A Privacy-Preserving Peer-to-Peer Accommodation System Based on a Credit Network

被引:3
|
作者
Li, Songwei [1 ]
Wang, Zhen [1 ]
Zhang, Chi [1 ]
Wei, Lingbo [1 ]
Liu, Jianqing [2 ]
Ma, Ying [3 ]
Fang, Yuguang [3 ]
机构
[1] Univ Sci & Technol China, Sch Cyberspace Sci & Technol, Hefei 230027, Anhui, Peoples R China
[2] Univ Alabama, Dept Elect & Comp Engn, Huntsville, AL 35899 USA
[3] Univ Florida, Dept Elect & Comp Engn, Gainesville, FL 32611 USA
关键词
P2P accommodation; Credit network; Blockchain; Bitcoin; Privacy-preserving; SHARING ECONOMY;
D O I
10.1007/978-3-030-86130-8_26
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While Peer-to-peer (P2P) accommodations like Airbnb bring huge convenience and unique experiences to our daily life, a guest taking a P2P accommodation may face great risks, because he/she cannot check the quality of the accommodation before it starts, resulting in a bad experience. Although current P2P accommodation platforms use rating systems and arbitrations to solve the problems, they may not be practical in reality, since interpersonal expectations and interactions between a guest and a host play an important role in rating a P2P accommodation. In this paper, we introduce a new technique based on a credit network to solve these problems. A credit network is a network that uses currency to model transitive trust (or credit) between different users in a distributed fashion. It is modified from the current Bitcoin-based credit network by using a trusted hardware and a protocol for a guest to book a P2P accommodation without revealing unnecessary private information of either the guest or the host with high efficiency. Security and performance analysis shows that our scheme can help a guest find a trustworthy host in a privacy-preserving way, while still achieving high efficiency.
引用
收藏
页码:326 / 337
页数:12
相关论文
共 50 条
  • [1] Design of a privacy-preserving algorithm for peer-to-peer network based on differential privacy
    Yu, Jian
    [J]. Ingenierie des Systemes d'Information, 2019, 24 (04): : 433 - 437
  • [2] Vegas - A Secure and Privacy-Preserving Peer-to-Peer Online Social Network
    Duerr, Michael
    Maier, Marco
    Dorfmeister, Florian
    [J]. PROCEEDINGS OF 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY, RISK AND TRUST AND 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM/PASSAT 2012), 2012, : 868 - 874
  • [3] A Peer-to-Peer Protocol and System Architecture for Privacy-Preserving Statistical Analysis
    Zamani, Katerina
    Charalambidis, Angelos
    Konstantopoulos, Stasinos
    Dagioglou, Maria
    Karkaletsis, Vangelis
    [J]. AVAILABILITY, RELIABILITY, AND SECURITY IN INFORMATION SYSTEMS, CD-ARES 2016, PAML 2016, 2016, 9817 : 236 - 250
  • [4] Lightweight Privacy-Preserving Peer-to-Peer Data Integration
    Zhang, Ye
    Wong, Wai-Kit
    Yiu, S. M.
    Mamoulis, Nikos
    Cheung, David W.
    [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2013, 6 (03): : 157 - 168
  • [5] Secure and user privacy-preserving searching in peer-to-peer networks
    Sen, Jaydip
    [J]. LOGIC JOURNAL OF THE IGPL, 2013, 21 (04) : 603 - 629
  • [6] Asynchronous privacy-preserving iterative computation on peer-to-peer networks
    J. A. M. Naranjo
    L. G. Casado
    Márk Jelasity
    [J]. Computing, 2012, 94 : 763 - 782
  • [7] Asynchronous privacy-preserving iterative computation on peer-to-peer networks
    Naranjo, J. A. M.
    Casado, L. G.
    Jelasity, Mark
    [J]. COMPUTING, 2012, 94 (8-10) : 763 - 782
  • [8] Statistical privacy-preserving message broadcast for peer-to-peer networks
    Moedinger, David
    Lorenz, Jan-Hendrik
    Hauck, Franz J.
    [J]. PLOS ONE, 2021, 16 (05):
  • [9] PPC: Privacy-preserving Chatting in Vehicular Peer-to-peer Networks
    Liang, Xiaohui
    Lu, Rongxing
    Lin, Xiaodong
    Shen, Xuemin
    [J]. 2010 IEEE 72ND VEHICULAR TECHNOLOGY CONFERENCE FALL, 2010,
  • [10] Building a Privacy-Preserving Semantic Overlay for Peer-to-Peer Networks
    Zeilemaker, Niels
    Erkin, Zekeriya
    Palmieri, Paolo
    Pouwelse, Johan
    [J]. PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS'13), 2013, : 79 - 84