| Literature DB >> 31805089 |
Abstract
Participatory sensing is gaining popularity as a method for collecting and sharing information from distributed local environments using sensor-rich mobile devices. There are a number of participatory sensing applications currently in wide use, such as location-based service applications (e.g., Waze navigation). Usually, these participatory applications collect tremendous amounts of sensing data containing personal information, including user identity and current location. Due to the high sensitivity of this information, participatory sensing applications need a privacy-preserving mechanism, such as anonymity, to secure and protect personal user data. However, using anonymous identifiers for sensing sources proves difficult when evaluating sensing data trustworthiness. From this perspective, a successful participatory sensing application must be designed to consider two challenges: (1) user privacy and (2) data trustworthiness. To date, a number of privacy-preserving reputation techniques have been proposed to satisfy both of these issues, but the protocols contain several critical drawbacks or are impractical in terms of implementation. In particular, there is no work that can transparently manage user reputation values while also tracing anonymous identities. In this work, we present a blockchain-based privacy-preserving reputation framework called BPRF to transparently manage user reputation values and provide a transparent tracing process for anonymous identities. The performance evaluation and security analysis show that our solution is both practical and able to satisfy the two requirements for user privacy and data trustworthiness.Entities:
Year: 2019 PMID: 31805089 PMCID: PMC6894850 DOI: 10.1371/journal.pone.0225688
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Fig 1Participatory sensing system.
Fig 2Event sharing system using real identities.
Fig 3Event sharing system using anonymous identities.
Fig 4The architecture of BPRF.
Notations.
| Notations | Explanations |
|---|---|
| A tracing server | |
| An application server | |
| A user | |
| The identity of a user | |
|
| The blinded-identity of a user |
| The time information of | |
| The public key of a user | |
| The signing key of a user | |
|
| The blind signature value of message |
| The number of pre-defined reputation levels | |
| A reputation level | |
|
| The group public key for |
|
| The group tracing key for |
|
| The group issuing key for |
|
| The group link key for |
| The group member key of a user | |
|
| The group signature value on message |
|
| The revocation list including all revoked users for each reputation level |
|
| The information of users whose privileges have been revoked from |
| The type of tokens: 1) | |
| A reward token is one of two types, i.e., | |
| A penalty token is one type, i.e., |
Fig 5The overview of BPRF.
Implementation of basic crypto operations.
| i7-8700 (at 3.20 GHz) | Xiaomi POCO F1 | |
|---|---|---|
| Pairing | 14.24 | 368 |
| Exponentiation | 1.78 | 13.5 |
Evaluation (r: Number of revoked users, neg: Negligible time, −: The function is not executed on the target device).
†: This can be implemented faster by using multi-exponentiation and Java Native Interface (JNI) [30].
| Server (e.g., | Client (e.g., | |
|---|---|---|
| − | 135 | |
| 33.82 | − | |
| 8.9 | − | |
| 35.6 | − | |
| 28.48 | − | |
| 8.9 | − | |
| − | 135,000 ms† | |
| − | ||
| − | 27 | |
| 3.56 | − | |
| − | ||
| 1.78 | 13.5 |
Overhead comparison between BPRF and the work of [8].
|R|: Number of members in a ring signature group †: The result was measured in AMAZON EC2 c4.8xlarge virtual machines when five servers are used for the preparation step. ‡: ELGamal.Sig() and ELGamal.Ver() require 1 exponentiation and 3 exponentiations, respectively. §: Linkable.Ring.Sig() and Linkable.Ring.Vig() of [31] require 7 exponentiations and 4 exponentiations, respectively.
| Zhai et al. [ | BPRF | ||
|---|---|---|---|
| Preparation | 1,000 s†
| 135 s | |
| Report | Generation | 13.5 ms | 135 ms |
| Verification | 40.5 ms | 33.82 ms | |
| Feedback | Generation | 94.5 ms | 135 ms |
| Verification | 7.12 ms × | | 33.82 ms | |
| Reward Token | Generation | - | 3.56 ms |
| Verification | - | 13.5 ms | |
Comparison (W: Weak, SS: Semi-Strong, S: Strong).
| [ | [ | [ | [ | [ | |||
|---|---|---|---|---|---|---|---|
| Conditional Privacy | Anonymity | W | W | S | S | SS | SS |
| Unlinkability | X | X | O | O | O | O | |
| Transparent Traceability | X | X | X | X | X | O | |
| Reputation Management | Correctness | O | O | O | X | O | O |
| Transparency | X | X | O | X | X | O | |
| Update | O | O | O | O | O | O | |
Fig 6An example of reputation management policy.