Computer Science ›› 2021, Vol. 48 ›› Issue (4): 303-308.doi: 10.11896/jsjkx.200900090

• Information Security • Previous Articles     Next Articles

Prevention of Dishonest Behavior in Supply-Demand Matching

ZHANG Shao-jie, LU Xu-dong, GUO Wei, WANG Shi-peng, HE Wei   

  1. School of Software,Shandong University,Jinan 250000,China
  • Received:2020-06-24 Revised:2020-10-11 Online:2021-04-15 Published:2021-04-09
  • About author:ZHANG Shao-jie,born in 1998,master,is a member of China Computer Federation.His main research interests include multiagent systems,machine learning,and reinforcement learning.(sagechang2020@outlook.com)
    LU Xu-dong,born in 1971,Ph.D,lectu-rer,is a member of China Computer Fe-deration.His main research interests include crowd science,big data technology and intelligent data analysis,medical treatment and health.
  • Supported by:
    National Key Research and Development Project of China(2019YFB1705904) and Science and Technology Deve-lopment Plan Project of Shandong Province(2019JZZY020505,2019JZZY010109,2018YFJH0506).

Abstract: Supply-demand matching problem can be solved by crowdsourcing in social networks (SN).However,due to the non-cooperative constraints in practical applications and the privacy protection mechanism of social networks,participants of crowdsourcing have the motivation and conditions to profit from dishonest behaviors.This kind of behavior affects the fairness principle,and will lead to the collapse of the trust chain in the networ.In order to solve the problem of dishonest behavior in the crowdsourcing supply-demand matching method,this paper considers the distributed public accountingto ensure that members truthfully report individual behavior and status,and looks for two types of dishonest individuals by checking the public information.This paper also designs a punishment mechanism based on reputation to counter dishonest behavior.Finally,the validity and feasibility of our mechanism are proved by theoretical analysis.Under the mechanism,the best strategy for crowdsourcing participants is to be honest.

Key words: Crowdsourcing, Dishonest behavior, Non-cooperative, Social networks, Supply-demand matching

CLC Number: 

  • TP399
[1]YUEN M C,KING I,LEUNG K S.A Survey of Crowdsourcing Systems[C]//Proceedings of IEEE International Conference on Privacy,Security,Risk and Trust and IEEE International Conference on Social Computing.Los Alamitos:IEEE Computer Society,2011:766-773.
[2]BUCCAFURRI F,LAX G,NICOLAZZO S,et al.Driving Global Team Formation in Social Networks to Obtain Diversity[C]//Proceedings of International Conference of Web Engineering.Berlin:Springer,2014:410-419.
[3]CHAMBERLAIN J.Groupsourcing:Distributed Problem Sol-ving Using Social Networks[C]//Proceedings of AAAI Confe-rence on Human Computation and Crowdsourcing.Menlo Park:AAAI Press,2014:22-29.
[4]JIANG J,AN B,JIANG Y,et al.Group-Oriented Task Allocation for Crowdsourcing in Social Networks[J].IEEE Transactions on Systems,Man,and Cybernetics:Systems,2019(99):1-16.
[5]KARGAR M,AN A,ZIHAYAT M.Efficient bi-objective team formation in social networks[C]//Proceedings of European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases.Berlin Heidelberg:Springer-Verlag,2012:483-498.
[6]LYKOURENTZOU I,WANG S,KRAUT R E,et al.Team Da-ting:A Self-Organized Team Formation Strategy for Collaborative Crowdsourcing[C]//Proceedings of ACM CHI 2016:the top conference for Human-Computer Interaction.New York:ACM Press,2016:1243-1249.
[7]ROKICKI M,ZERR S,SIERSDORFER S.Groupsourcing:Team competition designs for crowdsourcing[C]//Proceedings of the 24th International Conference on World Wide Web.New York:ACM Press,2015:906-915.
[8]SUN Y,TAN W,HUANG L.A team discovery model forcrowdsourcing tasks to social networks[J].International Journal of Engineering and Technology,2017,12(1):21-44.
[9]HUANG J B,SUN X J,ZHOU Y,et al.Research Survey on Team Formation in Social Networks[J].Journal of Software,2017,28(4):993-1009.
[10]JIANG J,AN B,JIANG Y,et al.Understanding crowdsourcing systems from a multiagent perspective and approach[J].ACM Transactions on Autonomous and Adaptive Systems,2018,13(2):1-32.
[11]LIU W W,DENG Z H,CAO L B,et al.Mining Top K Spread Sources for a Specific Topic and a Given Node[J].IEEE Transactions on Cybernetics,2015,45(11):2472-2483.
[12]ZHANG S J,LU X D,WANG S P,et al.Supply-Demand Matching in Non-Cooperative Social Networks[J].IEEE Access,2020,8:162458-162466.
[13]LIU Q,LUO T,TANG R,et al.An Efficient and Truthful Pricing Mechanism for Team Formation in Crowdsourcing Markets[C]//Proceedings of IEEE International Conference on Communications.Piscataway:IEEE Press,2015:567-572.
[14]WANG W Y,HE Z P,SHI P,et al.Truthful team formation for crowdsourcing in social networks[C]//Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems.Berlin:Springer,2016:1327-1328.
[15]JIANG Y C,JIANG J C.Understanding Social Networks From a Multiagent Perspective[J].IEEE Transactions on Multimedia,2014,25(10):2743-2759.
[16]TRAN-THANH L,STEIN S,ROGERS A,et al.Efficientcrowdsourcing of unknown experts using multi-armed bandits[C]//Proceedings of European Conference on Artificial Intelligence.Netherlands:IOS Press,2012:768-773.
[17]TRAN-THANH L,HUYNH T D,ROSENFELD A,et al.BudgetFIx:Budget limited crowdsourcing for interdependent task allocation with quality guarantees[C]//Proceedings of International Conference on Autonomous Agents and Multiagent Systems.Berlin:Springer,2014:477-484.
[18]WANG W Y,HE Z P,SHI P,et al.Strategic Social TeamCrowdsourcing:Forming a Team of Truthful Workers for Crowdsourcing in Social Networks[J].IEEE Transactions on Mobile Computing,2019,18(6):1419-1432.
[1] FU Yan-ming, ZHU Jie-fu, JIANG Kan, HUANG Bao-hua, MENG Qing-wen, ZHOU Xing. Incentive Mechanism Based on Multi-constrained Worker Selection in Mobile Crowdsourcing [J]. Computer Science, 2022, 49(9): 275-282.
[2] HAO Qiang, LI Jie, ZHANG Man, WANG Lu. Spatial Non-cooperative Target Components Recognition Algorithm Based on Improved YOLOv3 [J]. Computer Science, 2022, 49(6A): 358-362.
[3] WEI Peng, MA Yu-liang, YUAN Ye, WU An-biao. Study on Temporal Influence Maximization Driven by User Behavior [J]. Computer Science, 2022, 49(6): 119-126.
[4] CHEN Dan-hong, PENG Zhang-lin, WAN De-quan, YANG Shan-lin. Identification and Segmentation of User Value in Crowdsourcing Platforms:An Improved RFMModel [J]. Computer Science, 2022, 49(4): 37-42.
[5] GUO Lei, MA Ting-huai. Friend Closeness Based User Matching [J]. Computer Science, 2022, 49(3): 113-120.
[6] SHAO Yu, CHEN Ling, LIU Wei. Maximum Likelihood-based Method for Locating Source of Negative Influence Spreading Under Independent Cascade Model [J]. Computer Science, 2022, 49(2): 204-215.
[7] SHEN Biao, SHEN Li-wei, LI Yi. Dynamic Task Scheduling Method for Space Crowdsourcing [J]. Computer Science, 2022, 49(2): 231-240.
[8] YUAN De-yu, CHEN Shi-cong, GAO Jian, WANG Xiao-juan. Intervention Algorithm for Distorted Information in Online Social Networks Based on Stackelberg Game [J]. Computer Science, 2021, 48(3): 313-319.
[9] ZHAO Yang, NI Zhi-wei, ZHU Xu-hui, LIU Hao, RAN Jia-min. Multi-worker and Multi-task Path Planning Based on Improved Lion Evolutionary Algorithm forSpatial Crowdsourcing Platform [J]. Computer Science, 2021, 48(11A): 30-38.
[10] LI Yu, DUAN Hong-yue, YIN Yu-yu, GAO Hong-hao. Survey of Crowdsourcing Applications in Blockchain Systems [J]. Computer Science, 2021, 48(11): 12-27.
[11] MA Li-bo, QIN Xiao-lin. Topic-Location-Category Aware Point-of-interest Recommendation [J]. Computer Science, 2020, 47(9): 81-87.
[12] LIANG Jun-bin, ZHANG Min, JIANG Chan. Research Progress of Social Sensor Cloud Security [J]. Computer Science, 2020, 47(6): 276-283.
[13] WU Lei,YUE Feng,WANG Han-ru,WANG Gang. Academic Paper Recommendation Method Combined with Researcher Tag [J]. Computer Science, 2020, 47(2): 51-57.
[14] YU Dun-hui, CHENG Tao, YUAN Xu. Software Crowdsourcing Task Recommendation Algorithm Based on Learning to Rank [J]. Computer Science, 2020, 47(12): 106-113.
[15] GU Qiu-yang, JU Chun-hua, WU Gong-xing. Social Network Information Recommendation Model Combining Deep Autoencoder and Network Representation Learning [J]. Computer Science, 2020, 47(11): 101-112.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!