A user collaboration privacy protection scheme with threshold scheme and smart contract
Lei Zhang,Desheng Liu,Meina Chen,Hongyan Li,Chao Wang,Yunxiang Zhang,Yunming Du
DOI: https://doi.org/10.1016/j.ins.2021.01.071
IF: 8.1
2021-06-01
Information Sciences
Abstract:<p>Recently, the revolution of 5G networks has promoted a wide application of wireless technology, and then followed with the prosperity of Location-Based Service (LBS). However, an intricate problem called privacy violation still restricts the development of this type of service. In order to preserve users' privacy, a number of privacy preservation strategies had been proposed. As an efficient framework used for protecting personal privacy, user collaboration is mainly proposed for dealing with the issue of service bottleneck and the issue of attack focus. However, there are still several challenges far from being perfectly solved, such as the collusion attacks as well as the willingness of collaborative users. Therefore, in order to address these challenges, in this paper, based on the conception of information division and user's incentive, a <span class="math"><math>(t,n)</math></span> smart contract privacy preservation scheme short for <span class="math"><math>(t,n)</math></span> SCPPS is proposed. In this scheme, the query information is encrypted and split by (<em>t</em>, <em>n</em>) threshold scheme, so the collaborative users will be difficult to learn anything about the initiator, and the collusion will be difficult to constitute the integral query without <em>t</em> users colluding with each other. On the other hand, the combination of (<em>t</em>, <em>n</em>) threshold scheme and smart contract further provide competition for incentive, as just the earliest collaborative users that submit the partition information and get the corresponding feedback will obtain the incentive. At last, the security analyses were given, and then tests of users' granularity and locations difference in continuous query in the real environment. Furthermore, simulation experiments are conducted to demonstrate the effectiveness of proposed scheme, and the experimental verification is executed using two different types of datasets. Thus, compared with other similar schemes, the results with brief explanations about reasons can further demonstrate the superiority of proposed scheme.</p>
computer science, information systems