Next Article in Journal
Experimental Validation of a Microwave Imaging Method for Shallow Buried Target Detection by Under-Sampled Data and a Non-Cooperative Source
Previous Article in Journal
Comparison of Two Electronic Physical Performance Batteries by Measurement Time and Sarcopenia Classification
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Blockchain-Based Spatial Crowdsourcing System for Spatial Information Collection Using a Reward Distribution

1
Department of GIS, Faculty of Geodesy and Geomatics Engineering, K. N. Toosi University of Technology, Tehran 19967-15433, Iran
2
Department of Geomatics Engineering, University of Calgary, Calgary, AB T2N 1N4, Canada
*
Authors to whom correspondence should be addressed.
Sensors 2021, 21(15), 5146; https://doi.org/10.3390/s21155146
Submission received: 13 July 2021 / Revised: 26 July 2021 / Accepted: 26 July 2021 / Published: 29 July 2021
(This article belongs to the Section Internet of Things)

Abstract

:
Due to the increasing relevance of spatial information in different aspects of location-based services, various methods are used to collect this information. The use of crowdsourcing due to plurality and distribution is a remarkable strategy for collecting information, especially spatial information. Crowdsourcing can have a substantial effect on increasing the accuracy of data. However, many centralized crowdsourcing systems lack security and transparency due to a trusted party’s existence. With the emergence of blockchain technology, there has been an increase in security, transparency, and traceability in spatial crowdsourcing systems. In this paper, we propose a blockchain-based spatial crowdsourcing system in which workers confirm or reject the accuracy of tasks. Tasks are reports submitted by requesters to the system; a report comprises type and location. To our best knowledge, the proposed system is the first system that all participants receive rewards. This system considers spatial and non-spatial reward factors to encourage users’ participation in collecting accurate spatial information. Privacy preservation and security of spatial information are considered in the system. We also evaluated the system efficiency. According to the experiment results, using the proposed system, information accuracy increased by 40%, and the minimum time for reviewing reports by facilities reduced by 30%. Moreover, we compared the proposed system with the current centralized and distributed crowdsourcing systems. This comparison shows that, although our proposed system omits the user’s history to preserve privacy, it considers a consensus-based approach to guarantee submitted reports’ accuracy. The proposed system also has a reward mechanism to encourage more participation.

1. Introduction

The term crowdsourcing was coined in 2006, with the concept of using people to perform a task in the form of an open call [1]. Applying this concept and using the hired population’s location to perform specific tasks creates a concept called spatial crowdsourcing [2]. The relevance of sensitive information in spatial crowdsourcing systems, especially spatial information, has led to the use of various encryption methods and technologies to store this information. With the advent of blockchain technology by Satoshi Nakamoto in 2008 [3], there has been widespread use of this technology in different fields. The characteristics of blockchain, such as distribution, transparency, security, and immutability, increased its popularity in various applications, such as finance [4,5], integrity verification [6,7,8], governance [9,10], internet of things [11,12,13], healthcare management [14,15,16], privacy and security [17,18], and education [19,20,21]. Besides, different platforms are designed to implement blockchain technology in various aspects [22,23,24]. In addition, the use of blockchain in crowdsourcing preserves the users’ privacy [25,26], secures crowdsourcing systems, and makes transactions between users transparent. Generally, the central authority in the crowdsourcing system endangers the users’ privacy and reduces security and transparency [27,28]. Additionally, to the best of our knowledge, there is no rewarding mechanism for requesters in traditional crowdsourcing systems [29]. Moreover, collecting accurate spatial information can be effective in better allocating resources. In this paper, based on the use of blockchain technology in spatial crowdsourcing, we proposed a system to increase the quality of the information received from public reports in terms of transparency, security, and accuracy. Due to the lack of proper validation methods in crowdsourcing systems and the relevance of this issue in better information management and resource allocation, this article aims to establish a secure system to prevent entering incorrect information deliberately or inadvertently by users of the system. Consequently, the spatial information sent by each user must be verified by other users at that location to record the report in the blockchain-based spatial crowdsourcing system. In other words, the received report is initially provided as a task to other users in the target location. In the proposed system, a user logs into the crowdsourcing application and submits a location-based report. Afterward, other users are selected based on the location of the report as workers to confirm or reject the report as a task. Once confirmed, the system records the information as a transaction in the pending list of the designed private blockchain. In summary, the main contributions of this study are as follows:
  • We proposed a blockchain-based system that increases transparency and security in the system compared to centralized systems.
  • The proposed system uses crowdsourcing to collect spatial information in the form of reports, which reduces the entry of incorrect information into the system. The impact of this reduction on better resource allocation is also examined.
  • To our best knowledge, this is the first system to reward all users based on spatial and non-spatial factors. We also provided formulas for calculating this reward.
  • Moreover, due to the relevance of spatial information in the system, we performed user privacy and security analysis.
The rest of this article is as follows. Section 2 presents a summary of related work in the field of crowdsourcing and the use of the blockchain technology in this area. Section 3 explains the problem and introduces the architecture of the proposed system; it also states the threat model and goal of the proposed system. In Section 4, we implement the proposed system. Section 5 presents security and privacy analysis. In Section 6, we evaluate the system performance. Finally, Section 7 concludes this work and outlines future works.

2. Related Works

Recently, different words, which have the same meaning, have been used to introduce the concept of spatial crowdsourcing [30]. Terms such as place-centric crowdsourcing [31,32], mobile crowdsourcing [33,34,35], and location-based crowdsourcing [36,37,38,39] are all used to perform a task depending on the user’s location. Different categories are provided for spatial crowdsourcing applications [30]. Applying spatial crowdsourcing to gathering information in a specific location [40,41,42,43,44,45,46], answering spatial queries, and using local people’s knowledge to solve problems within a particular area are applications of this concept [47,48,49,50]. In addition, spatial crowdsourcing is used in location-based services to detect traffic incident [51].
The quality of data collected by individuals should be evaluated from various aspects [52,53,54]. The accuracy, precision, and security of the information collected in spatial crowdsourcing are among the qualitative elements. In addition, some articles have highlighted the importance of privacy-preservation in spatial crowdsourcing systems [55,56].
According to the different architectures used in the design of crowdsourcing systems, we have classified them into three. The first category is centralized crowdsourcing systems [57,58,59,60,61]. The assumption of the centralized systems is to have a third trust party for storing information and performing other crowdsourcing processes. A centralized crowdsourcing system often suffers from a lack of security and privacy, and since there is sensitive information in spatial crowdsourcing systems, they are not good choices. The second category is decentralized crowdsourcing systems. These systems are designed to solve problems of centralized systems. Zhang et al. have developed a distributed dissemination protocol and minimized the makespan by designing a delay tolerant network [62]. There has been a study on using social relationship factors for task assignment in the crowdsourcing system [63]. Cheung et al. in [64] provided an algorithm for distributed and anonymous task solutions that improve computing speed in crowdsourcing systems.
Although the creation of these systems could solve many security and privacy issues, the lack of traceability and transparency in how users perform their tasks led to another category of architecture called distributed crowdsourcing systems. Recently, various crowdsourcing systems used blockchain platforms in their design [65]. By integrating the concept of crowdsourcing and blockchain, a framework has been developed to improve the judiciary process by using collective intelligence, which has led to increased transparency in judgments. A crowdfunding system, called Betfunding, is based on a blockchain that enhances the security and transparency of users’ financial transactions. This system classifies users into three groups: (1) funders who are interested in project development but lack sufficient knowledge or resources; (2) developers who possess enough knowledge of project development; and (3) judges who play the role of a trusted third party in the system. The Solidity programming language has been used to implement smart contracts on Ethereum networks [66]. In addition, the use of blockchain in crowdfunding systems helps regulators manage investor money and solve financial security problems. The use of blockchain in social networks has also been of interest. Given the relevance of using a trusted structure to assign tasks to workers in crowdsourcing, blockchain-based crowdsourcing systems have been designed and implemented. Some systems have used cryptocurrencies to incentivize users. crowdBC is a blockchain-based framework for crowdsourcing that is implemented on the official Ethereum test network [67]. There are four leading roles in this framework—requester, worker, CrowdBC client, and miner. First, a requester sends task description and reward amount to the system. Then, the system selects workers based on their skills and best bid, which is done locally in the user’s system by the crowdBC client. Finally, a miner adds previous transactions into the blocks and provides security for the system [28]. A private and anonymous decentralized crowdsourcing system called ZebraLancer focuses on two critical issues—data leakage and identity breach [68]. In this system, task results are encrypted using the requester’s public key and are placed in a smart contract. The results are then evaluated according to the instructions provided by the requester on the blockchain. If a worker submits a task twice, no one can link to it. This system has been implemented in the Ethereum smart contract. The combination of crowdsourcing and blockchain is used in various areas. Improving the security of transportation systems has led to the development of a blockchain-based intelligent transportation system framework [69]. In addition, to encourage citizens to report problems in smart cities, a secure distributed crowdsourcing network called Vizsafe has been implemented; it uses Ethereum to incentivize people to submit reports [70]. Public participation GIS (PPGIS) is one of the other aspects where blockchain can increase citizens’ participation in decision-making [71]. In this system, smart contracts have been implemented in the Ethereum network, and the web3.js [72] library is used to interact with smart contracts. Blockchain technology is useful in solving real-estate problems. All contracts between users are stored in the blockchain and cannot be changed. Besides, users can apply for investment, mortgage, loans, and other financial assistance. Investors and financial institutions can use the system to search for different offers on financial issues [73]. Designing a crowdsourced energy system (CES) for small-scale collaborative power supply with the help of cryptocurrencies and blockchain is another application of this technology in crowdsourcing systems. Implementing CES on a large scale requires a secure framework, and blockchain and smart contracts are good choices in this area [74]. With the advent of the internet of things, the use of massive sensors to collect information and establish secure communication between sensors has employed the blockchain in this area [75]. Crowdsourcing is an appropriate solution for sharing knowledge that can solve problems faster and cheaper [76]. CPchain is a copyright-preserving crowdsourcing data trading framework based on blockchain. Consumer, seller, IPFS, smart contract, and digital fingerprint-embedding algorithm are the system’s five entities. In this system, the smart contract plays the role of a broker [77]. A mechanism for fine-grained authorization in data crowdsourcing has also been proposed. Therefore, the third-party entities evaluate the data. Cloud storage is used to store encrypted data [78]. TSWCrowd is a decentralized task-select-worker framework that sorts tasks to ensure reliability and prevent completing tasks without payment. It uses smart contracts to publish tasks and select workers for the tasks [79].
Although using blockchain in crowdsourcing systems solves many problems related to security, transparency, traceability, and privacy [27,80,81], the current systems have many issues.
Based on the current literature review, there are several gaps in spatial crowdsourcing systems:
  • To the best of our knowledge, the rewarding mechanism for requesters is overlooked in crowdsourcing systems [29]. Furthermore, the lack of spatial factors to calculate the rewards of various users who participate in spatial crowdsourcing systems poses problems.
  • Using users’ history in crowdsourcing systems reveals the users’ sensitive information and endangers their privacy [80].
  • The lack of secure and transparent distributed spatial crowdsourcing systems for collecting accurate information is a significant issue and less research has been carried out in this area [81].
The proposed system uses a rewarding mechanism for all different roles in the spatial crowdsourcing system to collect accurate spatial information.

3. Problem Statement

In this section, we first introduce the spatial crowdsourcing system architecture and then explain the threat model and the assumptions. Finally, we present the notations and goals of this research.

3.1. The Proposed System Architecture

In the system architecture, users are classified into three. However, initially, they have no particular distinction and may play different roles at any given time. The three classes are requesters, workers, and miners. In the designed system, requesters submit reports, and workers are assigned only because of their location and without any intervention from other users. Miners are responsible for mining blocks in the blockchain network. Figure 1 shows the system architecture of this blockchain-based spatial crowdsourcing system. In this system, the requesters determine the location and type of these reports. The type of report can be any of urban issue, including inundation and fire. Users do not have a particular role in this system until a report is submitted.
After registering the report, the workers are selected according to their location at that moment. The role of workers is to confirm or reject reports recorded in specific locations. If more than half of the workers confirm the type of report in the desired location, this report will be confirmed and sent to the blockchain. A number is considered for the minimum number of workers confirming the report. All users in this system can be miners, and after confirming the report by the workers, they can mine the blocks in the blockchain. If workers do not confirm the report, it will be removed. The requester is unable to identify the workers, their location, and votes. There are no restrictions on sending reports to the system, and a user can play three different roles in a short time. The requester cannot simultaneously play the role of a worker for the report they submit. Although the workers are selected based on the report’s location, the requester does not need to be in the location where the report is about. In addition, the location of miners is irrelevant in this system.

3.2. Notations

Abbreviations section shows all the notations used in this article, some of which are described below for better understanding.
  • Each Ni can play three main roles in the blockchain-based spatial crowdsourcing system. Wi, Mi, and Ri are the roles that each user i can play in the system. Ri submits REi to the system. The system specifies Uw for validation of REi. Uw votes to confirm or reject TREi that is located at LREi.
  • IDw and IDr are the identifiers of each worker and requester. CoREi = (IDr, IDre, TREi, Tre, and LREi) and LREi = (Lati,re, Loni,re), which is compared with each LWi = (Lati,w, Loni,w).
  • Ti is placed in Pent. We have many Bi in the designed blockchain, and each Bi has numerous Ti. Ti has unique IDt. CoREi is the content of each report, and CoTk is the content of each transaction in the blockchain-based spatial crowdsourcing system.
  • PEYr is the reward of requesters when their reports are confirmed and PEYm is the miners’ reward after mining. PEYw is the reward of the workers in this system.

3.3. Research Assumptions and Threat Model

In this section, we first present the research assumptions. In addition, we examine the effects of malicious users on the system. In the threat model, we analyze the system’s role against the destructive effects of newbies.

3.3.1. Research Assumptions

  • Nodes cannot record transactions directly in the blockchain and do not have access to unconfirmed reports in the system.
  • Submitting reports by the requesters and assigning tasks to the workers is carried out through a secured communication channel.
  • Reward payments are transferred securely.

3.3.2. Threat Model

Given that the ability and activity of each role are defined in the proposed system, the thread model has been inspired by the Persona Non Grata method to focus more on the potential threats of users and their motivations in different roles [82]. Due to the various roles of users in the proposed system, we have divided the potential threats into five main categories: malicious requesters, malicious workers, malicious miners, newbie requesters, and newbie workers. These categories are described in the following paragraphs.
The first category is malicious requesters. In such crowdsourcing systems, malicious requesters may submit a report several times to receive more rewards (in the designed system, all participants receive a reward). Malicious requesters try to manipulate the information in the confirmed reports before sending them to the blockchain. The requesters may also want to make changes to the registered reports, submit them in their names, manipulate the correct information, and record incorrect information in the system. Requesters may want to receive more rewards by changing the system’s incentive policies. They may submit false reports and ask malicious workers to confirm them to get more rewards, which will lead to an unfair distribution of tasks among the workers. Some malicious requesters may want to submit their reports to the blockchain without confirmation.
The second category is malicious workers. To get more rewards, malicious workers in this system may want to confirm a report several times, or some workers may ally with each other to confirm incorrect reports. Malicious workers may want to confirm a report without being in the location. Some of them try to obtain sensitive information from requesters or other workers to abuse them. They attempt to make changes to incentive policies to get more rewards for each report. Sometimes they try to get a reward without performing their tasks. Workers also reject a valid report so that they can submit it as a requester. Workers try to confirm or reject a report based on the votes of other workers.
The third category is malicious miners. There are malicious miners in a system that tries to create fork chains to get more rewards.
Newbie requesters are the forth category. Some newbie requesters are not intentionally malicious users and do not benefit from their incorrect behavior in the system. Due to insufficient knowledge, they cause harm to themselves and the workers in the system. This behavior can be the wrong choice of report type, which is selected due to a misunderstanding of what happened. In addition, they may submit a previously registered report, which will reduce the system’s performance.
The last category is newbie workers. Some newbie workers are not malicious, and their behavior is not due to abuse of the system and other users. However, due to insufficient knowledge, they may harm requesters or other workers in the system. This behavior can be incorrect confirmation or rejection of reports.
In some centralized and distributed crowdsourcing systems, there is insufficient knowledge about the task created by the requesters and the evaluation of the task performed by workers in the system. They are only responsible for preventing fraud in payments and contracts between the requesters and workers, which is performed by a centralized server or smart contracts in blockchain-based systems. New users may cause problems in these systems.

3.4. Design Goals

This blockchain-based spatial crowdsourcing system aims to improve some vulnerabilities in both traditional and current crowdsourcing systems. With the advent of blockchain technology, some problems in centralized systems have been solved. These problems include the existence of a third trusted party to perform all activities related to assigning tasks among workers, rewarding, and confirming workers’ tasks. Using blockchain in crowdsourcing can solve these problems. Despite solving these problems in distributed systems, the lack of requester’s knowledge in creating provisions of the contract and, on the other hand, the lack of awareness of the workers about the intended tasks causes issues in such systems. These problems may be due to users’ different perceptions of a concept. Besides, the lack of monitoring of contracts between requesters and workers causes damage to various nodes in the network.
Moreover, improving the quality of spatial information from the perspective of accuracy can be the solution to some problems in decision-making and resource allocation. The proposed system aims to solve the above-mentioned issues, which are summarized below.
  • Traditional systems perform all the processes of the spatial crowdsourcing system by a centralized authority, which causes risks such as single-point failure. In these systems, the selection of workers and the confirmation or rejection of tasks submitted by the requester are made by the central authority. In addition, in the case of data leakage, sensitive user information, including spatial information, task solutions, and user rewards, is abused. Besides, these systems use the central authority to determine the distribution of rewards and the confirmation of workers’ tasks that blockchain solves these problems.
  • The existence of transparent participatory systems for the public and the ability to trace all system activities to improve performance is one of the blockchain-based crowdsourcing system purposes.
  • Current data collection systems are inaccurate in data collection, which is more common in location-based systems. Improving the quality of these systems, in terms of accuracy, is another goal of this blockchain-based spatial crowdsourcing system, which is carried out with the confirmation or rejection of reports by workers.
  • Despite the benefits of current distributed systems, they have drawbacks. Insufficient requester knowledge in creating provisions of contract can affect the worker’s confirmation or rejection of a task. In these systems, workers can only receive their rewards if they meet the requesters’ requirements. Besides, there is no evaluation for requesters, which results in an unfair evaluation of workers by requesters. In the proposed system, this problem is solved using the votes of the selected workers for each report.
  • Better management and allocation of resources in different regions due to reduced incorrect information is another goal of the proposed system.

4. The Proposed Blockchain-Based Spatial Crowdsourcing System

4.1. Overview

By establishing this system, we have provided a secure and transparent environment for gathering spatial information. The system is built to collect spatial information based on the use of crowdsourcing. It uses incentive policies to encourage users to participate in the system. Generally, people do not participate in such systems due to the lack of motivation and privacy. Facilities are responsible for reviewing confirmed reports in the system and resolving related issues. The use of blockchain enables users to evaluate the performance of related facilities. Facilities are also required to provide accurate information to the public. In this system, no role is initially assigned to the users, and they register in the system in the same way. No personal information is required for registration. Ri does not need to be in the location listed in the report and can submit the report from another location. After submitting REi, the location of the workers in the system is determined. Uw close to the location of the report are selected. The number of Uw selected for each report must be greater than 2, although this number is optional. If more than half of the specified workers confirm the report, it will be permanently recorded in the blockchain. REi is stored as Ti in Pent. All users have access to the blockchain and can view the information. In this system, all users are miners. After registering the transactions, Bi is mined, and Ti is placed in Bi. IDr and IDw confirmed REi, LREi, TREi, Tre and are the items that are stored in the Ti. LRi is not recorded in Ti. To motivate users to participate in this system, all users can receive rewards according to the factors considered. Consensus algorithms are used to maintain blockchain integrity. Two main functions are used to design the system’s processes. The first function is task management, which includes registration, task submission, task assignment, and task confirmation. The second function is blockchain management, which determines the structure of blocks and the incentive mechanism. After performing the above steps, the reports recorded in the blockchain are accurate and precise. In addition, they are traceable to the public.

4.2. Proposed System Implementation

4.2.1. Task Management

This function includes user registration, task submission, worker selection, and report confirmation. After completing these steps, the reports will be recorded as a transaction in the blockchain.

Registration

The only way to enter the system and access the blockchain is to register through the system interface. There is no need for sensitive user information to register in the system. When a user registers in the system, it will use the consensus algorithm to access all the information in the blockchain, including the pending list and the mined blocks.

Task Submission

After registration, the user can select LREi and TREi that are predefined in the system. The user does not need to be in LREi, and the LRi will not be recorded in the system. CoREi includes TREi and LREi that are in the form of Lati,re and Loni,re, Tr, and IDre. Ri determines LREi on the map so that the coordinates are more accurately recorded.

Task Assignment

After submitting the report, the location of other users will be taken. Afterward, the distance between users and the report is obtained. Workers are selected according to the radius considered in the system up to the location of each report. There is no information about workers except for their location. The requesters and other workers also have no information about each other before and after the selection. In addition, to assign tasks, users’ history is not considered for selection. The combination of workers is stored for each report because workers who are close to each other are not always in the same group. Moreover, users in the same area may confirm or reject reports for higher profit, which reduces the system performance. To solve this problem, the combination of workers will change randomly depending on the number of people in the report’s location. With this condition, it is not possible to assign the same group of workers for several reports, and this prevents fraud in assigning tasks. The task assignment step is presented in Algorithm 1. Different algorithms are used to measure distance. In this system, the distance between the reports and workers is calculated on the sphere. The reason for this is the difference between the distances on the sphere and plate. We used the Haversine formula to calculate the distance [83]. This formula uses the location in latitude and longitude coordinates.
θ = d / r
hav θ   = hav φ 2 φ 1   + cos φ 1 cos φ 2 hav λ 2 λ 1
hav θ   = sin 2 θ / 2   =   1 cos θ / 2 d = r   hav 1 h   = 2 r sin 1 h = 2 r sin 1 ( sin 2 φ 2 φ 1 / 2   + cos ( φ 1 ) cos φ 2 sin 2 λ 2 λ 1 / 2 )
Algorithm 1. Task Assignment Algorithm.
Input Report; Users
Output Workers
1: Get the report’s location
2: Calculate the region of the report
3: Get users’ location
4: Calculate the distance between users and the report
5: Get the combination of workers in each report
6: if UserDistance < ReportRegionDistance then
7:  WorkersInRegion = Users;
8:  if WorkersInRegion in WrokerCombinationInEachReport then
9:      return False;
10:  else
11:      Workers = WorkersInRegion;
12:  end if
13:  return Workers
14: end if

Task Confirmation

Once workers are determined, they are asked to confirm or reject the report. The location and type of each report are sent to workers. Given the spatial radius, they have time to observe the location of the report and then vote. If more than half of the workers confirm a report, the report is permanently recorded in the blockchain. The task confirmation step is presented in Algorithm 2. Otherwise, the report will be removed after a while, and no information will be available on the blockchain network. When users vote for a report, they do not have information about other workers’ votes in the system before confirmation. Afterward, the ID of the users who have confirmed the report becomes available in the blockchain. In addition, the workers’ votes have the same rank. Consequently, it is only the vote of the group that determines the confirmation or rejection of a report.
Algorithm 2. Task Confirmation Algorithm.
Input Workers; Report
Output Confirmed report
1: Request for confirmation to workers
2: Confirm or reject the report
3: if confirm = True then
4:  return report confirmation;
5: end if
6: if NumberOfConfirmation > NumberOfWorkers/2 then
7:  send report to blockchain;
8:  return confirmed report;
9: end if

4.2.2. Blockchain Structure

After the task management is completed, the report is sent to the blockchain in the form of a transaction. A new block is mined, and the transaction is placed into the block. Then, the participants receive their rewards based on specified factors.

Transaction Structure

Each transaction includes the transaction ID, the type and location of the report, and the time of its submission (Figure 2). This structure helps to improve the transparency and traceability of the system, and all users can check their performance in the system.

Incentive Mechanism

The system’s incentive policy is for all users. After the block is generated, all users who participated get their rewards. A combination of spatial and non-spatial factors is used to determine the value of the user reward in the proposed system. The reward value is different for each user. Spatial factors for determining the amount of the reward include the spatial diversity of the confirmed reports by each requester and the spatial diversity of the reports confirmed by the worker. Non-spatial factors considered include the number of workers that confirmed the report and the coefficient for adjusting the reward amounts, which are different for each role. The reward for miners in this system is the same. In (4), γ is the adjustment coefficient of the reward, which is between 0 and 1, and it is higher for the requesters than workers.
P E Y r = γ × N r e × i , j = 0 n d i j
P E Y w = γ × 1 / N w × N c × i , j = 0 m d i j
N r e is the number of approved reports for each requester and is the sum of the distances between this report and the previous reports of the requester. The higher the value, the greater the spatial diversity of the requester’s reports. In (5), Nc is the sum of the reports confirmed by a worker, and i , j = 0 m d i j is the sum of the intervals between this report and the previous reports confirmed by the worker. This value indicates the spatial diversity of the reports that the worker has confirmed and is recorded in the blockchain. Nw is the number of workers who have confirmed the report. The lower the number, the higher the reward for workers. All factors are calculated from the blockchain.

5. Security and Privacy Analysis

In this section, we first discuss the security of the system against some attacks and then explain the users’ privacy in the system.

5.1. Security Analysis

Security analysis in this article includes Byzantine fault tolerance, reputation fault tolerance, transaction malleability, time jacking, race attack, distributed denial of service (DDoS) attack, decentralization, and no single-point failure. We also look at how to deal with these attacks on the system.

5.1.1. Byzantine Fault Tolerance

In distributed systems, it is essential to broadcast the correct values between the different nodes of the system. Byzantine faults have negative effects in the crowdsourcing systems [27]. Broadcasting the incorrect information in the system causes incorrect reports in terms of location and type. Furthermore, changing the workers of the confirmed reports in the system causes the same workers to be selected for reports in the same locations, revealing the exact location of the workers. The use of POW consensus algorithm in the blockchain of the spatial crowdsourcing system maintains the integrity of the information in the system, which makes it resistant to Byzantine faults.

5.1.2. Reputation-Based Attacks

The different privileges that users have in systems cause various attacks to increase or decrease the reputation of users. This has some effects on how to calculate rewards and task assignments. In this system, users do not have any privileges, and assigning tasks is based on the location of workers. All miners have equal rights to mine blocks. Requesters have no priority over others when submitting a report. The privileges considered for calculating rewards are spatial and non-spatial factors computed after workers’ selection.

5.1.3. Transaction Malleability

Transactions may change after they are created and before added to the blockchain. These changes are usually applied to transaction IDs. In this system, the immutable elements of each transaction are used, including the location of a report, worker’s ID, and requester’s ID. User rewards are calculated on the basis of these elements, and changing the transaction ID does not disrupt the system.

5.1.4. Time Jacking

In this attack, the timestamp of the target node is manipulated. In this case, the node is isolated and fraudulent transactions are made and sent to the target node. In this system, the node information is integrated with all other nodes. Valid blocks are always placed in all nodes.

5.1.5. Race Attack

In this attack, the adversary makes two transactions—one legitimate and one fraudulent. It sends the legitimate transaction to the mining pool and the fraudulent one to the target node so that it can obtain services from the node without providing a valid transaction. In our system, no user is allowed to add two reports with the same location and type in a certain period. In addition, the calculation of the reward is based on a valid chain. Consequently, the existence of these fraudulent transactions in the system will not affect and will be eliminated.

5.1.6. DDOS Attack

In this attack, the adversary sends a large number of requests to cause problems for different parts of the system. In our system, each request must be passed through the workers’ filter before being registered in the blockchain. If workers confirm the report, it will be registered as a transaction. Consequently, no matter how many requests there are, they are not directly added to the blockchain to disrupt the system. It is only possible that the number of transactions will increase, which due to the time lag in the reports’ confirmation by workers, will not be registered into the system all at once.

5.1.7. Decentralization

There is a possibility that there are powerful miners in blockchain-based systems. These miners try to control the blockchain with more computing power. To solve this problem, the number of blocks that each miner can mine at a given time is constant. If it exceeds this value, the block in the system is considered invalid.

5.1.8. No Single-Point of Failure

Due to the intrinsic characteristics of the blockchain and the role of all users as miners, this problem is solved.

5.2. Privacy Analysis

Privacy preservation is an essential factor in spatial crowdsourcing systems. It can increase users’ participation.

Pseudonymity

In our system, the real identity of the users is not used for authentication. There is also no location information for requesters in the system. As mentioned, requesters do not need to be in the location of the report, and the report’s location is recorded only in the system. After the report is recorded in the blockchain, there is no information about the location of the workers. Besides, workers may be in any location after the transaction is registered, which preserves the privacy of workers. In addition, owing to the use of cryptocurrencies to pay bonuses, there is no need for users’ banking information, which prevents revealing their real identities.

6. Performance Evaluation

This section first explains the system settings in which we implemented the user interface and blockchain network. Then, to evaluate the performance of the proposed system, we consider a scenario in which we examine the number of assigned reports to facilities and the time interval to review them at specified distance intervals. Finally, we provide a comparison between the proposed system and other existing crowdsourcing systems. The five factors considered for this comparison are privacy, worker credential, worker experience, requester reputation, and requester reward.

6.1. System Setting

We implemented the system user interface using the JavaScript programming language and React Native Framework on Android and iOS platforms. In addition, we used Node.js Express Framework to implement the blockchain network. We used the sha256 algorithm for hashing blocks in the blockchain.

6.2. Resource Allocation

By using the proposed system, the collection of accurate reports is increased which results in better resource allocation and faster review time. To examine the proposed system, we considered a scenario to evaluate the effect of removing incorrect reports on the review time of submitted reports. In this scenario, we assumed that the submitted reports can only be checked by field observations. We first placed 100 points to represent facilities randomly in Charlotte city, North Carolina. The users submitted their reports using the system user interface. We considered 1000 points as reports received for those facilities, which had been randomly selected. Afterward, the workers were selected based on their closeness to the reports’ location.
To calculate the minimum time interval between facilities and reports, we measured the distance between each facility and reports in the area. Then, according to the number of facilities and reports, we allocated several reports to each facility. By calculating the time interval between each facility and the related reports, as well as the distance of reports with each other, we obtained the minimum time interval between each facility and related reports. The number of reports assigned to each facility depends on the location of the reports and facilities. We obtained these distances from the street network in the area. Confirmed reports should be reviewed at the reports’ location. Consequently, the Euclidean distance is not suitable for calculating the time interval and the distance on the street network must be calculated. Figure 3 shows how these facilities are allocated to reports.
To evaluate the impact of the proposed system, we assumed that each worker would confirm or reject the reports, and we considered a number of these reports randomly invalid in terms of location and accuracy of the information. Then, we calculated the minimum distance in different steps. These changes were carried out in four steps. At each step, we considered 10% of the 1000 received reports incorrect. Figure 4 shows that using the proposed system prevents the registration of incorrect information to the system in each step, which reduces the number of reports assigned to facilities in each distance interval. The distance interval refers to the distance between assigned reports and facilities. This reduction will lead to better resource allocation and speed up the review time of accurate reports. Figure 5 also shows that rejecting incorrect reports reduces the time interval to review facilities’ accurate reports in specific distance intervals between facilities and assigned reports.
Table 1 shows the minimum time interval for facilities to review total reports in each step. According to the obtained values, if 40% of the reports are incorrect and rejected by workers, 505.15 min will be reduced from the optimal time interval. This reduction will lead to a faster review of critical reports in the region and the allocation of more resources to future reports in the system.

6.3. Comparison

To date, various systems have been created for crowdsourcing. These systems are compared based on different characteristics in Table 2. In this comparison, the characteristics of privacy, worker credential, worker experience, requester reputation, and requester reward are considered.
The first criterion is privacy. Due to the sensitive information in these systems, it is crucial to preserve users’ privacy. Some crowdsourcing systems do not use people’s real identities to participate in the system, which helps with privacy preservation. The most crucial factor in the popularity of a crowdsourcing system is how it increases the quality and quantity of user participation. Privacy preservation increases user participation in spatial crowdsourcing systems. The second criterion in this comparison is worker credential. In some existing systems, worker credential is used to allocate tasks. Supposing that users’ credibility increases with their participation in the system, some users will confirm all reports submitted to them, which will enter the incorrect information into the system. In addition, not using user history leads to preserving the users’ privacy and greater user participation in the crowdsourcing system. The third criterion in this comparison is the experience of the workers. In some systems, workers’ experience in assigning tasks is taken into account. Workers’ experiences are an essential factor in reputation-based attacks. The fourth criterion in this comparison is the reputation of the requesters. This allows requesters to register fake tasks in the system to increase their reputation.
Our proposed system aims at increasing the accuracy of spatial information by a census-based approach. According to the jury theory, a group of fewer competent individuals is more likely to make the correct decision than a more competent individual [87]. For this reason, the proposed system uses the vote of a group of workers instead of user history to confirm or reject reports. In the proposed system, users’ history does not affect the importance of workers’ vote so each worker’s vote is not preferable to the other workers. For this reason, it is not necessary to use the worker credentials, requester reputation, and worker experience.
On the other hand, using user history increases the possibility of various attacks in the system. This history can be the user skill. Forging these skills can cause problems in the system. The unfair distribution of workers is one of these problems. In some systems, requesters select workers for tasks. They also provide filters to eliminate workers and give them rates after they have performed their task. All of this is carried out according to the requesters’ knowledge, and their opinion influences the choice or rating.
The last criterion in this comparison is requester reward. Having a rewarding mechanism for users is one of the crucial factors in increasing the quality of user participation in spatial crowdsourcing systems. Malicious requesters use various tricks to make more benefits and reduce workers’ rewards. In most crowdsourcing systems, requesters create a task, and the workers do it and receive their reward according to the quality of the task performed. These systems do not offer rewards to requesters. In the proposed system, the use of spatial and non-spatial factors to calculate the rewards of requesters encourages users to participate in the system and collect accurate spatial information. Users in this system can also have various roles in different reports, which allows each user to be rewarded in the role of requester, worker, and miner. Motivating requesters to create tasks can improve the overall performance of the system and attract more workers to the system. Besides, increasing numbers of users provide more security in blockchain-based systems. In our system, requesters will be rewarded if their report is confirmed.

7. Conclusions

This article proposed a spatial crowdsourcing system designed to increase security and transparency based on an implemented blockchain. Workers are selected according to their location to confirm or reject a report. All users, including the requester, worker, and miner, will receive rewards. These rewards are calculated on the basis of spatial and non-spatial factors which are different for each user. In addition, the proposed system prevents entering incorrect information deliberately or inadvertently, which increases the accuracy of the collected information. Besides, people can monitor how facilities operate. We implemented this system in both Android and iOS platforms. Due to the sensitivity of spatial information, we provided security and privacy analysis. Further, we evaluated the efficiency of this system in the review of received reports by facilities, which decreased by 505.15 min from the minimum review time by reducing 40% of incorrect reports. Future work will focus on the use of smart contracts in this area and the improvement of navigation to facilitate service organizations.

Author Contributions

Conceptualization, M.K., M.R.M. and S.S.; Methodology, M.K., M.R.M. and S.S.; Project administration, S.L.; Validation, M.K., M.R.M. and S.S.; Visualization, M.K.; Writing—original draft, M.K.; Writing—review & editing, M.R.M., S.S. and S.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The dataset involved in this paper is public.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

NiThe node i
IDrThe ID of requester
IDwThe ID of worker
IDreThe ID of report
IDtThe ID of transaction
TiThe i-th transaction
BiThe i-th block
REiThe i-th report
RiThe i-th requester
WiThe i-th worker
MiThe i-th miner
UwA set of workers
PentBlockchain pending list
TreThe time stamp of report
PEYrThe payment for each requester
PEYwThe payment for each worker
PEYmThe payment for mining each block
CoREiThe content of the i-th report
CoTkThe content of the k-th transaction
LRiThe location of the i-th requester
LREiThe location of the i-th report
LWiThe location of the i-th worker
Lati,pThe latitude of the i-th node with role p
Loni,pThe longitude of i-th node with role p
TREiThe type of the i-th report
θThe central angle between two points on a sphere

References

  1. Howe, J. The rise of crowdsourcing. Wired Mag. 2006, 14, 1–4. [Google Scholar]
  2. Kazemi, L.; Shahabi, C. Geocrowd: Enabling query answering with spatial crowdsourcing. In Proceedings of the 20th International Conference on Advances in Geographic Information Systems, Redondo Beach, CA, USA, 6–9 November 2012; pp. 189–198. [Google Scholar]
  3. Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System; Decentralized Business Review: Seoul, Korea, 31 October 2008; p. 21260. [Google Scholar]
  4. Haferkorn, M.; Diaz, J.M.Q. Seasonality and interconnectivity within cryptocurrencies-an analysis on the basis of bitcoin, litecoin and namecoin. In International Workshop on Enterprise Applications and Services in the Finance Industry; Springer: Sydney, Australia, 12 December 2014; pp. 106–120. [Google Scholar]
  5. Nguyen, Q.K. Blockchain—A financial technology for future sustainable development. In Proceedings of the 2016 3rd International Conference on Green Technology and Sustainable Development (GTSD), Kaohsiung, Taiwan, 25 November 2016; pp. 51–54. [Google Scholar]
  6. Bhowmik, D.; Feng, T. The multimedia blockchain: A distributed and tamper-proof media transaction framework. In Proceedings of the 2017 22nd International Conference on Digital Signal Processing (DSP), London, UK, 23–25 August 2017; pp. 1–5. [Google Scholar]
  7. Dupont, Q. Blockchain Identities: Notational Technologies for Control and Management of Abstracted Entities. Metaphilosophy 2017, 48, 634–653. [Google Scholar] [CrossRef]
  8. Zikratov, I.; Kuzmin, A.; Akimenko, V.; Niculichev, V.; Yalansky, L. Ensuring data integrity using blockchain technology. In Proceedings of the 2017 20th Conference of Open Innovations Association (FRUCT), St-Petersburg, Russia, 3–7 April 2017; pp. 534–539. [Google Scholar]
  9. Ibba, S.; Pinna, A.; Seu, M.; Pani, F.E. CitySense: Blockchain-oriented smart cities. In Proceedings of the XP2017 Scientific Workshops, Cologne, Germany, 22–26 May 2017; pp. 1–5. [Google Scholar]
  10. Reijers, W.; O’Brolcháin, F.; Haynes, P. Governance in blockchain technologies & social contract theories. Ledger 2016, 1, 134–151. [Google Scholar]
  11. Fabiano, N. The Internet of Things ecosystem: The blockchain and privacy issues. The challenge for a global privacy standard. In Proceedings of the 2017 International Conference on Internet of Things for the Global Community (IoTGC), Funchal, Portugal, 10–13 July 2017; pp. 1–7. [Google Scholar]
  12. Kshetri, N. Can blockchain strengthen the internet of things? IT Prof. 2017, 19, 68–72. [Google Scholar] [CrossRef] [Green Version]
  13. Liao, C.-F.; Bao, S.-W.; Cheng, C.-J.; Chen, K. On design issues and architectural styles for blockchain-driven IoT services. In Proceedings of the 2017 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW), Taipei, Taiwan, 12–14 June 2017; pp. 351–352. [Google Scholar]
  14. Juneja, A.; Marefat, M. Leveraging blockchain for retraining deep learning architecture in patient-specific arrhythmia classification. In Proceedings of the 2018 IEEE EMBS International Conference on Biomedical & Health Informatics (BHI), Las Vegas, NV, USA, 4–7 March 2018; pp. 393–397. [Google Scholar]
  15. Lee, S.H.; Yang, C.S. Fingernail analysis management system using microscopy sensor and blockchain technology. Int. J. Distrib. Sens. Netw. 2018, 14. [Google Scholar] [CrossRef] [Green Version]
  16. Patel, V. A framework for secure and decentralized sharing of medical imaging data via blockchain consensus. Health Inform. J. 2019, 25, 1398–1411. [Google Scholar] [CrossRef]
  17. Dorri, A.; Steger, M.; Kanhere, S.S.; Jurdak, R. Blockchain: A distributed solution to automotive security and privacy. IEEE Commun. Mag. 2017, 55, 119–125. [Google Scholar] [CrossRef] [Green Version]
  18. Politou, E.; Alepis, E.; Patsakis, C. Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions. J. Cybersecur. 2018, 4, tyy001. [Google Scholar] [CrossRef]
  19. Bdiwi, R.; de Runz, C.; Faiz, S.; Cherif, A.A. Towards a new ubiquitous learning environment based on Blockchain technology. In Proceedings of the 2017 IEEE 17th International Conference on Advanced Learning Technologies (ICALT), Timisoara, Romania, 3–7 July 2017; pp. 101–102. [Google Scholar]
  20. Spearpoint, M. A proposed currency system for academic peer review payments using the blockchain technology. Publications 2017, 5, 19. [Google Scholar] [CrossRef]
  21. Turkanović, M.; Hölbl, M.; Košič, K.; Heričko, M.; Kamišalić, A. EduCTX: A blockchain-based higher education credit platform. IEEE Access 2018, 6, 5112–5127. [Google Scholar] [CrossRef]
  22. Corda. Available online: https://github.com/corda/corda (accessed on 25 September 2020).
  23. Ethereum. Available online: https://github.com/ethereum/go-ethereum (accessed on 4 August 2020).
  24. Fabric, H. Available online: https://github.com/hyperledger/fabric (accessed on 2 June 2021).
  25. Jia, B.; Zhou, T.; Li, W.; Liu, Z.; Zhang, J. A blockchain-based location privacy protection incentive mechanism in crowd sensing networks. Sensors 2018, 18, 3894. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  26. Yang, M.; Zhu, T.; Liang, K.; Zhou, W.; Deng, R.H. A blockchain-based location privacy-preserving crowdsensing system. Future Gener. Comput. Syst. 2019, 94, 408–418. [Google Scholar] [CrossRef]
  27. Zhu, S.; Cai, Z.; Hu, H.; Li, Y.; Li, W. zkCrowd: A hybrid blockchain-based crowdsourcing platform. IEEE Trans. Ind. Inf. 2019, 16, 4196–4205. [Google Scholar] [CrossRef]
  28. Li, M.; Weng, J.; Yang, A.; Lu, W.; Zhang, Y.; Hou, L.; Liu, J.-N.; Xiang, Y.; Deng, R.H. Crowdbc: A blockchain-based decentralized framework for crowdsourcing. IEEE Trans. Parallel Distrib. Syst. 2018, 30, 1251–1266. [Google Scholar] [CrossRef]
  29. Muldoon, C.; O’Grady, M.J.; O’Hare, G.M. A survey of incentive engineering for crowdsourcing. Knowl. Eng. Rev. 2018, 33. [Google Scholar] [CrossRef]
  30. Gummidi, S.R.B.; Xie, X.; Pedersen, T.B. A survey of spatial crowdsourcing. ACM Trans. Database Syst. (TODS) 2019, 44, 1–46. [Google Scholar] [CrossRef]
  31. Chon, Y.; Lane, N.D.; Kim, Y.; Zhao, F.; Cha, H. Understanding the coverage and scalability of place-centric crowdsensing. In Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, Zurich, Switzerland, 8–12 September 2013; pp. 3–12. [Google Scholar]
  32. Kawajiri, R.; Shimosaka, M.; Kashima, H. Steered crowdsensing: Incentive design towards quality-oriented place-centric crowdsensing. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, Washington, DC, USA, 13–17 September 2014; pp. 691–701. [Google Scholar]
  33. Chatzimilioudis, G.; Konstantinidis, A.; Laoudias, C.; Zeinalipour-Yazti, D. Crowdsourcing with smartphones. IEEE Internet Comput. 2012, 16, 36–44. [Google Scholar] [CrossRef]
  34. Stevens, M.; D’Hondt, E. Crowdsourcing of pollution data using smartphones. In Proceedings of the Workshop on Ubiquitous Crowdsourcing, Beijing, China, 17–21 September 2011; pp. 1–4. [Google Scholar]
  35. Yan, T.; Marzilli, M.; Holmes, R.; Ganesan, D.; Corner, M. mCrowd: A platform for mobile crowdsourcing. In Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems, Berkeley, CA, USA, 4–6 November 2009; pp. 347–348. [Google Scholar]
  36. Alt, F.; Shirazi, A.S.; Schmidt, A.; Kramer, U.; Nawaz, Z. Location-based crowdsourcing: Extending crowdsourcing to the real world. In Proceedings of the 6th Nordic Conference on Human-Computer Interaction: Extending Boundaries, Reykjavik, Iceland, 16–20 October 2010; pp. 13–22. [Google Scholar]
  37. Benouaret, K.; Valliyur-Ramalingam, R.; Charoy, F. Answering complex location-based queries with crowdsourcing. In Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, Austin, TX, USA, 20–23 October 2013; pp. 438–447. [Google Scholar]
  38. Ul Hassan, U.; Curry, E. Flag-verify-fix: Adaptive spatial crowdsourcing leveraging location-based social networks. In Proceedings of the 23rd SIGSPATIAL International Conference on Advances in Geographic Information Systems, Seattle, WA, USA, 3–6 November 2015; pp. 1–4. [Google Scholar]
  39. Väätäjä, H.; Vainio, T.; Sirkkunen, E. Location-based crowdsourcing of hyperlocal news: Dimensions of participation preferences. In Proceedings of the 17th ACM International Conference on Supporting Group Work, Sanibel Island, FL, USA, 27–31 October 2012; pp. 85–94. [Google Scholar]
  40. Alzantot, M.; Youssef, M. Crowdinside: Automatic construction of indoor floorplans. In Proceedings of the 20th International Conference on Advances in Geographic Information Systems, Redondo Beach, CA, USA, 6–9 November 2012; pp. 99–108. [Google Scholar]
  41. Cuong, T.T. CrowdRoute: A crowd-sourced routing algorithm in public transit networks. In Proceedings of the Second ACM SIGSPATIAL International Workshop on Crowdsourced and Volunteered Geographic Information, Orlando, FL, USA, 5 November 2013; pp. 9–14. [Google Scholar]
  42. Eivazy, H.; Malek, M.R. Developing a Multilevel Distribuiting Crowdsourcing System for Aiding and Rescuing to Overcome Widespread Crises. East. Eur. J. Enterp. Technol. 2020, 2, 104. [Google Scholar] [CrossRef]
  43. Eivazy, H.; Malek, M.R. Flood Management in Aqala through an Agent-Based Solution and Crowdsourcing Services in an Enterprise Geospatial Information System. ISPRS Int. J. Geo Inf. 2019, 8, 420. [Google Scholar] [CrossRef] [Green Version]
  44. Karam, R.; Melchiori, M. A crowdsourcing-based framework for improving geo-spatial open data. In Proceedings of the 2013 IEEE International Conference on Systems, Man, and Cybernetics, Washington, DC, USA, 13–16 October 2013; pp. 468–473. [Google Scholar]
  45. Pan, B.; Zheng, Y.; Wilkie, D.; Shahabi, C. Crowd sensing of traffic anomalies based on human mobility and social media. In Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, Orlando, FL, USA, 5–8 November 2013; pp. 344–353. [Google Scholar]
  46. Karam, R.; Melchiori, M. Improving geo-spatial linked data with the wisdom of the crowds. In Proceedings of the Joint EDBT/ICDT 2013 Workshops, Genoa, Italy, 18–22 March 2013; pp. 68–74. [Google Scholar]
  47. Besaleva, L.I.; Weaver, A.C. CrowdHelp: A crowdsourcing application for improving disaster management. In Proceedings of the 2013 IEEE Global Humanitarian Technology Conference (GHTC), Silicon Valley, CA, USA, 20–23 October 2013; pp. 185–190. [Google Scholar]
  48. Chen, X.; Wu, X.; Li, X.-Y.; Ji, X.; He, Y.; Liu, Y. Privacy-aware high-quality map generation with participatory sensing. IEEE Trans. Mob. Comput. 2015, 15, 719–732. [Google Scholar] [CrossRef]
  49. Cheng, Z.; Caverlee, J.; Barthwal, H.; Bachani, V. Who is the barbecue king of texas? A geo-spatial approach to finding local experts on twitter. In Proceedings of the 37th International ACM SIGIR Conference on Research & Development in Information Retrieval, Gold Coast, Australia, 6–11 July 2014; pp. 335–344. [Google Scholar]
  50. He, S.; Shin, D.-H.; Zhang, J.; Chen, J. Toward optimal allocation of location dependent tasks in crowdsensing. In Proceedings of the IEEE INFOCOM 2014-IEEE Conference on Computer Communications, Toronto, ON, Canada, 27 April–2 May 2014; pp. 745–753. [Google Scholar]
  51. Lenkei, Z. Crowdsourced Traffic Information in Traffic Management: Evaluation of Traffic Information from Waze. Master’s Thesis, KTH Stockholm, Stockholm, Sweden, 2018. [Google Scholar]
  52. Daniel, F.; Kucherbaev, P.; Cappiello, C.; Benatallah, B.; Allahbakhsh, M. Quality control in crowdsourcing: A survey of quality attributes, assessment techniques, and assurance actions. ACM Comput. Surv. (CSUR) 2018, 51, 1–40. [Google Scholar] [CrossRef] [Green Version]
  53. Mohammadi, N.; Malek, M. VGI and reference data correspondence based on location-orientation rotary descriptor and segment matching. Trans. GIS 2015, 19, 619–639. [Google Scholar] [CrossRef]
  54. Mohammadi, N.; Malek, M. Artificial intelligence-based solution to estimate the spatial accuracy of volunteered geographic data. J. Spat. Sci. 2015, 60, 119–135. [Google Scholar] [CrossRef]
  55. Liu, A.; Wang, W.; Shang, S.; Li, Q.; Zhang, X. Efficient task assignment in spatial crowdsourcing with worker and task privacy protection. GeoInformatica 2018, 22, 335–362. [Google Scholar] [CrossRef] [Green Version]
  56. To, H.; Ghinita, G.; Shahabi, C. PrivGeoCrowd: A toolbox for studying private spatial crowdsourcing. In Proceedings of the 2015 IEEE 31st International Conference on Data Engineering, Seoul, Korea, 13–17 April 2015; pp. 1404–1407. [Google Scholar]
  57. Chen, Z.; Fu, R.; Zhao, Z.; Liu, Z.; Xia, L.; Chen, L.; Cheng, P.; Cao, C.C.; Tong, Y.; Zhang, C.J. Gmission: A general spatial crowdsourcing platform. Proc. VLDB Endow. 2014, 7, 1629–1632. [Google Scholar] [CrossRef]
  58. Difallah, D.E.; Catasta, M.; Demartini, G.; Ipeirotis, P.G.; Cudré-Mauroux, P. The dynamics of micro-task crowdsourcing: The case of amazon mturk. In Proceedings of the 24th International Conference on World Wide Web, Florence, Italy, 18–22 May 2015; pp. 238–247. [Google Scholar]
  59. Li, Y.; Yiu, M.L.; Xu, W. Oriented online route recommendation for spatial crowdsourcing task workers. In Proceedings of the International Symposium on Spatial and Temporal Databases, HKUST, Hong Kong, China, 26–28 August 2015; pp. 137–156. [Google Scholar]
  60. To, H.; Shahabi, C.; Kazemi, L. A server-assigned spatial crowdsourcing framework. ACM Trans. Spat. Algorithms Syst. (TSAS) 2015, 1, 1–28. [Google Scholar] [CrossRef]
  61. Tran, L.; To, H.; Fan, L.; Shahabi, C. A real-time framework for task assignment in hyperlocal spatial crowdsourcing. ACM Trans. Intell. Syst. Technol. (TIST) 2018, 9, 1–26. [Google Scholar] [CrossRef] [Green Version]
  62. Zhang, S.; Wu, J.; Lu, S. Minimum makespan workload dissemination in DTNs: Making full utilization of computational surplus around. In Proceedings of the Fourteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, Bangalore, India, 29 July–1 August 2013; pp. 293–296. [Google Scholar]
  63. Huang, Q.; Cervone, G.; Jing, D.; Chang, C. DisasterMapper: A CyberGIS framework for disaster management using social media data. In Proceedings of the 4th International ACM SIGSPATIAL Workshop on Analytics for Big Geospatial Data, Bellevue WA, USA, 3–6 November 2015; pp. 1–6. [Google Scholar]
  64. Cheung, M.H.; Southwell, R.; Hou, F.; Huang, J. Distributed time-sensitive task selection in mobile crowdsensing. In Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Hangzhou, China, 22–25 June 2015; pp. 157–166. [Google Scholar]
  65. Ast, F.; Sewrjugin, A. The Crowdjury, a Crowdsourced Justice System for the Collaboration Era. 2015. Available online: https://www.weusecoins.com/assets/pdf/library/The%20CrowdJury%20a%20Crowdsourced%20Justice%20System%20for%20the%20Collaboration%20Era.pdf (accessed on 11 November 2020).
  66. Jacynycz, V.; Calvo, A.; Hassan, S.; Sánchez-Ruiz, A.A. Betfunding: A distributed bounty-based crowdfunding platform over ethereum. In Proceedings of the 13th International Conference on Distributed Computing and Artificial Intelligence, Sevilla, Spain, 1–3 June 2016; pp. 403–411. [Google Scholar]
  67. Ropsten. Available online: https://github.com/ethereum/ropsten (accessed on 8 December 2020).
  68. Lu, Y.; Tang, Q.; Wang, G. Zebralancer: Private and anonymous crowdsourcing system atop open blockchain. In Proceedings of the 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), Vienna, Austria, 2–5 July 2018; pp. 853–865. [Google Scholar]
  69. Yuan, Y.; Wang, F.-Y. Towards blockchain-based intelligent transportation systems. In Proceedings of the 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC), Rio de Janeiro, Brazil, 1–4 November 2016; pp. 2663–2668. [Google Scholar]
  70. Mottur, P.A.; Whittaker, N.R. Vizsafe: The decentralized crowdsourcing safety network. In Proceedings of the 2018 IEEE International Smart Cities Conference (ISC2), Kansas City, MO, USA, 16–19 September 2018; pp. 1–6. [Google Scholar]
  71. Farnaghi, M. Blockchain, an enabling technology for transparent and accountable decentralized public participatory GIS. Cities 2020, 105, 102850. [Google Scholar] [CrossRef]
  72. Web3.js. Available online: https://github.com/ethereum/web3.js/ (accessed on 20 May 2021).
  73. Asmoredjo, K.; Hovanesyan, A.; To, S.; Wong Loi Sing, C. Decentralized Mortgage Market: An Open Market for Real-Estate Crowdsourcing. 2017. Available online: http://resolver.tudelft.nl/uuid:a20fc94f-a959-44ec-9c29-0cae8ad831ce (accessed on 11 August 2020).
  74. Wang, S.; Taha, A.F.; Wang, J. Blockchain-assisted crowdsourced energy systems. In Proceedings of the 2018 IEEE Power & Energy Society General Meeting (PESGM), Portland, OR, USA, 5–9 August 2018; pp. 1–5. [Google Scholar]
  75. Pinto, G.V.; Dias, J.P.; Ferreira, H.S. Blockchain-based PKI for crowdsourced IoT sensor information. In Proceedings of the International Conference on Soft Computing and Pattern Recognition, Online, 15–18 December 2020; pp. 248–257. [Google Scholar]
  76. Hu, S.; Hou, L.; Chen, G.; Weng, J.; Li, J. Reputation-based distributed knowledge sharing system in blockchain. In Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, New York, NY, USA, 5–7 November 2018; pp. 476–481. [Google Scholar]
  77. Sheng, D.; Xiao, M.; Liu, A.; Zou, X.; An, B.; Zhang, S. CPchain: A Copyright-Preserving Crowdsourcing Data Trading Framework Based on Blockchain. In Proceedings of the 2020 29th International Conference on Computer Communications and Networks (ICCCN), Honolulu, HI, USA, 3–6 August 2020; pp. 1–9. [Google Scholar]
  78. Ma, H.; Huang, E.X.; Lam, K.-Y. Blockchain-based mechanism for fine-grained authorization in data crowdsourcing. Future Gener. Comput. Syst. 2020, 106, 121–134. [Google Scholar] [CrossRef]
  79. Gao, L.; Cheng, T.; Gao, L. TSWCrowd: A Decentralized Task-Select-Worker Framework on Blockchain for Spatial Crowdsourcing. IEEE Access 2020, 8, 220682–220691. [Google Scholar] [CrossRef]
  80. Xia, H.; McKernan, B. Privacy in Crowdsourcing: A Review of the Threats and Challenges. Comput. Supported Coop. Work (CSCW) 2020, 29, 263–301. [Google Scholar] [CrossRef]
  81. Feng, W.; Yan, Z. MCS-Chain: Decentralized and trustworthy mobile crowdsourcing based on blockchain. Future Gener. Comput. Syst. 2019, 95, 649–666. [Google Scholar] [CrossRef]
  82. Shevchenko, N.; Chick, T.A.; O’Riordan, P.; Scanlon, T.P.; Woody, C. Threat Modeling: A Summary of Available Methods; Carnegie Mellon University: Pittsburgh, PA, USA, 2018. [Google Scholar]
  83. Robusto, C.C. The cosine-haversine formula. Am. Math. Mon. 1957, 64, 38–40. [Google Scholar] [CrossRef]
  84. CrowdFlower. Available online: https://appen.com/ (accessed on 15 April 2021).
  85. Ahmad, S.; Battle, A.; Malkani, Z.; Kamvar, S. The jabberwocky programming environment for structured social computing. In Proceedings of the 24th Annual ACM Symposium on User Interface Software and Technology, Santa Barbara, CA, USA, 16–19 October 2011; pp. 53–64. [Google Scholar]
  86. Upwork. Available online: https://www.upwork.com/ (accessed on 20 March 2021).
  87. Marquis, M.J.A.N.C. Essai sur L’application de L’analyse à la Probabilité des Décisions Rendues à la Pluralité des Voix; Cambridge University Press: Chelsea, UK, 1785. [Google Scholar]
Figure 1. Proposed system architecture.
Figure 1. Proposed system architecture.
Sensors 21 05146 g001
Figure 2. Transaction structure in the proposed system.
Figure 2. Transaction structure in the proposed system.
Sensors 21 05146 g002
Figure 3. Facility Allocation.
Figure 3. Facility Allocation.
Sensors 21 05146 g003
Figure 4. Number of assigned reports to facilities in distance intervals between facilities and reports.
Figure 4. Number of assigned reports to facilities in distance intervals between facilities and reports.
Sensors 21 05146 g004
Figure 5. Time interval for facilities to review assigned reports in distance intervals between facilities and reports.
Figure 5. Time interval for facilities to review assigned reports in distance intervals between facilities and reports.
Sensors 21 05146 g005
Table 1. Total optimal time.
Table 1. Total optimal time.
1000 Reports900 Reports800 Reports700 Reports600 Reports
Total optimal time (min)1651.991573.741329.331238.651146.84
Table 2. Comparison of proposed system with existing crowdsourcing systems.
Table 2. Comparison of proposed system with existing crowdsourcing systems.
PrivacyWorker CredentialWorker ExperienceRequester ReputationRequester Reward
MTurk [58]
CrowdFlower [84]
Jabberwocky [85]
Upwork [86]
CrowdBC [28]
MCS-Chain [81]
Proposed system
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Kamali, M.; Malek, M.R.; Saeedi, S.; Liang, S. A Blockchain-Based Spatial Crowdsourcing System for Spatial Information Collection Using a Reward Distribution. Sensors 2021, 21, 5146. https://doi.org/10.3390/s21155146

AMA Style

Kamali M, Malek MR, Saeedi S, Liang S. A Blockchain-Based Spatial Crowdsourcing System for Spatial Information Collection Using a Reward Distribution. Sensors. 2021; 21(15):5146. https://doi.org/10.3390/s21155146

Chicago/Turabian Style

Kamali, Masoud, Mohammad Reza Malek, Sara Saeedi, and Steve Liang. 2021. "A Blockchain-Based Spatial Crowdsourcing System for Spatial Information Collection Using a Reward Distribution" Sensors 21, no. 15: 5146. https://doi.org/10.3390/s21155146

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop