About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Quality, Reliability, Security and Robustness in Heterogeneous Systems. 17th EAI International Conference, QShine 2021, Virtual Event, November 29–30, 2021, Proceedings

Research Article

Towards Secure and Trustworthy Crowdsourcing with Versatile Data Analytics

Download(Requires a free EAI acccount)
4 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-91424-0_3,
        author={Rui Lian and Anxin Zhou and Yifeng Zheng and Cong Wang},
        title={Towards Secure and Trustworthy Crowdsourcing with Versatile Data Analytics},
        proceedings={Quality, Reliability, Security and Robustness in Heterogeneous Systems. 17th EAI International Conference, QShine 2021, Virtual Event, November 29--30, 2021, Proceedings},
        proceedings_a={QSHINE},
        year={2021},
        month={11},
        keywords={Crowdsourcing Confidential computing Data protection},
        doi={10.1007/978-3-030-91424-0_3}
    }
    
  • Rui Lian
    Anxin Zhou
    Yifeng Zheng
    Cong Wang
    Year: 2021
    Towards Secure and Trustworthy Crowdsourcing with Versatile Data Analytics
    QSHINE
    Springer
    DOI: 10.1007/978-3-030-91424-0_3
Rui Lian, Anxin Zhou, Yifeng Zheng, Cong Wang,*
    *Contact email: congwang@cityu.edu.hk

    Abstract

    Crowdsourcing enables the harnessing of crowd wisdom for data collection. While being widely successful, almost all existing crowdsourcing platforms store and process plaintext data only. Such a practice would allow anyone gaining access to the platform (e.g., attackers, administrators) to obtain the sensitive data, raising potential security and privacy concerns. If actively exploited, this not only infringes the data ownership of the crowdsourcing requester who solicits data, but also leaks the privacy of the workers who provide data. In this paper, we envision a crowdsourcing platform with built-in end-to-end encryption (E2EE), where the crowdsourced data remains always-encrypted secret to the platform. Such a design would serve as an in-depth defence strategy against data breach from both internal and external threats, and provide technical means for crowdsourcing service providers to meet various stringent regulatory compliance. We will discuss the technical requirements and related challenges to make this vision a reality, including: 1) assuring high-quality crowdsourced data to enhance data values, 2) enabling versatile data analytics to uncover data insights, 3) protecting data at the front-end to fully achieve E2EE, and 4) preventing the abuse of E2EE for practical deployment. We will briefly overview the limitations of prior arts in meeting all these requirements, and identify a few potential research directions for the roadmap ahead.

    Keywords
    Crowdsourcing Confidential computing Data protection
    Published
    2021-11-17
    Appears in
    SpringerLink
    http://dx.doi.org/10.1007/978-3-030-91424-0_3
    Copyright © 2021–2025 ICST
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL