• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Deng Qingyong, Zuo Qinghua, Li Zhetao, Wang En, Guo Bin. Privacy-Preserving Bilateral Reputation Evaluation in Blockchain Based Crowdsensing[J]. Journal of Computer Research and Development, 2024, 61(11): 2681-2692. DOI: 10.7544/issn1000-1239.202440302
Citation: Deng Qingyong, Zuo Qinghua, Li Zhetao, Wang En, Guo Bin. Privacy-Preserving Bilateral Reputation Evaluation in Blockchain Based Crowdsensing[J]. Journal of Computer Research and Development, 2024, 61(11): 2681-2692. DOI: 10.7544/issn1000-1239.202440302

Privacy-Preserving Bilateral Reputation Evaluation in Blockchain Based Crowdsensing

Funds: This work was supported by the Guangxi Natural Science Foundation (2023GXNSFDA026003), the National Natural Science Foundation of China (62076214, 62032020, U23B2027), and the Innovation Project of Guangxi Graduate Education (XYCSR2024100).
More Information
  • Author Bio:

    Deng Qingyong: born in 1981. PhD, associate professor, master supervisor. Senior member of IEEE and CCF. His main research interests include IoT, AI, and network security

    Zuo Qinghua: born in 2001. Master. His main research interests include crowdsensing and blockchain

    Li Zhetao: born in 1980. PhD, professor, PhD supervisor. His main research interests include IoT, crowdsensing, and network security

    Wang En: born in 1987. PhD, professor. His main research interests include mobile computing, mobile crowdsensing, and delay tolerant network

    Guo Bin: born in 1980. PhD, professor. His main research interests include ubiquitous computing, mobile crowdsensing, and HCI

  • Received Date: April 25, 2024
  • Revised Date: July 30, 2024
  • Available Online: August 13, 2024
  • Reputation management is an effective way to improve the quality of data collection in mobile crowdsensing, but existing subjective evaluation-based schemes are difficult to realize the real evaluation of worker reputation under privacy protection. To this end, we propose a bilateral reputation evaluation privacy-preserving (BREPP) scheme based on blockchain. The scheme firstly adopts random interference and Pedersen Commitment to hide the parameters of the workers’ reputation update, and utilizes the compact linkable spontaneous anonymous group (CLSAG) signature to anonymously verify the reputation update process. Besides, it employs a combination of Bulletproofs and Schnnor signature to verify the reputation feedback process of the workers. Then, the sub-address method is adopted to achieve fast location retrieval when the identities of the workers and requesters are anonymized. Finally, a prototype system is deployed on Hyperledger Fabric to evaluate the performance of the reputation update. The simulation results show that compared with existing reputation privacy protection schemes, BREPP scheme reduces the total reputation management delay and reputation evaluation error rate by at least 2.00% and 24.96%, respectively. Compared with schemes without privacy protection, our scheme achieves a better balance between reputation evaluation accuracy and total delay.

  • [1]
    Ganti R, Ye Fan, Lei Hui. Mobile crowdsensing: Current state and future challenges[J]. IEEE Communications Magazine, 2011, 49(11): 32−39 doi: 10.1109/MCOM.2011.6069707
    [2]
    徐天承,乔少杰,武俊,等. 一种基于时空位置预测的空间众包任务分配方法[J]. 计算机研究与发展,2022,59(2):310−328 doi: 10.7544/issn1000-1239.20210875

    Xu Tiancheng, Qiao Shaojie, Wu Jun, et al. A spatial crowdsourcing task assignment approach based on spatio-temporal location prediction[J]. Journal of Computer Research and Development, 2022, 59(2): 310−328(in Chinese) doi: 10.7544/issn1000-1239.20210875
    [3]
    Tang Jianheng, Han Feijiang, Fan Kejia, et al. Credit and quality intelligent learning based multi-armed bandit scheme for unknown worker selection in multimedia MCS[J]. Information Sciences, 2023, 647: 119444 doi: 10.1016/j.ins.2023.119444
    [4]
    Yan Lei, Yang Kan, Yang Shouyi. Reputation-based truth discovery with long-term quality of source in Internet of things[J]. IEEE Internet of Things Journal, 2022, 9(7): 5410−5421 doi: 10.1109/JIOT.2021.3110511
    [5]
    Wang Han, Liu Anfeng, Xiong N N, et al. TVD-RA: A truthful data value discovery-based reverse auction incentive system for mobile crowdsensing[J]. IEEE Internet of Things Journal, 2024, 11(4): 5826−5839 doi: 10.1109/JIOT.2023.3308072
    [6]
    Wang Ping, Li Zhetao, Guo Bin, et al. A UAV-assisted truth discovery approach with incentive mechanism design in mobile crowd sensing[J]. IEEE/ACM Transactions on Networking, 2024, 32(2): 1738−1752
    [7]
    Gao Sheng, Chen Xiuhua, Zhu Jianming, et al. Trustworker: A trustworthy and privacy-preserving worker selection scheme for blockchain-based crowdsensing[J]. IEEE Transactions on Services Computing, 2022, 15(6): 3577−3590 doi: 10.1109/TSC.2021.3103938
    [8]
    Zhao Junhui, Huang Fanwei, Liao Longxia, et al. Blockchain-based trust management model for vehicular ad hoc networks[J]. IEEE Internet of Things Journal, 2024, 11(5): 8118−8132 doi: 10.1109/JIOT.2023.3318597
    [9]
    Cheng Yudan, Ma Jianfeng, Liu Zhiquan, et al. A privacy-preserving and reputation-based truth discovery framework in mobile crowdsensing[J]. IEEE Transactions on Dependable and Secure Computing, 2023, 20(6): 5293−5311 doi: 10.1109/TDSC.2023.3276976
    [10]
    Cheng Yudan, Ma Jianfeng, Liu Zhiquan, et al. A lightweight privacy preservation scheme with efficient reputation management for mobile crowdsensing in vehicular networks[J]. IEEE Transactions on Dependable and Secure Computing, 2023, 20(3): 1771−1788
    [11]
    Li Runchuan, Liu Zhiquan, Ma Yong, et al. RPPM: A reputation-based and privacy-preserving platoon management scheme in vehicular networks[J]. IEEE Transactions on Intelligent Transportation Systems, 2024, 25(6): 6147−6160
    [12]
    Hui Yilong, Huang Yuanhao, Su Zhou, et al. BCC: Blockchain-based collaborative crowdsensing in autonomous vehicular networks[J]. IEEE Internet of Things Journal, 2022, 9(6): 4518−4532 doi: 10.1109/JIOT.2021.3105547
    [13]
    Wang Weizheng, Zhou Xiaokang, Li Xingwang, et al. BSIF: Blockchain-based secure, interactive, and fair mobile crowdsensing[J]. IEEE Journal on Selected Areas in Communications, 2022, 40(12): 3452−3469 doi: 10.1109/JSAC.2022.3213306
    [14]
    Zhang Long, Qin Shuang, Feng Gang, et al. Integration of blockchain and mobile crowdsensing by trust-preserving mechanism[C]//Proc of IEEE Global Communications Conf. Piscataway, NJ: IEEE, 2022: 3748−3753
    [15]
    Zhang Long, Feng Gang, Qin Shuang, et al. Trust-preserving mechanism for blockchain assisted mobile crowdsensing[J]. IEEE Transactions on Computers, 2023, 72(11): 3113−3126 doi: 10.1109/TC.2023.3287043
    [16]
    Wang En, Cai Jiatong, Yang Yongjian, et al. Trustworthy and efficient crowdsensed data trading on sharding blockchain[J]. IEEE Journal on Selected Areas in Communications, 2022, 40(12): 3547−3561 doi: 10.1109/JSAC.2022.3213331
    [17]
    Tang Jianheng, Fan Kejia, Xie Wenxuan, et al. BTV-CMAB: A bi-directional trust verification based combinatorial multi-armed bandit scheme for mobile crowdsourcing[J]. IEEE Internet of Things Journal, 2024, 11(2): 1925−1938
    [18]
    Li Zhetao, Wang Jianhui, Long Saiqin, et al. A trust evaluation joint active detection method in video sharing D2D networks[J]. IEEE Transactions on Mobile Computing, 2024, 23(7): 7739−7752
    [19]
    Huang Mingfeng, Li Zhetao, Xiao Fu, el al. Trust mechanism-based multi-tier computing system for service-oriented edge-cloud networks[J]. IEEE Transactions on Dependable and Secure Computing, 2024, 21(4): 1639−1651
    [20]
    Li Ming, Weng Jian, Yang Anjia, et al. CrowdBC: A blockchain-based decentralized framework for crowdsourcing[J]. IEEE Transactions on Parallel and Distributed Systems, 2019, 30(6): 1251−1266 doi: 10.1109/TPDS.2018.2881735
    [21]
    Zhang Wenjing, Luo Yuchuan, Fu Shaojing, et al. Privacy-preserving reputation management for blockchain-based mobile crowdsensing[C]//Proc of IEEE Int Conf on Sensing, Communication, and Networking (SECON). Piscataway, NJ: IEEE, 2020: 1−9
    [22]
    Shen Xiaodong, Xu Chang, Zhu Liehuang, et al. Blockchain-based lightweight and privacy-preserving quality assurance framework in crowdsensing systems[J]. IEEE Internet of Things Journal, 2023, 11(1): 974−986
    [23]
    Zhao Ke, Tang Shaohua, Zhao Bowen, et al. Dynamic and privacy-preserving reputation management for blockchain-based mobile crowdsensing[J]. IEEE Access, 2019, 7: 74694−74710 doi: 10.1109/ACCESS.2019.2920922
    [24]
    Feng Wei, Yan Zheng, Yang L T, et al. Anonymous authentication on trust in blockchain-based mobile crowdsourcing[J]. IEEE Internet of Things Journal, 2022, 9(16): 14185−14202 doi: 10.1109/JIOT.2020.3018878
    [25]
    Wu Haotian, Zheng Yucong, Zhao Bowen, et al. An anonymous reputation management system for mobile crowdsensing based on dual blockchain[J]. IEEE Internet of Things Journal, 2022, 9(9): 6956−6968 doi: 10.1109/JIOT.2021.3113997
    [26]
    An Baoyi, Xiao Mingjun, Liu An, et al. Secure crowdsensed data trading based on blockchain[J]. IEEE Transactions on Mobile Computing, 2023, 22(3): 1763−1778
    [27]
    Pedersen T P. Non-interactive and Information-theoretic secure verifiable secret sharing[C]//Proc of Annual Int Cryptology Conf. Berlin: Springer, 1991: 129−140
    [28]
    Schnorr C P. Efficient identification and signatures for smart cards[C]//Proc of Int Cryptology Conf. Berlin: Springer, 1989: 239−252
    [29]
    Goodell B, Noether S, Blue A. Concise linkable ring signatures and forgery against adversarial keys[J/OL]. Cryptology ePrint Archive, [2023-10-12 ]. https://eprint.iacr.org/2019/654
    [30]
    Bünz B, Bootle J, Boneh D, et al. Bulletproofs: Short proofs for confidential transactions and more[C]//Proc of 2018 IEEE Symp on Security and Privacy (SP). Piscataway, NJ: IEEE, 2018: 315−334
    [31]
    Ma Lichuan, Liu Xuefeng, Pei Qingqi, et al. Privacy-preserving reputation management for edge computing enhanced mobile crowdsensing[J]. IEEE Transactions on Services Computing, 2019, 12(5): 786−799 doi: 10.1109/TSC.2018.2825986
    [32]
    Abdelhamid S, Hassanein H S, Takahara G. Reputation-aware, trajectory-based recruitment of smart vehicles for public sensing[J]. IEEE Transactions on Intelligent Transportation Systems, 2018, 19(5): 1387−1400 doi: 10.1109/TITS.2017.2727053
  • Related Articles

    [1]Zhang Qiang, Ye Ayong, Ye Guohua, Deng Huina, Chen Aimin. k-Anonymous Data Privacy Protection Mechanism Based on Optimal Clustering[J]. Journal of Computer Research and Development, 2022, 59(7): 1625-1635. DOI: 10.7544/issn1000-1239.20210117
    [2]Fu Yao, Li Qingdan, Zhang Zehui, Gao Tiegang. Data Integrity Verification Scheme for Privacy Protection and Fair Payment[J]. Journal of Computer Research and Development, 2022, 59(6): 1343-1355. DOI: 10.7544/issn1000-1239.20210023
    [3]Zhang Shaobo, Wang Guojun, Liu Qin, Liu Jianxun. Trajectory Privacy Protection Method Based on Multi-Anonymizer[J]. Journal of Computer Research and Development, 2019, 56(3): 576-584. DOI: 10.7544/issn1000-1239.2019.20180033
    [4]Wang Ziyu, Liu Jianwei, Zhang Zongyang, Yu Hui. Full Anonymous Blockchain Based on Aggregate Signature and Confidential Transaction[J]. Journal of Computer Research and Development, 2018, 55(10): 2185-2198. DOI: 10.7544/issn1000-1239.2018.20180430
    [5]Jiang Huowen, Zeng Guosun, Hu Kekun. A Graph-Clustering Anonymity Method Implemented by Genetic Algorithm for Privacy-Preserving[J]. Journal of Computer Research and Development, 2016, 53(10): 2354-2364. DOI: 10.7544/issn1000-1239.2016.20160435
    [6]Dai Hua, Yang Geng, Xiao Fu, Zhou Qiang, He Ruiliang. An Energy-Efficient and Privacy-Preserving Range Query Processing in Two-Tiered Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2015, 52(4): 983-993. DOI: 10.7544/issn1000-1239.2015.20140066
    [7]Chen Wei, Xu Ruomei, Li Yuling. A Privacy-Preserving Integrity-Verification-Based Top-k Query Processing[J]. Journal of Computer Research and Development, 2014, 51(12): 2585-2592. DOI: 10.7544/issn1000-1239.2014.20140666
    [8]Dai Hua, Yang Geng, Qin Xiaolin, Liu Liang. Privacy-Preserving Top-k Query Processing in Two-Tiered Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2013, 50(6): 1239-1252.
    [9]Xu Yong, Qin Xiaolin, Yang Yitao, Yang Zhongxue, Huang Can. A QI Weight-Aware Approach to Privacy Preserving Publishing Data Set[J]. Journal of Computer Research and Development, 2012, 49(5): 913-924.
    [10]Liu Yubao, Huang Zhilan, Ada Wai Chee Fu, Yin Jian. A Data Privacy Preservation Method Based on Lossy Decomposition[J]. Journal of Computer Research and Development, 2009, 46(7): 1217-1225.

Catalog

    Article views (277) PDF downloads (124) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return