Collusion-resistant Worker Selection in Social Crowdsensing Systems

Document Type : Computer Networking-Amin Hosseini


1 Islamic Azad University

2 Ferdowsi University of Mashhad


The main idea behind social crowdsensing is to leverage social friends as crowdworkers to participate in crowdsensing tasks. A main challenge, however, is the identification and recruitment of well-suited workers. This becomes especially more challenging for large-scale online social networks with potential sparseness of the friendship network which may result in recruiting participants who are not in direct friendship relations with the requester. Such recruitment may increase the possibility of collusion among participants, thus threatening the application security and affecting data quality. In this paper, we propose a collusion-resistant worker selection method which aims to prevent the selection of colluders as suitable participants. For each participant who is considered to be selected as suitable, the proposed method is aimed to prevent any possible collusion. To do so, it determines whether the selection of a new participant may result in the formation of a colluding group among the selected participants. This has been achieved through leveraging the Frequent Itemset Mining technique and defining a set of collusion behavioral indicators. Simulation results demonstrate the efficacy of our proposed collusion prevention method in terms of selecting efficient collusion indicators and detecting the colluding groups.


[1] A. Doan, R. Ramakrishnan, and A. Y. Halevy, “Crowdsourcing systems on the world-wide web,” Communications of the ACM, vol. 54, no. 4, pp. 86–96, 2011.
[2] J. A. Burke, D. Estrin, M. Hansen, A. Parker, N. Ramanathan, S. Reddy, and B. Srivastava, “Participatory sensing,” in Proceedings of the 1st Workshop on World-Sensor-Web (WSW), 2006, pp. 1–5.
[3] S. Reddy, A. Parker, J. Hyman, J. Burke, D. Estrin, and M. Hansen, “Image browsing, processing, and clustering for participatory sensing: Lessons from a dietsense prototype,” in Proceedings of the 4th ACM Workshop on Embedded Networked Sensors, 2007, pp.
[4] E. P. Stuntebeck, J. S. Davis II, G. D. Abowd, and M. Blount, “Healthsense: classification of health-related sensor data through user-assisted machine learn-ing,” in Proceedings of the 9th workshop on Mobile computing systems and applications. ACM, 2008, pp. 1–5.
[5] Y. F. Dong, S. S. Kanhere, C. T. Chou, and R. P. Liu, “Automatic image capturing and processing for petrolwatch,” in Proceedings of the 17th IEEE International Conference on Networks (ICON), 2011, pp. 236–240.
[6] B. Hull, V. Bychkovsky, Y. Zhang, K. Chen, M. Goraczko, A. Miu, E. Shih, Balakrishnan, and S. Madden, “Cartel: a distributed mobile sensor comput-ing system,” in Proceedings of the 4th international conference on Embedded networked sensor systems. ACM, 2006, pp. 125–138.
[7] R. K. Rana, C. T. Chou, S. S. Kanhere, N. Bulusu, and W. Hu, “Ear-phone: an end-to-end participatory urban noise mapping system,” in Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), 2010, pp.
[8] P. Johnson, A. Kapadia, D. Kotz, N. Triandopoulos, and N. Hanover, “People-centric urban sensing: Security challenges for the new paradigm,” TR2007-586, Dartmouth College, Computer Science, Hanover, NH, Tech. Rep., 2007.
[9] K. Shilton, “Four billion little brothers?: Privacy, mobile phones, and ubiqui-tous data collection,” Communications of the ACM, vol. 52, no. 11, pp. 48–53, 2009.
[10] D. Christin, A. Reinhardt, S. S. Kanhere, and M. Hollick, “A survey on privacy in mobile participatory sensing applications,” Journal of Systems and Software, vol. 84, no. 11, pp. 1928–1946, 2011.
[11] I. Krontiris and F. C. Freiling, “Integrating people-centric sensing with social networks: A privacy research agenda,” in Proceedings of the 8th IEEE Inter-national Conference on Pervasive Computing and Communications Workshops (PERCOM), 2010, pp. 620–623.
[12] I. Krontiris and F. Freiling, “Urban sensing through social networks: The tension between participation and privacy,” in Proceedings of the International Tyrrhenian Workshop on Digital Communications (ITWDC), 2010.
[13] M. Demirbas, M. A. Bayir, C. G. Akcora, Y. S. Yilmaz, and H. Ferhatosman-oglu, “Crowd-sourced sensing and collaboration using twitter,” in Proceedings of the IEEE International Symposium on World of Wireless Mobile and Multi-media Networks (WoWMoM), 2010, pp. 1–9.
[14] S. Reddy, D. Estrin, and M. Srivastava, “Recruitment framework for partici-patory sensing data collections,” in Pervasive Computing, ser. Lecture Notes in Computer Science, 2010, vol. 6030, pp. 138–155.
[15] A. Dua, N. Bulusu, W.-C. Feng, and W. Hu, “Towards trustworthy participa-tory sensing,” in Proceedings of the Usenix Workshop on Hot Topics in Security (HotSec), 2009, pp. 8–8.
[16] S. Saroiu and A. Wolman, “I am a sensor, and i approve this message,” in Proceedings of the 11th ACM Workshop on Mobile Computing Systems and Applications (HotMobile), 2010, pp. 37–42.
[17] “Trusted computing group,” https://www.
[18] K. L. Huang, S. S. Kanhere, and W. Hu, “On the need for a reputation system in mobile phone based sensing,” Ad Hoc Networks, vol. 12, no. 0, pp. 130–149, 2014.
[19] S. Ganeriwal, L. K. Balzano, and M. B. Srivastava, “Reputation-based framework for high integrity sensor networks,” in ACM Transactions on Sensor Networks (TOSN), 2008, vol. 4, no. 3, p. 15.
[20] A. Mukherjee, B. Liu, and N. Glance, “Spotting fake reviewer groups in consumer reviews,” in Proceedings of the 21st ACM International Conference on World Wide Web, 2012, pp. 191–200.
[21] H. Amintoosi and S. Kanhere, “A reputation framework for social participa-tory sensing systems,” in Mobile Networks and Applications (MONET), 2014, vol. 19, no. 1, pp. 88–100.
[22] H. Amintoosi and S. S. Kanhere, “A trust-based recruitment framework for multi-hop social participatory sensing,” in Proceedings of the 9th IEEE Inter-national Conference on Distributed Computing in Sensor Systems (DCOSS), 2013, pp. 266–273.
[23] H. Amintoosi and S. Kanhere, “Privacy-aware trust-based recruitment in so-cial participatory sensing,” in 10th International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services (MobiQuitous), 2013, pp. 262–275.
[24] H. Amintoosi, S. S. Kanhere, and M. Allahbakhsh, “Trust-based privacy-aware participant selection in social participatory sensing,” Journal of Infor-mation Security and Applications, vol. 20, pp. 11–25, 2015.
[25] R. Agrawal and R. Srikant, “Fast algorithms for mining association rules,” in Proceedings of the 20th International Conference on Very Large Data Bases (VLDB), vol. 1215, 1994, pp. 487–499.
[26] T. Brijs, B. Goethals, G. Swinnen, K. Vanhoof, and G. Wets, “A data mining framework for optimal product selection in retail supermarket data: the generalized profset model,” in Proceedings of the 6th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2000, pp. 300–304.
[27] T. Brijs, G. Swinnen, K. Vanhoof, and G. Wets, “Using association rules for product assortment decisions: A case study,” in Proceedings of the 5th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 1999, pp. 254–260.
[28] W. Lee, S. J. Stolfo, and K. W. Mok, “Adaptive intrusion detection: A data mining approach,” Artificial Intelligence Review, vol. 14, no. 6, pp. 533–567, 2000.
[29] G. Grahne and J. Zhu, “Fast algorithms for frequent itemset mining using fp-trees,” IEEE Transactions on Knowledge and Data Engineering, vol. 17, no. 10, pp. 1347–1362, 2005.
[30] M. Allahbakhsh, A. Ignjatovic, B. Benatallah, S.-M.-R. Beheshti, E. Bertino, and N. Foo, “Collusion detection in online rating systems,” in Proceedings of the 15th Asia Pacific Web Conference (APWeb), 2013, pp. 196–207.
[31] E.-P. Lim, V.-A. Nguyen, N. Jindal, B. Liu, and H. W. Lauw, “Detecting product review spammers using rating behaviors,” in Proceedings of the 19th ACM International Conference on Information and Knowledge Management (CIKM), 2010, pp. 939–948.
[32] G. Salton, C. Buckley, and E. A. Fox, “Automatic query formulations in in-formation retrieval,” Journal of the American Society for Information Science, vol. 34, no. 4, pp. 262–280, 1983.
[33] J. Leskovec, L. Adamic, and B. Huberman, “The dynamics of viral market-ing,” ACM Transactions on the Web (TWEB), vol. 1, no. 1, pp. 1–39, 2007.
[34] R. Levien and A. Aiken, “Attack-resistant trust metrics for public key cer-tification,” in Proceedings of the 7th USENIX Security Symposium, 1998, pp. 229–242.
[35] H. R. Motahari Nezhad, G. Y. Xu, and B. Benatallah, “Protocol-aware matching of web service interfaces for adapter development,” in Proceedings of the 19th ACM International Conference on World Wide Web, 2010, pp. 731– 740.
[36] G. Chowdhury, Introduction to Modern Information Retrieval. Facet pub-lishing, 2010.
[37] T. Malone, R. Laubacher, and C. Dellarocas, “Harnessing crowds: Mapping the genome of collective intelligence,” in MIT Sloan Research Paper, 2009.
[38] S. S. Kanhere, “Participatory sensing: Crowdsourcing data from mobile smartphones in urban spaces,” in Distributed Computing and Internet Tech-nology. Springer, 2013, pp. 19–26.
[39] “Collusion in peer-to-peer systems,” in Computer Networks, 2011, vol. 55, no. 15, pp. 3517 – 3532.
[40] Q. Lian et. al., “An empirical study of collusion behavior in the maze p2p file-sharing system,” in 27th International Conference on Distributed Comput-ing Systems. IEEE Computer Society, 2007, pp. 56–.
[41] Y. Sun and Y. Liu, “Security of online reputation systems: The evolution of attacks and defenses,” in Signal Processing Magazine, IEEE, 2012, vol. 29, no. 2, pp. 87 –97.