Poster: Smart-Contract Based Incentive Mechanism for K-Anonymity Privacy Protection in LBSs

被引:6
|
作者
Geng, Ziye [1 ]
He, Yunhua [1 ]
Niu, Tong [1 ]
Li, Hong [2 ]
Sun, Limin [2 ]
Cheng, Wei [3 ]
Li, Xu [4 ]
机构
[1] North China Univ Technol, Sch Comp Sci, Beijing, Peoples R China
[2] Chinese Acad Sci, Beijing Key Lab IOT, Inst Informat Engn, Informat Secur Technol, Beijing, Peoples R China
[3] Virginia Commonwealth Univ, Dept Comp Sci, Med Coll Virginia Campus, Richmond, VA 23284 USA
[4] Beijing CarSmart Technol Co LTD, Beijing, Peoples R China
关键词
D O I
10.1109/PAC.2017.33
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In Location Based Services (LBSs), service providers can obtain mobile users' locations or traces while receiving their service requests. K-anonymity, which is the most commonly used location privacy protection method, needs the cooperation among mobile users to form a k-anonymous group. Though several incentive mechanisms have been proposed to motivate mobile users to participate in the k-anonymous group, most of them rely on a 'trustful' center. In this paper, we propose a distributed secure incentive mechanism that applies blockchain smart contracts to motivate users for k-anonymity cooperation. To protect the reward transaction information, group encryption and blind collective signature are adopted. The simulations demonstrate the effectiveness of our proposed incentive mechanism.
引用
收藏
页码:200 / 201
页数:2
相关论文
共 50 条
  • [1] An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism
    Li, Xinghua
    Miao, Meixia
    Liu, Hai
    Ma, Jianfeng
    Li, Kuan-Ching
    [J]. SOFT COMPUTING, 2017, 21 (14) : 3907 - 3917
  • [2] An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism
    Xinghua Li
    Meixia Miao
    Hai Liu
    Jianfeng Ma
    Kuan-Ching Li
    [J]. Soft Computing, 2017, 21 : 3907 - 3917
  • [3] Study on Privacy Protection Algorithm Based on K-Anonymity
    Zhao FeiFei
    Dong LiFeng
    Wang Kun
    Li Yang
    [J]. 2012 INTERNATIONAL CONFERENCE ON MEDICAL PHYSICS AND BIOMEDICAL ENGINEERING (ICMPBE2012), 2012, 33 : 483 - 490
  • [4] Study on Privacy Protection Algorithm Based on K-Anonymity
    Zhao FeiFei
    Dong LiFeng
    Wang Kun
    Li Yang
    [J]. 2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 1, 2011, : 312 - 315
  • [5] Truthful Incentive Mechanisms for K-Anonymity Location Privacy
    Yang, Dejun
    Fang, Xi
    Xue, Guoliang
    [J]. 2013 PROCEEDINGS IEEE INFOCOM, 2013, : 2994 - 3002
  • [6] PEAK: Privacy-Enhanced Incentive Mechanism for Distributed K-Anonymity in LBS
    Zhang, Man
    Li, Xinghua
    Miao, Yinbin
    Luo, Bin
    Ren, Yanbing
    Ma, Siqi
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2024, 36 (02) : 781 - 794
  • [7] Research on K-Anonymity Algorithm in Privacy Protection
    Wang, Chen
    Liu, Lianzhong
    Gao, Lijie
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 194 - 196
  • [8] K-Anonymity Privacy Protection Using Ontology
    Talouki, Maedeh Ashouri
    NematBakhsh, Mohammad-ali
    Baraani, Ahmad
    [J]. 2009 14TH INTERNATIONAL COMPUTER CONFERENCE, 2009, : 681 - 684
  • [9] Methods for Privacy Protection Using K-Anonymity
    Sharma, Vijay
    [J]. PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON RELIABILTY, OPTIMIZATION, & INFORMATION TECHNOLOGY (ICROIT 2014), 2014, : 149 - 152
  • [10] LRM: A Location Recombination Mechanism for Achieving Trajectory k-Anonymity Privacy Protection
    Wang, Yunfeng
    Li, Mingzhen
    Luo, Shoushan
    Xin, Yang
    Zhu, Hongliang
    Chen, Yuling
    Yang, Guangcan
    Yang, Yixian
    [J]. IEEE ACCESS, 2019, 7 : 182886 - 182905