CR39","doi-asserted-by":"crossref","unstructured":"Song F (2024) Achieving efficient and privacy-preserving location-based task recommendation in spatial crowdsourcing. Trans. Dependable Secure Comput. 21(4):4006\u20134023","DOI":"10.1109\/TDSC.2023.3342239"},{"key":"864_CR40","doi-asserted-by":"crossref","unstructured":"Li H (2014) Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. Emerging Top Comput","DOI":"10.1109\/TETC.2014.2371239"},{"issue":"1","key":"864_CR41","first-page":"525","volume":"16","author":"Y Miao","year":"2021","unstructured":"Miao Y (2021) Ranked keyword search over encrypted cloud data through machine learning method. Trans Serv Comput 16(1):525\u2013536","journal-title":"Trans Serv Comput"},{"key":"864_CR42","doi-asserted-by":"crossref","unstructured":"Cao N (2014) Privacy-preserving multi-keyword ranked search over encrypted cloud data. Transactions on parallel and distributed systems 25(1):222\u2013233","DOI":"10.1109\/TPDS.2013.45"},{"issue":"18","key":"864_CR43","first-page":"16795","volume":"9","author":"Y Zhang","year":"2022","unstructured":"Zhang Y (2022) Achieving privacy-preserving multitask allocation for mobile crowdsensing. Internet Things 9(18):16795\u201316806","journal-title":"Internet Things"},{"key":"864_CR44","doi-asserted-by":"crossref","unstructured":"Chen C (2016) An Efficient privacy-preserving Ranked keyword search method. Transactions On Parallel Distributed Systems 27(4):951\u2013963","DOI":"10.1109\/TPDS.2015.2425407"},{"key":"864_CR45","doi-asserted-by":"crossref","unstructured":"Wong WK, D.W.L.C BK, N (2009) Mamoulis Secure kNN computation on encrypted databases. In International Conference on Management of data, ACM SIGMOD","DOI":"10.1145\/1559845.1559862"},{"issue":"2","key":"864_CR46","first-page":"2980","volume":"15","author":"M Zhang","year":"2020","unstructured":"Zhang M (2020) SE-PPFM: a searchable encryption scheme Supporting privacy-preserving fuzzy Multikeyword in cloud systems. Syst J 15(2):2980\u20132988","journal-title":"Syst J"},{"key":"864_CR47","doi-asserted-by":"crossref","unstructured":"Shu J Secure task recommendation in crowdsourcing. In Global Communications Conference (GLOBECOM). 2016, IEEE, Washington, DC, USA","DOI":"10.1109\/GLOCOM.2016.7842254"},{"key":"864_CR48","doi-asserted-by":"crossref","unstructured":"Song F (2022) A location privacy protection method in spatial crowdsourcing. Information security and applications","DOI":"10.1016\/j.jisa.2021.103095"},{"key":"864_CR49","doi-asserted-by":"crossref","unstructured":"Sun L et al (2025) Efficient and privacy-preserving weighted nearby-Fit spatial keyword query in cloud. In IEEE Internet of Things Journal","DOI":"10.1109\/JIOT.2025.3544071"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-026-00864-y","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-026-00864-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-026-00864-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T12:46:50Z","timestamp":1774615610000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s13677-026-00864-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,21]]},"references-count":49,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["864"],"URL":"https:\/\/doi.org\/10.1186\/s13677-026-00864-y","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,21]]},"assertion":[{"value":"31 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 February 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable. This study did not involve human participants, human data, or human tissue.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable. This manuscript does not contain any individual person\u2019s data in any form (including individual details, images, or videos).","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"47"}}