BPRF: Blockchain-based privacy-preserving reputation framework for participatory sensing systems

Autoři: Hyo Jin Jo aff001;  Wonsuk Choi aff002
Působiště autorů: Department of Software, Hallym University, Chuncheon-si, Gangwon-do, Republic of Korea aff001;  Graduate School of Information Security, Korea University, Seoul, Republic of Korea aff002
Vyšlo v časopise: PLoS ONE 14(12)
Kategorie: Research Article
doi: https://doi.org/10.1371/journal.pone.0225688


Participatory sensing is gaining popularity as a method for collecting and sharing information from distributed local environments using sensor-rich mobile devices. There are a number of participatory sensing applications currently in wide use, such as location-based service applications (e.g., Waze navigation). Usually, these participatory applications collect tremendous amounts of sensing data containing personal information, including user identity and current location. Due to the high sensitivity of this information, participatory sensing applications need a privacy-preserving mechanism, such as anonymity, to secure and protect personal user data. However, using anonymous identifiers for sensing sources proves difficult when evaluating sensing data trustworthiness. From this perspective, a successful participatory sensing application must be designed to consider two challenges: (1) user privacy and (2) data trustworthiness. To date, a number of privacy-preserving reputation techniques have been proposed to satisfy both of these issues, but the protocols contain several critical drawbacks or are impractical in terms of implementation. In particular, there is no work that can transparently manage user reputation values while also tracing anonymous identities. In this work, we present a blockchain-based privacy-preserving reputation framework called BPRF to transparently manage user reputation values and provide a transparent tracing process for anonymous identities. The performance evaluation and security analysis show that our solution is both practical and able to satisfy the two requirements for user privacy and data trustworthiness.

Klíčová slova:

Algorithms – Asses – Computer networks – Cryptography – Roads – Sensory systems – Social influence – Encryption


1. Burke J, Estrin D, Hansen M, Parker A, Ramanathan N, Reddy S, et al. Participatory sensing. In: Workshop on World-Sensor-Web (WSW’06): Mobile Device Centric Sensor Networks and Applications; 2006. p. 117–134.

2. Méndez D, Pérez AJ, Labrador MA, Marrón JJ. P-Sense: A participatory sensing system for air pollution monitoring and control. In: 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops); 2011. p. 344–347.

3. Agadakos I, Polakis J, Portokalidis G. Techu: Open and Privacy-Preserving Crowdsourced GPS for the Masses. In: Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services. MobiSys’17. New York, NY, USA: ACM; 2017. p. 475–487. Available from: http://doi.acm.org/10.1145/3081333.3081345.

4. Huang KL, Kanhere SS, Hu W. A privacy-preserving reputation system for participatory sensing. In: 37th Annual IEEE Conference on Local Computer Networks; 2012. p. 10–18.

5. Garms L, Martin K, Ng SL. Reputation Schemes for Pervasive Social Networks with Anonymity. In: Proceedings of the fifteenth International Conference on Privacy, Security and Trust (PST 2017). IEEE; 2017.

6. Kokoschka A, Petrlic R, Sorge C. A Reputation System Supporting Unlinkable, Yet Authorized Expert Ratings. In: Proceedings of the 30th Annual ACM Symposium on Applied Computing. SAC’15. New York, NY, USA: ACM; 2015. p. 2320–2327. Available from: http://doi.acm.org/10.1145/2695664.2695892.

7. Wang XO, Cheng W, Mohapatra P, Abdelzaher T. ARTSense: Anonymous reputation and trust in participatory sensing. In: 2013 Proceedings IEEE INFOCOM; 2013. p. 2517–2525.

8. Zhai E, Wolinsky DI, Chen R, Syta E, Teng C, Ford B. AnonRep: Towards Tracking-Resistant Anonymous Reputation. In: 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). Santa Clara, CA: USENIX Association; 2016. p. 583–596. Available from: https://www.usenix.org/conference/nsdi16/technical-sessions/presentation/zhai.

9. Blömer J, Juhnke J, Kolb C. In: Böhme R, Okamoto T, editors. Anonymous and Publicly Linkable Reputation Systems. Berlin, Heidelberg: Springer Berlin Heidelberg; 2015. p. 478–488. Available from: https://doi.org/10.1007/978-3-662-47854-7_29.

10. Busom N, Petrlic R, Sebé F, Sorge C, Valls M. A privacy-preserving reputation system with user rewards. Journal of Network and Computer Applications. 2017;80(Supplement C):58–66. https://doi.org/10.1016/j.jnca.2016.12.023

11. Azad MA, Bag S, Hao F. PrivBox: Verifiable decentralized reputation system for online marketplaces. Future Generation Computer Systems. 2018;89:44–57. https://doi.org/10.1016/j.future.2018.05.069

12. Bag S, Azad MA, Hao F. A privacy-aware decentralized and personalized reputation system. Computers & Security. 2018;77:514–530. https://doi.org/10.1016/j.cose.2018.05.005

13. Chaum D, van Heyst E. Group Signatures. In: Davies DW, editor. Advances in Cryptology—EUROCRYPT’91. Berlin, Heidelberg: Springer Berlin Heidelberg; 1991. p. 257–265.

14. Hwang JY, Lee S, Chung BH, Cho HS, Nyang D. Group signatures with controllable linkability for dynamic membership. Information Sciences. 2013;222:761–778. https://doi.org/10.1016/j.ins.2012.07.065

15. Hwang JY, Chen L, Cho HS, Nyang D. Short Dynamic Group Signature Scheme Supporting Controllable Linkability. IEEE Transactions on Information Forensics and Security. 2015;10(6):1109–1124. doi: 10.1109/TIFS.2015.2390497

16. Brands S. Untraceable Off-line Cash in Wallet with Observers. In: Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology. CRYPTO’93. Berlin, Heidelberg: Springer-Verlag; 1994. p. 302–318. Available from: http://dl.acm.org/citation.cfm?id=188105.188172.

17. Abe M, Fujisaki E. How to date blind signatures. In: Kim K, Matsumoto T, editors. Advances in Cryptology—ASIACRYPT’96. Berlin, Heidelberg: Springer Berlin Heidelberg; 1996. p. 244–251.

18. Nakamoto S. Bitcoin: A Peer-to-Peer Electronic Cash System; 2008. Available from: https://bitcoin.org/bitcoin.pdf.

19. Wood G. Ethereum: A Secure Decentralised Generalised Transaction Ledger-EIP-150 Revision;. Available from: https://gavwood.com/paper.pdf.

20. Hyperledger;. Available from: https://www.hyperledger.org/.

21. EOS.IO Technical White Paper v2;. Available from: https://github.com/EOSIO/Documentation/blob/master/TechnicalWhitePaper.md.

22. Huang Y, Katz J, Evans D. Quid-Pro-Quo-tocols: Strengthening Semi-honest Protocols with Dual Execution. In: 2012 IEEE Symposium on Security and Privacy; 2012. p. 272–284.

23. Dingledine R, Mathewson N, Syverson P. Tor: The Second-generation Onion Router. In: Proceedings of the 13th Conference on USENIX Security Symposium—Volume 13. SSYM’04. Berkeley, CA, USA: USENIX Association; 2004. p. 21–21. Available from: http://dl.acm.org/citation.cfm?id=1251375.1251396.

24. Wolinsky DI, Corrigan-Gibbs H, Ford B, Johnson A. Dissent in Numbers: Making Strong Anonymity Scale. In: Presented as part of the 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12). Hollywood, CA: USENIX; 2012. p. 179–182. Available from: https://www.usenix.org/conference/osdi12/technical-sessions/presentation/wolinsky.

25. van den Hooff J, Lazar D, Zaharia M, Zeldovich N. Vuvuzela: Scalable Private Messaging Resistant to Traffic Analysis. In: Proceedings of the 25th Symposium on Operating Systems Principles. SOSP’15. New York, NY, USA: ACM; 2015. p. 137–152. Available from: http://doi.acm.org/10.1145/2815400.2815417.

26. Kamvar SD, Schlosser MT, Garcia-Molina H. The Eigentrust Algorithm for Reputation Management in P2P Networks. In: Proceedings of the 12th International Conference on World Wide Web. WWW’03. New York, NY, USA: ACM; 2003. p. 640–651. Available from: http://doi.acm.org/10.1145/775152.775242.

27. Optimal ate pairing over Barreto-Naehrig curves;. Available from: https://github.com/adjoint-io/pairing.

28. Menezes A. In: An introduction to pairing-based cryptography; 1991.

29. The Java Pairing Based Cryptography Library (JPBC);. Available from: http://gas.dia.unisa.it/projects/jpbc/.

30. Paik JH, Seo SC, Kim Y, Lee HJ, Jung H, Lee DH. An Efficient Implementation of Block Cipher in Android Platform. In: 2011 Fifth FTRA International Conference on Multimedia and Ubiquitous Engineering; 2011. p. 173–176.

31. Liu JK, Wong DS. Linkable Ring Signatures: Security Models and New Schemes. In: Gervasi O, Gavrilova ML, Kumar V, Laganà A, Lee HP, Mun Y, et al., editors. Computational Science and Its Applications—ICCSA 2005. Berlin, Heidelberg: Springer Berlin Heidelberg; 2005. p. 614–623.

32. Shoup V, Gennaro R. Securing Threshold Cryptosystems against Chosen Ciphertext Attack. Journal of Cryptology. 2002;15(2):75–96. doi: 10.1007/s00145-001-0020-9

33. Delerablée C, Pointcheval D. Dynamic Threshold Public-Key Encryption. In: Wagner D, editor. Advances in Cryptology—CRYPTO 2008. Berlin, Heidelberg: Springer Berlin Heidelberg; 2008. p. 317–334.

34. Poon J, Buterin V. Plasma: Scalable autonomous smart contracts; 2017. Available from: https://plasma.io/plasma.pdf.

Článek vyšel v časopise


2019 Číslo 12
Nejčtenější tento týden