4.7 Article

A Decentralized Location Privacy-Preserving Spatial Crowdsourcing for Internet of Vehicles

期刊

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TITS.2020.3010288

关键词

Task analysis; Privacy; Encryption; Crowdsourcing; Data privacy; Internet of Vehicles; spatial crowdsourcing; location privacy; multi-level privacy-preserving; blockchain

资金

  1. National Natural Science Foundation of China [61872283, U1764263, 61702105, U1804263, U1708262]

向作者/读者索取更多资源

This paper proposes a decentralized location privacy-preserving spatial crowdsourcing system for IoV, which introduces blockchain technology and encryption verification to ensure the privacy of task locations and worker locations, and utilizes multi-level protection and zero-knowledge proofs to prevent malicious activities.
With the rapid development of Internet of Vehicles (IoV), vehicle-based spatial crowdsourcing (SC) applications have been proposed and widely applied to various fields. However, location privacy leakage is a serious issue in spatial crowdsourcing because workers who participate in a crowdsourcing task are required to upload their driving locations. In this paper, we propose a decentralized location privacy-preserving SC for IoV, which allows vehicle users to securely participate in SC with ensuring the task's location policy privacy and providing multi-level privacy preservation for workers' locations. Specifically, we introduce blockchain technology into SC, which can eliminate the control of vehicle user data by SC-server. We combine the additively homomorphic encryption and circle-based location verification to ensure the confidentiality of task's location policy. To achieve multi-level privacy preservation for workers' driving locations, we only reveal a grid where workers are located in. The size of the grid represents the level of privacy preservation. We leverage the order-preserving encryption and non-interactive zero-knowledge proof to prevent workers from illegally obtaining rewards by forging their driving locations. The security analysis results show that our framework can satisfy the above requirements. In addition, the experiment results demonstrate that our framework is efficient and feasible in practice.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据