CN115828311A - Block chain-based crowd sensing privacy protection incentive mechanism method - Google Patents
Block chain-based crowd sensing privacy protection incentive mechanism method Download PDFInfo
- Publication number
- CN115828311A CN115828311A CN202310114476.7A CN202310114476A CN115828311A CN 115828311 A CN115828311 A CN 115828311A CN 202310114476 A CN202310114476 A CN 202310114476A CN 115828311 A CN115828311 A CN 115828311A
- Authority
- CN
- China
- Prior art keywords
- worker
- workers
- block chain
- bidding
- task
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a block chain-based crowd sensing privacy protection incentive mechanism method, which can effectively stimulate workers to participate in crowd sensing tasks under given cost constraint, maximize a coverage function and simultaneously ensure the privacy of users; the crowd sensing system based on the block chain can realize decentralization and ensure privacy and safety; the incentive mechanism method provided by the invention can maximize the coverage function under the given budget, and carry out the user recruitment process and the reward calculation process; the invention designs a specific protocol based on the intelligent contract of the block chain, and can be suitable for most block chain systems; the incentive mechanism provided by the invention has the advantages of computational effectiveness, individuality, authenticity, proximity and privacy protection, and can obtain higher coverage, lower payment and more complete security, including authorization authentication, user anonymity and user data privacy, compared with a similar algorithm.
Description
Technical Field
The invention relates to the field of application, approximation algorithm and distributed systems of the Internet of things, in particular to a crowd sensing privacy protection incentive mechanism method based on a block chain.
Background
Crowd-sourcing perception is a data collection mode combining the perception capability of mobile equipment and crowdsourcing, and can collect large-scale perception data by means of the strength of a general user; crowd sensing has been widely used in a number of fields including traffic monitoring, environmental monitoring, medical protection, location-based services, etc.; the crowd sensing has the characteristics of high expansibility and low professional requirement.
The traditional crowd sensing system is too dependent on a centralized server and has the problem of single-point failure, so that the robustness of the crowd sensing system is lost; therefore, the block chain technology is introduced to replace the traditional server, the decentralized crowd sensing system is realized, and the safety of the crowd sensing system is improved; at present, most block chains support an intelligent contract technology, and the intelligent contract can realize the protocol function set by a system, automatically and trustingly execute a given task, and is suitable for realizing specific interaction in a crowd sensing process.
At present, the main problems of limiting crowd sensing are insufficient participation and unstable data quality, so that an effective excitation mechanism is designed for a crowd sensing system to improve the participation and is of great importance; the goal of the incentive mechanism is to select appropriate crowd-sourcing aware participants and pay certain monetary form of rewards based on their contributions; the mainstream design idea at present is to set an optimization goal, such as maximizing the profit of the crowd sensing platform, accordingly select the appropriate crowd sensing participants, and decide to pay for them.
The current excitation mechanism design based on the block chain has the following problems: various excitation mechanisms are designed in part of work, but how to realize the mechanisms in a block chain through intelligent contracts is ignored, so that the work is not universal; some work mainly optimizes the income of the entity when designing the optimization scene, and neglects the importance of the data quality factor in the crowd sensing; most of the work is considered that the blockchain and the intelligent contracts are high in safety, but actually, due to the openness of the blockchain and the transparency of the intelligent contracts, privacy leakage is easily caused by the operation of an incentive mechanism, and the participation enthusiasm of users is restrained.
Disclosure of Invention
Aiming at the problems, the invention designs a block chain-based crowd sensing privacy protection incentive mechanism method, which can effectively stimulate workers to participate in crowd sensing tasks under the given cost constraint, maximize a coverage function and simultaneously ensure the privacy of the users; the crowd sensing system based on the block chain can realize decentralization and ensure privacy and safety; the incentive mechanism method provided by the invention comprises a user recruitment process and a reward calculation process; the invention designs a specific protocol according to the step of crowd sensing based on the intelligent contract of the block chain, and can be suitable for most block chain systems; the incentive mechanism method provided by the invention has the advantages of computational effectiveness, individuality, authenticity, approximation degree and privacy protection, and can obtain higher coverage, lower payment and more complete safety compared with a similar algorithm, including authorization authentication, user anonymity and user data privacy.
The technical scheme of the invention is as follows:
a block chain-based crowd sensing privacy protection incentive mechanism method is characterized by comprising the following steps:
step 1: designing and carrying out mathematical modeling on a crowd sensing system based on a block chain, establishing a crowd sensing system structure comprising requesters, workers, the block chain and an incentive mechanism based on a reverse auction, and establishing mathematical models of the requesters, the workers, crowd sensing tasks, rewards and income of the workers;
step 2: designing a coverage function as an optimization target based on the characteristics of a position-related crowd sensing system, and constructing an optimization problem of the maximized coverage function under budget constraint;
and step 3: a crowd sensing privacy protection incentive mechanism framework is designed based on an intelligent contract technology of a block chain, and the framework comprises six stages: the method comprises a registration stage, a task delivery stage, a bidding stage, a worker recruitment stage, a data submission stage and a payment stage;
and 4, step 4: in the registration stage, a worker and a requester register on a block chain to obtain an identity certificate for authentication in subsequent operation, and elliptic curve cryptography is used as a public and private key system;
and 5: in the task delivery stage, the registered requester issues the crowd sensing task to the block chain by calling a task delivery contract;
step 6: in the bidding stage, workers who finish registration perform bidding operation by calling a bidding contract, in order to ensure privacy of bidding documents, the bidding documents are uploaded to a block chain in a manner promised by Pedersen, and in order to ensure anonymity of the workers, a ring signature method is adopted as an authentication mode;
and 7: in the worker recruitment stage, all workers participating in bidding need to disclose real bidding documents of the workers, the bidding documents disclose appointments to verify bidding information of the workers and exclude all workers with illegal information, information of the rest workers is used as input and sent to an incentive mechanism contract, the incentive mechanism contract is automatically executed in preset time, and obtained results are published;
and 8: in the data submitting stage, all winners need to encrypt own data and submit the encrypted data to an interplanetary file system, and encrypt the abstract and the storage address of the data and upload the encrypted data to a block chain through a data submitting contract;
and step 9: in the payout phase, the requester gives each winner a reward, which is calculated by the incentive mechanism.
Further, in step 1, the architecture of the crowd sensing system is as follows:
the crowd sensing system comprises four roles of a requester, a worker, a block chain and an incentive mechanism; requesterIs the initiator of the perception task, the set of requestersIt is shown that the process of the present invention,for task set ofIt is shown that the process of the present invention,Includeda perception task; workerIs an executor of perception tasks and is used for gathering workersIs shown to containAn individual worker; the block chain provides a safety platform for crowd sensing; the incentive mechanism is a program deployed on the blockchain with the goal of selecting workers and deciding on rewards to be given to the workers;
each workerSubmitting a triple bidWhereinIs a workerIn the position of (a) in the first,is the worker's set of tasks, including all tasks that he is willing to perform,is a workerIs offered byIndicating the workerThe true cost of the process is that of,the privacy is only known by the person;
given label fileThe goal of the incentive scheme is to select a set of winnersAnd determining a reward to be given to each winner, the magnitude of the reward to be given to the winner depending on its contribution to the missionRepresents an archive in whichIs given to the workerIf the worker is paid, ifIf it is home transfusion, then;
Further, in the step 2, a coverage function is defined in consideration of the position-dependent crowd sensing systemThe following were used:
whereinIs a taskThe weight of (a), determined by the location importance and value of the task,is a taskIs collectedThe number of times the worker in (1) performs,is a system parameter controlling the decreasing gradient of the yield, usingAndrespectively representing tasksLocation importance and value, weight ofIs calculated by the formula
WhereinIs a balance parameter; the incentive scheme aims at a fixed budgetThe problem of maximizing the coverage function under budget constraints is calledProblem, formalized as
Further, in the step 3, the crowd sensing privacy protection incentive mechanism framework includes six stages: the method comprises a registration stage, a task delivery stage, a bidding stage, a worker recruitment stage, a data submission stage and a payment stage; the operation of the client side realizes the interaction between a requester and a worker and an intelligent contract, the intelligent contract realizes request processing, function realization and data chaining, the intelligent contract interacts with a block chain to complete the data chaining process, and the processes form a crowd sensing privacy protection incentive mechanism framework.
Further, in the step 4, the registration stage is as follows:
all requesters and workers need to register when joining the crowd sensing system for the first time, a pair of public keys and private keys is obtained, the system adopts elliptic curve cryptography as a key management scheme, and the system sets adopted elliptic curves in advancePrime orderAnd a common reference point on the curveAnd disclose the information, workerRandom selection of private keysTo satisfyThen the corresponding public key isThe private key is stored by the worker, the public key is published, and the worker can obtain one key during registrationIdentity labelRequesterThe registration process is the same.
Further, in step 5, the task delivery stage is as follows:
the registered requester can issue own tasks by calling a task delivery contract, the requester needs to attach a digital signature generated by using a private key of the requester and verify the digital signature by an intelligent contract, and after the tasks are issued, workers can check task information on a block chain and select interested tasks;
each perception task comprises a task name, a task position and a task description, the task position is divided according to a preset area and is represented by a number, and the perception task information is attached with an abstract to ensure that the perception task information is not tampered and the task requesterThe public key of the requester can be conveniently found by workers, and the requester can submit a budget after all tasks are deliveredIndicating the ability to provide payment for recruiting workers.
Further, in step 6, the bidding stage is as follows:
registered workers can select own task sets according to own wishes and conduct bidding by calling bidding contracts, information in bidding, including position information, task sets and quotations, exists in a numerical mode and is hidden by using Pedersen commitments, elliptic curves are given in advanceAnd two reference pointsAndand is andis unknown, for true values that need to be hiddenThe Pedersen commitment calculation formula isWhereinA blind factor that is randomly selected;
in addition to submitting the Pedersen commitment, the worker needs to attach a ring signature in the bidding step to anonymously verify the identity of the worker, and an elliptic curve is givenAnd a reference point,The public key of an individual worker is expressed as,Assume that the order parameter of the true signer is,The private key of the signer is expressed asBy usingA key image representing a signer, whereinIs the public key of the signer or signer,is a hash function satisfying the cryptographic security with a return value ofThe signature process at one point above is as follows:
by usingRepresenting messages to be signed, signers being all workersGenerating random factorsAnd random variablesWhereinIs thatThe order of the prime numbers of (a) to (b),is a modulus of integerThe remaining set ofIndicating the workerCorresponding to the public key, withIndicating the workerCorresponding to the key image, usingIndicating the workerThe signer calculates the hash value after the random factor combination;
whereinIs a returnA hash function of a value of (a) and then the signer continuously performs the following calculations
Finally the ring signature is represented asThe signer attaches the generated ring signature to complete the bidding process, in the process, all bidding information is hidden, and the identity of the bidding worker is anonymous, the intelligent contract needs to verify the ring signature, and the verification process is as follows:
the intelligent contract end performs the following calculation
If it is notThen ring signatureIs legitimate, in particular if two ring signatures possess duplicate key imagesThen the two ring signatures are said to be linked and their signers are the same worker, and for anonymous workers, a new one will be generated for the convenience of identificationAnd after the intelligent contract is verified, the bidding stage is finished.
Further, in step 7, the worker recruitment phase is as follows:
all workers participating in bidding need to disclose own bidding truth values by calling bidding disclosure contracts, the intelligent bidding appointments are compared and verified with the previously submitted Pedersen commitments according to the truth values, and the commitments are verifiedAnd true value receivedCalculatingIf, ifIf the worker is committed to be legal, the intelligent contract excludes all the workers committed to be illegal and sends the information of the rest workersCarry out integration withRepresenting the final set of anonymous workersTo represent the final bibliographic document,andwill be sent to the incentive scheme contract as input;
the incentive mechanism is realized by intelligent contracts and can be triggered at a given time, the aim of the incentive mechanism is to solve the problem of maximizing a coverage function under the budget constraint, select workers and decide the reward given to a winner, and the specific steps are as follows:
S5: will be anonymous workerAdding to a set of winnersAnd giving anonymous workersIs paid inWhereinJumping to S17 for budget;
S9: finding collectionsIn can makeMaximum value anonymous worker,Is shown inMiddle exclusion setSkipping to S7 for the residual sets after the medium elements;
s10: for winner setEach anonymous worker in (1)These workers, also called winners, perform steps S11-S16;
S12: finding collectionsIn can makeSecond anonymous worker with largest value,Representing workers anonymous to exclude elementsSet of;
After the result is obtained by calculating the contract of the incentive mechanism, the result is published on the block chain, and workers can pass the anonymity of the workersIt is confirmed whether or not it is selected as a winner.
Further, in step 8, the data submission stage is as follows:
the winner needs to complete the task by submitting the collected perception data, use the interplanetary file system as a distributed storage system to reduce the storage burden on the blockchain, the winner first needs to share a security key with the requester, and the winner generates a one-time private keyThe corresponding one-time public key isIf the one-time public key needs to be linked up and the one-time private key is owned by the winner, the shared security key is calculated according to the formulaThe key only having the winner himself and the private keyThe requester can be obtained by calculation, so that the safety is ensured;
the winner takes the Hash operation to the shared security key to obtain the final encryption keyEncrypting the submitted data by using the key, transmitting the encrypted content to an interplanetary file system to finish uploading the data, then the winner needs to encrypt the hash value and the storage address of the submitted data by using the encryption key and upload the encrypted hash value and the storage address to a block chain through a data submission contract, and the requester calculates the encryption keyAnd decrypting the encrypted hash value and the storage address, and acquiring the data information submitted by the winner at the interplanetary file system, wherein the data integrity and the non-falsification are ensured by the data hash value.
Further, in step 9, the payment phase is as follows:
after confirming the reception of the perception data submitted by the winner, the requester gives a certain amount of payment to the winner according to the reward result calculated by the previous incentive mechanism, and the whole crowd sensing process is completed.
The invention has the beneficial effects that:
the crowd sensing privacy protection incentive mechanism method based on the block chain can effectively stimulate workers to participate in the crowd sensing task and solve the problem of insufficient crowd sensing participation degree; the crowd sensing system based on the block chain does not need a centralized server, and can realize decentralization, privacy and safety; the incentive mechanism method provided by the invention can maximize the coverage function under the given budget and obtain the calculation effectiveness, the individual rationality, the authenticity and the approximation degree; the incentive mechanism method provided by the invention carries out specific protocol design based on the intelligent contract of the block chain, has completeness and feasibility, can be suitable for most block chain systems, and ensures the privacy of users; compared with the similar algorithm, the incentive mechanism provided by the invention can obtain higher coverage, lower payment and more complete security, including authorization authentication, user anonymity and user data privacy.
Drawings
FIG. 1 is a block chain-based crowd sensing privacy preserving incentive scheme method flow diagram;
FIG. 2 is a flow diagram of an incentive scheme algorithm;
FIG. 3 (a) is a diagram of test results of execution time consumption on a chain of registration, task delivery, incentive scheme, payment steps in a privacy preserving incentive scheme approach;
FIG. 3 (b) is a diagram of the results of a test of the on-chain execution time consumption of the bidding, bid disclosure, data submission steps in the privacy preserving incentive scheme method;
FIG. 4 (a) is a diagram of the test results of the execution times of the registration, task delivery, payment steps in the privacy preserving incentive scheme method;
FIG. 4 (b) is a test result diagram of the execution time of the bidding, worker recruitment, and data submission steps in the privacy protection incentive scheme method;
FIG. 5 (a) is a graph of the comparison of the optimized target values obtained by the privacy preserving incentive scheme method as a function of the number of workers;
FIG. 5 (b) is a graph of the comparison of the payment required by the privacy preserving incentive scheme method as a function of the number of workers;
FIG. 6 (a) is a graph of the comparison result of the optimized target value with the budget variation obtained by the privacy protection incentive scheme method;
fig. 6 (b) is a comparison result graph of the change of the payment required by the privacy protection incentive scheme method with the budget.
Detailed Description
The technical solution and effects of the present invention will be described in detail below with reference to the accompanying drawings. The simulation results compared with the same type of excitation mechanism method are provided as an example, but the example is only for the purpose of explaining the present invention, and the present invention is not to be construed as being limited thereto.
Example 1: as shown in fig. 1, a block chain-based crowd sensing privacy protection incentive mechanism method includes the following steps:
step 1: designing and mathematically modeling a crowd sensing system based on a block chain, establishing a crowd sensing system structure comprising requesters, workers, the block chain and an incentive mechanism based on a reverse auction, and establishing mathematical models of the requesters, the workers, crowd sensing tasks, rewards and income of the workers;
step 2: designing a coverage function as an optimization target based on the characteristics of a position-related crowd sensing system, and constructing an optimization problem of the maximized coverage function under budget constraint;
and step 3: a crowd sensing privacy protection incentive mechanism framework is designed based on an intelligent contract technology of a block chain, and the framework comprises six stages: the method comprises a registration stage, a task delivery stage, a bidding stage, a worker recruitment stage, a data submission stage and a payment stage;
and 4, step 4: in the registration stage, a worker and a requester register on a block chain to obtain an identity certificate for authentication in subsequent operation, and elliptic curve cryptography is used as a public and private key system;
and 5: in the task delivery stage, the registered requester issues the crowd sensing task to the block chain by calling a task delivery contract;
step 6: in the bidding stage, workers who finish registration perform bidding operation by calling a bidding contract, in order to ensure privacy of bidding documents, the bidding documents are uploaded to a block chain in a manner promised by Pedersen, and in order to ensure anonymity of the workers, a ring signature method is adopted as an authentication mode;
and 7: in the worker recruitment stage, all workers participating in bidding need to disclose real bidding documents of the workers, the bidding documents disclose appointments to verify bidding information of the workers and exclude all workers with illegal information, information of the rest workers is used as input and sent to an incentive mechanism contract, the incentive mechanism contract is automatically executed in preset time, and obtained results are published;
and 8: in the data submitting stage, all winners need to encrypt their data and submit the data to the interplanetary file system, and upload the data abstract and the storage address to the block chain through a data submitting contract after encrypting;
and step 9: in the payout phase, the requester gives each winner a reward, which is calculated by the incentive mechanism.
Further, in step 1, the architecture of the crowd sensing system is as follows:
the crowd sensing system comprises four roles of a requester, a worker, a block chain and an excitation mechanism; requesterIs the initiator of the perception task, the set of requestersIt is shown that,for task set ofIt is shown that,Includeda perception task; workerIs the performer of the perception task and is used for the collection of workersIs shown to containAn individual worker; the block chain provides a safety platform for crowd sensing; the incentive mechanism is a program deployed on the blockchain with the goal of selecting workers and deciding on rewards to be given to the workers;
each workerSubmitting a triple labelWhereinIs a workerIn the position of (a) or (b),is the worker's set of tasks, including all tasks that he is willing to perform,is a workerIs offered byIndicating the workerIsThe cost is low, and the cost is low,the privacy is only known by the person;
given label fileThe goal of the incentive scheme is to select a set of winnersAnd determining a reward to be given to each winner, the magnitude of the reward to be given to the winner depending on its contribution to the missionRepresents an archive in whichIs given to the workerIf the worker is paid, ifIf it is home transfusion, then;
Further, in the step 2, a coverage function is defined in consideration of the position-dependent crowd sensing systemThe following were used:
whereinIs a taskIs determined by the location importance and value of the task,is a taskIs collectedThe number of times the worker in (1) performs,is a system parameter controlling the decreasing gradient of the yield, usingAndrespectively representing tasksLocation importance and value, weight ofIs calculated by the formula
WhereinIs a balance parameter; the incentive scheme aims at a fixed budgetLower maximum coverThe cover function, called the problem of maximizing the cover function under budget constraints, is formalized as
Further, in the step 3, the crowd sensing privacy protection incentive mechanism framework includes six stages: the method comprises a registration stage, a task delivery stage, a bidding stage, a worker recruitment stage, a data submission stage and a payment stage; the operation of the client side realizes the interaction between a requester and a worker and an intelligent contract, the intelligent contract realizes request processing, function realization and data chaining, the intelligent contract interacts with a block chain to complete the data chaining process, and the processes form a crowd sensing privacy protection incentive mechanism framework.
Further, in step 4, the registration phase is as follows:
all requesters and workers need to register when joining the crowd sensing system for the first time, a pair of public keys and private keys is obtained, the system adopts elliptic curve cryptography as a key management scheme, and the system sets adopted elliptic curves in advancePrime orderAnd a common reference point on the curveAnd disclose the information, workerRandom selection of private keysSatisfy the following requirementsThen the corresponding public key isPrivate keys by workersThe user can save the public key and open the public key, and a worker can obtain an identity mark during registrationRequesterThe registration process is the same.
Further, in step 5, the task delivery stage is as follows:
the registered requester can issue own tasks by calling a task delivery contract, the requester needs to attach a digital signature generated by using a private key of the requester and verify the digital signature by an intelligent contract, and after the tasks are issued, workers can check task information on a block chain and select interested tasks;
each perception task comprises a task name, a task position and a task description, particularly, the task position is divided according to a preset area and is represented by a number, and the perception task information is attached with an abstract to ensure that the perception task information is not tampered and the task requesterThe public key of the requester can be conveniently found by workers, and the requester can submit a budget after all tasks are deliveredIndicating the ability to provide payment for recruiting workers.
Further, in step 6, the bidding stage is as follows: registered workers can select own task sets according to own wishes and conduct bidding by calling bidding contracts, information in bidding, including position information, task sets and quotations, exists in a numerical mode and is hidden by using Pedersen commitments, elliptic curves are given in advanceAnd two reference pointsAndand is made ofIs unknown for true values that need to be hiddenThe Pedersen commitment calculation formula isWhereinA blind factor that is randomly selected;
in addition to submitting the Pedersen commitment, the worker needs to attach a ring signature in the bidding step to anonymously verify the identity of the worker, and an elliptic curve is givenAnd a reference point,The public key of an individual worker is expressed as,Assume that the order parameter of the true signer is,The private key of the signer is expressed asBy usingA key image representing a signer, whereinIs the public key of the signer and,is a hash function satisfying the cryptographic security with a return value ofThe signature process at one point above is as follows:
by usingRepresenting messages to be signed, signers being all workersGenerating random factorsAnd random variablesWhereinIs thatThe order of the prime numbers of (a) to (b),is a modulus of integerThe remaining set ofIndicating the workerCorresponding to the public key, withIndicating the workerCorresponding to the key image, usingIndicating the workerThe signer calculates the hash value after the random factor combination;
whereinIs a returnA hash function of a value of (a) and then the signer continuously performs the following calculations
Finally the ring signature is represented asThe signer attaches the generated ring signature to complete the bidding process, in which all bidding information is hidden and the identity of the bidding worker is anonymous, and the intelligent contract requiresAnd verifying the ring signature, wherein the verification process is as follows:
the intelligent contract end performs the following calculation
If it is notThen ring signatureIs legitimate, in particular if two ring signatures possess duplicate key imagesThen the two ring signatures are said to be linked and their signers are the same worker, and for anonymous workers, a new one will be generated for the convenience of identificationAnd after the intelligent contract is verified, ending the bidding stage.
Further, in step 7, the worker recruitment phase is as follows:
all workers participating in bidding need to disclose own bidding truth values by calling bidding disclosure contracts, the intelligent bidding appointments are compared and verified with the previously submitted Pedersen commitments according to the truth values, and the commitments are verifiedAnd true value receivedCalculatingIf it is determined thatIf the worker is committed to be legal, the intelligent contract excludes all the workers committed to be illegal, integrates the information of the rest workers and uses the informationRepresenting the final set of anonymous workersTo represent the final bidding document as such,andwill be sent to the incentive scheme contract as input;
the incentive scheme is implemented by intelligent contracts, and can be triggered at a given time, the objective of the incentive scheme is to solve the problem of maximizing the coverage function under the budget constraint, select workers, and decide the reward given to the winner, as shown in fig. 2, the specific steps of the incentive scheme are as follows:
S5: will be anonymous workerAdding to a set of winnersAnd giving anonymous workersIs paid inWhereinJumping to S17 for budget;
S9: finding collectionsIn can makeMaximum value anonymous worker,Is shown inMiddle exclusion setSkipping to S7 for the residual sets after the medium elements;
s10: for winner setEach anonymous worker in (1)These workers, also called winners, perform steps S11-S16;
S12: finding collectionsIn can makeSecond anonymous worker with largest value,Representing workers with exclusion element anonymitySet of;
After the result is obtained by calculating the contract of the incentive mechanism, the result is published on the block chain, and workers can pass the anonymity of the workersIt is confirmed whether or not it is selected as a winner.
Further, in step 8, the data submission stage is as follows:
the winner needs to complete the task by submitting the collected perception data, use the interplanetary file system as a distributed storage system to reduce the storage burden on the blockchain, the winner first needs to share a security key with the requester, and the winner generates a one-time private keyCorresponding one-time public key isIf the one-time public key needs to be uplinked and the one-time private key is owned by the winner, the shared security key is calculated according to the formulaThe key only having the winner himself and the private keyThe requester can be obtained by calculation, so that the safety is ensured;
the winner takes the Hash operation to the shared security key to obtain the final encryption keyEncrypting the submitted data by using the key, transmitting the encrypted content to an interplanetary file system to finish uploading the data, then the winner needs to encrypt the hash value and the storage address of the submitted data by using the encryption key and upload the encrypted hash value and the storage address to a block chain through a data submission contract, and the requester calculates the encryption keyAnd decrypting the encrypted hash value and the storage address, and acquiring the data information submitted by the winner at the interplanetary file system, wherein the data integrity and the non-falsification are ensured by the data hash value.
Further, in step 9, the payment phase is as follows:
after confirming the reception of the perception data submitted by the winner, the requester gives a certain amount of payment to the winner according to the reward result calculated by the previous incentive mechanism, and the whole crowd sensing process is completed.
The following are simulation experiment results:
the block chain-based crowd sensing privacy protection incentive mechanism method of the invention compares the performance with SPPIM method in "townds a smart-presenting in a legacy presenting information system" published by Wang et al in 2021 and with CrowdBC method in "CrowdBC, A blockchain-based presented frame for visiting resources" published by Li et al in 2018 in IEEE Transactions on Parallel and Distributed Systems.
All simulation experiments are carried out on one Ubuntu virtual machine, the memory is 50GB, the CPU of a host machine is i9-7900X 3.30GHz, and the memory is 128GB. The experiment was deployed on a Hyperledger Fabric v2.3 platform, and 5 results were averaged for each test.
In the cryptography method, ed25519 is selected as a public key signature scheme, SHA-512 is selected as a hash function, AES-256 is selected as a symmetric encryption algorithm, and the same cryptography scheme is adopted in the comparison algorithm in order to ensure the fairness of comparison. For the incentive scheme, the criteria set forth below: number of workersNumber of tasks is 10020, the size of the set of worker tasks is from [5,10 ]]The method comprises the steps of selecting medium random, randomly selecting specific tasks and randomly selecting system parametersSet to 0.8 and budget set to 100,000. Bids are randomly selected from the data set and all range [100,500 ]]In (1).
As shown in fig. 3 (a) and 3 (b), the time consumption in the chain of the privacy protection incentive scheme method is tested, and it can be seen that the average time of each transaction increases with the number of transactions, and the increase amount of other contracts except the incentive scheme contract (IM) is small, and the increase is normal in consideration of the computational complexity of the incentive scheme algorithm, and in practical applications, there are generally no concurrent requests of such amount, and thus, the processing time is not too long. According to the result of time consumption, fig. 3 is divided into two sub-graphs according to different measurement sizes, and it can be seen that the time consumption of registration contracts, task delivery contracts, incentive mechanism contracts and payment contracts is less, while the time consumption of bidding contracts, bidding document disclosure contracts and data submission contracts is larger, because the verification process in the ring signature scheme is time-consuming, but considering the anonymity that the ring signature can bring, such time consumption is worth, and the time consumption of all contracts is not more than 330ms, which is suitable for practical application.
As shown in fig. 4 (a), 4 (b), the step execution time of the privacy protection incentive mechanism method was tested, and the step execution includes client operation under the chain and intelligent contract operation on the chain. It can be seen that the registration, task delivery and payment steps need only be completed in a short time, while the bidding, worker recruitment and data submission steps take a long time. In fact, the time taken to generate a ring signature is comparable to the time taken to verify a ring signature, resulting in a large time cost for the bid and data submission steps. The worker recruitment procedure involves a process of bidding disclosure and motivational mechanisms, and is therefore also time consuming. As the number of requests grows, the average time cost increases slightly and the rate of increase of the worker recruitment step is greatest.
As shown in Table 1, the privacy preserving incentive scheme method was tested in comparison with the step execution time of the same kind of algorithm, and the unit is millisecond, and N/A represents that the scheme does not relate to the design of the step. It can be seen that the scheme proposed by the present invention has more time advantage in the registration step and the task delivery step than the other two schemes. In the worker recruitment step and the data submission step, the scheme of the invention is more time-consuming due to the use of the ring signature, but the scheme also achieves anonymity. The payment step behaves in a few ways.
Defining an incentive scheme evaluation index overpower rate, the calculation of which is obtained by dividing the total payment by the total cost, i.e.。
As shown in fig. 5 (a) and 5 (b), the performance of the privacy protection incentive scheme method is tested according to the number of workers, and it can be seen that the scheme proposed by the present invention is much larger than the coverage function obtained by the SPPIM, because the incentive scheme adopted in the scheme selects winners according to the contribution of workers, and under the standard setting, the scheme obtains a coverage function 35.8% higher than the SPPIM, and the number of users recruited by the scheme is also higher than the SPPIM, which is mainly related to the payment policy. The total payment cost of the scheme is much smaller than that of SPPIM, and meanwhile, the lower over-payment rate is obtained, so that the high efficiency of the payment scheme is shown. As the number of workers increases, the coverage function available for the solution increases as well as the number of workers, since the mechanism can select more valuable workers when more workers are available for selection. Thus, the total payment and the overpayment rate also slightly decrease as the number of workers increases.
As shown in fig. 6 (a) and 6 (b), the performance of the privacy protection incentive mechanism method is tested according to the budget, and as the budget increases, the number of workers recruited by all mechanisms increases, so that the obtained coverage function also increases. As the budget increases, more users need to be recruited, and thus the total reward and overpayment rate also increases.
It should be noted that any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and that the scope of the preferred embodiments of the present invention includes alternative implementations in which functions may be executed out of order from that shown or discussed, including substantially the same way or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of patentable embodiments.
In the description herein, references to the terms "one embodiment," "some embodiments," "an example," "a specific example," or "some examples" or the like mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present invention have been shown and described above, it should be understood that the above embodiments are exemplary and not to be construed as limiting the invention, and that those skilled in the art can make changes, modifications, substitutions and alterations to the above embodiments without departing from the spirit and scope of the invention.
Claims (10)
1. A block chain-based crowd sensing privacy protection incentive mechanism method is characterized by comprising the following steps:
step 1: designing and mathematically modeling a crowd sensing system based on a block chain, establishing a crowd sensing system structure comprising requesters, workers, the block chain and an incentive mechanism based on a reverse auction, and establishing mathematical models of the requesters, the workers, crowd sensing tasks, rewards and income of the workers;
step 2: designing a coverage function as an optimization target based on the characteristics of a position-related crowd sensing system, and constructing an optimization problem of the maximized coverage function under budget constraint;
and step 3: a crowd sensing privacy protection incentive mechanism framework is designed based on an intelligent contract technology of a block chain, and the framework comprises six stages: the method comprises a registration stage, a task delivery stage, a bidding stage, a worker recruitment stage, a data submission stage and a payment stage;
and 4, step 4: in the registration stage, a worker and a requester register on a block chain to obtain an identity certificate for authentication in subsequent operation, and elliptic curve cryptography is used as a public and private key system;
and 5: in the task delivery stage, the registered requester issues the crowd sensing task to the block chain by calling a task delivery contract;
step 6: in the bidding stage, workers who finish registration perform bidding operation by calling a bidding contract, in order to ensure privacy of bidding documents, the bidding documents are uploaded to a block chain in a manner promised by Pedersen, and in order to ensure anonymity of the workers, a ring signature method is adopted as an authentication mode;
and 7: in the worker recruitment stage, all workers participating in bidding need to disclose real bidding documents of the workers, the bidding documents disclose appointments to verify bidding information of the workers and exclude all workers with illegal information, information of the rest workers is used as input and sent to an incentive mechanism contract, the incentive mechanism contract is automatically executed in preset time, and obtained results are published;
and 8: in the data submitting stage, all winners need to encrypt own data and submit the encrypted data to an interplanetary file system, and encrypt the abstract and the storage address of the data and upload the encrypted data to a block chain through a data submitting contract;
and step 9: in the payout phase, the requester gives each winner a reward, which is calculated by the incentive mechanism.
2. The block chain-based crowd sensing privacy protection incentive scheme method according to claim 1, wherein in the step 1, the structure of the crowd sensing system is as follows:
the crowd sensing system comprises four roles of a requester, a worker, a block chain and an excitation mechanism; requesterIs the initiator of the perception task, the set of requestersIt is shown that the process of the present invention,for task set ofIt is shown that,Includeda perception task; workerIs the performer of the perception task and is used for the collection of workersIs shown to containAn individual worker; the block chain provides a safety platform for crowd sensing; the incentive mechanism is a program deployed on the blockchain with the goal of selecting workers and deciding on rewards to be given to the workers;
each workerSubmitting a triple labelWhereinIs a workerIn the position of (a) in the first,is that of the workerA set of tasks, including all the tasks it is willing to perform,is a workerIs offered byIndicating the workerThe true cost of the process is that of,the privacy is only known by the person;
given label fileThe goal of the incentive scheme is to select a set of winnersAnd determining a reward to be given to each winner, the reward of a winner being determined by its contribution to the missionRepresents an archive in whichIs given to workersReward of, if the workerIf it is home transfusion, then;
3. The block chain based crowd-sourcing privacy preserving incentive scheme method of claim 2, wherein in step 2, coverage functions are defined in consideration of location dependent crowd-sourcing awareness systemsThe following were used:
whereinIs a taskThe weight of (a), determined by the location importance and value of the task,is a taskIs collectedThe number of times the worker in (1) performs,is a system parameter controlling the decreasing gradient of the yield, usingAndrespectively representing tasksLocation importance and value, weight ofIs calculated by the formula
WhereinIs a balance parameter; the incentive scheme aims at a fixed budgetThe problem of maximizing the coverage function under budget constraints, formalized as
4. The block chain-based crowd sensing privacy protection incentive scheme method according to claim 3, wherein in the step 3, the crowd sensing privacy protection incentive scheme framework comprises six stages: the method comprises a registration stage, a task delivery stage, a bidding stage, a worker recruitment stage, a data submission stage and a payment stage; the operation of the client side realizes the interaction between a requester and a worker and the intelligent contract, the intelligent contract realizes request processing, function realization and data chaining, the intelligent contract interacts with the block chain to complete the data chaining process, and the processes form a crowd sensing privacy protection incentive mechanism framework.
5. The block chain based crowd-sourcing privacy preserving incentive scheme method of claim 4, wherein in step 4, the registration phase is as follows:
all requesters and workers need to register when joining the crowd sensing system for the first time, a pair of public keys and private keys is obtained, the system adopts elliptic curve cryptography as a key management scheme, and the system sets adopted elliptic curves in advancePrime orderAnd a common reference point on the curveAnd disclose the information, workerRandom selection of private keysSatisfy the following requirementsThen the corresponding public key isThe private key is stored by the worker, the public key is published, and the worker can obtain an identity mark during registrationRequesterThe registration process is the same.
6. The block chain based crowd-sourcing privacy preserving incentive scheme method of claim 5, wherein in step 5, the task delivery phase is as follows:
the registered requester can issue own tasks by calling a task delivery contract, the requester needs to attach a digital signature generated by using a private key of the requester and verify the digital signature by an intelligent contract, and after the tasks are issued, workers can check task information on a block chain and select interested tasks;
each perception task comprises a task name, a task position and a task description, the task position is divided according to a preset area and is represented by a number, and the perception task information is attached with an abstract to ensure that the perception task information is not tampered and the task requesterThe public key of the requester can be conveniently found by workers, and the requester can submit a budget after all tasks are deliveredIndicating the ability to pay that it can provide for recruiting workers.
7. The block chain based crowd-sourcing privacy preserving incentive scheme method of claim 6,
in step 6, the bidding stage is as follows:
registered workers can select own task sets according to own wishes and bid by calling bidding contracts, information in bidding, including position information, task sets and quotations, exist in a numerical mode and are hidden by using Pedersen commitments, and elliptic curves are given in advanceAnd two reference pointsAndand is andis unknown, for true values that need to be hiddenThe Pedersen commitment calculation formula isWhereinA blind factor that is randomly selected;
in addition to submitting the Pedersen commitment, the worker needs to attach a ring signature in the bidding step to anonymously verify the identity of the worker, and an elliptic curve is givenAnd a reference point,The public key of an individual worker is expressed as,Assume that the order parameter of the true signer is,The private key of the signer is expressed asBy usingA key image representing a signer, whereinIs the public key of the signer and,is a hash function satisfying the cryptographic security with a return value ofThe signature process at one point above is as follows:
by usingRepresenting messages to be signed, signers being all workersGenerating random factorsAnd random variablesWhereinIs thatThe order of the prime numbers of (a) to (b),is a modulus of integerThe remaining set ofIndicating the workerCorresponding to the public key, withIndicating the workerCorresponding to the key image, usingIndicating the workerThe signer carries out the following calculation on the hash value after the random factor combination;
whereinIs a returnA hash function of a value, and the signer then proceeds to perform the following calculations in succession
Finally the ring signature is represented asThe signer attaches the generated ring signature to complete the bidding process, in the process, all bidding information is hidden, the identity of the bidding worker is also anonymous, the intelligent contract needs to verify the ring signature, and the verification process is as follows:
the intelligent contract end performs the following calculation
If it is notThen ring signatureIs legitimate, in particular if two ring signatures possess duplicate key imagesThen the two ring signatures are said to be linked and their signers are the same worker, and for anonymous workers, a new one will be generated for the convenience of identificationAnd after the intelligent contract is verified, ending the bidding stage.
8. The block chain based crowd-sourcing privacy preserving incentive scheme method of claim 7, wherein in step 7, the worker recruitment phase is as follows:
all the workers participating in the bidding need to disclose own bidding truth values by calling bidding disclosure contracts, the intelligent bidding appointments are compared and verified with the Pedersen commitments submitted previously according to the truth values, and the commitments are verifiedAnd true value receivedCalculatingIf, ifIf the worker is committed to be legal, the intelligent contract excludes all the workers committed to be illegal, integrates the information of the rest workers and uses the informationRepresenting the final set of anonymous workersTo represent the final bidding document as such,andwill be sent to the incentive scheme contract as input;
the incentive mechanism is realized by intelligent contracts and can be triggered at a given time, the aim of the incentive mechanism is to solve the problem of maximizing a coverage function under the budget constraint, select workers and decide the reward given to a winner, and the specific steps are as follows:
S5: will be anonymous workerAdding to a set of winnersAnd giving anonymous workersIs remuneration ofWhereinJumping to S17 for budget;
S9: finding collectionsIn can makeMaximum value anonymous worker,Is shown inMiddle exclusion setSkipping to S7 for the residual sets after the medium elements;
s10: for winner setEach anonymous worker in (1)These workers, also called winners, perform steps S11-S16;
S12: finding collectionsIn can makeSecond anonymous worker with largest value,Representing workers with exclusion element anonymitySet of;
9. The block chain based crowd-sourcing privacy preserving incentive scheme method of claim 8, wherein in step 8, the data submission phase is as follows:
the winner needs to complete the task by submitting the collected perception data, use the interplanetary file system as a distributed storage system to reduce the storage burden on the blockchain, the winner first needs to share a security key with the requester, and the winner generates a one-time private keyCorresponding one-time public key isIf the one-time public key needs to be linked up and the one-time private key is owned by the winner, the shared security key is calculated according to the formulaThe key only having the winner himself and the private keyThe requester can be obtained by calculation, so that the safety is ensured;
the winner takes the Hash operation to the shared security key to obtain the final encryption keyEncrypting the submitted data by using the key, transmitting the encrypted content to an interplanetary file system to finish uploading the data, then the winner needs to encrypt the hash value and the storage address of the submitted data by using the encryption key and upload the encrypted hash value and the storage address to a block chain through a data submission contract, and the requester calculates the encryption keyAnd decrypting the encrypted hash value and the storage address, and acquiring the data information submitted by the winner at the interplanetary file system, wherein the data integrity and the non-falsification are ensured by the data hash value.
10. The block chain based crowd-sourcing privacy preserving incentive scheme method of claim 9, wherein in step 9, the payment phase is as follows:
after confirming the reception of the perception data submitted by the winner, the requester gives a certain amount of payment to the winner according to the reward result calculated by the previous incentive mechanism, and the whole crowd sensing process is completed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310114476.7A CN115828311B (en) | 2023-02-15 | 2023-02-15 | Block chain-based crowd sensing privacy protection incentive mechanism method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310114476.7A CN115828311B (en) | 2023-02-15 | 2023-02-15 | Block chain-based crowd sensing privacy protection incentive mechanism method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115828311A true CN115828311A (en) | 2023-03-21 |
CN115828311B CN115828311B (en) | 2023-06-06 |
Family
ID=85521438
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310114476.7A Active CN115828311B (en) | 2023-02-15 | 2023-02-15 | Block chain-based crowd sensing privacy protection incentive mechanism method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115828311B (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110493182A (en) * | 2019-07-05 | 2019-11-22 | 北京邮电大学 | Intelligent perception worker selection mechanism and system based on block chain location privacy protection |
CN111262708A (en) * | 2020-01-16 | 2020-06-09 | 安徽大学 | Crowd sensing method based on block chain |
CN111626563A (en) * | 2020-04-27 | 2020-09-04 | 南京邮电大学 | Dual-target robust mobile crowd sensing system and excitation method thereof |
CN113079486A (en) * | 2021-04-08 | 2021-07-06 | 青岛科技大学 | Vehicle networking crowd sensing and incentive method with privacy protection characteristic based on block chain |
CN113452681A (en) * | 2021-06-09 | 2021-09-28 | 青岛科技大学 | Internet of vehicles crowd sensing reputation management system and method based on block chain |
CN114386043A (en) * | 2021-12-09 | 2022-04-22 | 北京理工大学 | Method for evaluating depocenter privacy keeping credit facing crowd sensing |
CN114760067A (en) * | 2022-03-30 | 2022-07-15 | 西安电子科技大学 | Block chain group intelligent perception system privacy security protection method using zero knowledge certification |
CN115099535A (en) * | 2022-08-24 | 2022-09-23 | 东南大学 | Dual-target crowd-sourcing perception incentive mechanism method |
-
2023
- 2023-02-15 CN CN202310114476.7A patent/CN115828311B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110493182A (en) * | 2019-07-05 | 2019-11-22 | 北京邮电大学 | Intelligent perception worker selection mechanism and system based on block chain location privacy protection |
CN111262708A (en) * | 2020-01-16 | 2020-06-09 | 安徽大学 | Crowd sensing method based on block chain |
CN111626563A (en) * | 2020-04-27 | 2020-09-04 | 南京邮电大学 | Dual-target robust mobile crowd sensing system and excitation method thereof |
CN113079486A (en) * | 2021-04-08 | 2021-07-06 | 青岛科技大学 | Vehicle networking crowd sensing and incentive method with privacy protection characteristic based on block chain |
CN113452681A (en) * | 2021-06-09 | 2021-09-28 | 青岛科技大学 | Internet of vehicles crowd sensing reputation management system and method based on block chain |
CN114386043A (en) * | 2021-12-09 | 2022-04-22 | 北京理工大学 | Method for evaluating depocenter privacy keeping credit facing crowd sensing |
CN114760067A (en) * | 2022-03-30 | 2022-07-15 | 西安电子科技大学 | Block chain group intelligent perception system privacy security protection method using zero knowledge certification |
CN115099535A (en) * | 2022-08-24 | 2022-09-23 | 东南大学 | Dual-target crowd-sourcing perception incentive mechanism method |
Non-Patent Citations (2)
Title |
---|
安宝怡: ""开放系统环境下的可信移动群智感知数据交易机制研究"" * |
王群等: ""区块链隐私保护机制研究"" * |
Also Published As
Publication number | Publication date |
---|---|
CN115828311B (en) | 2023-06-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20210281425A1 (en) | Secure exchange of cryptographically signed records | |
JP7395701B2 (en) | Computer-implemented systems and methods for transaction mixing on a blockchain | |
Jin et al. | Inception: Incentivizing privacy-preserving data aggregation for mobile crowd sensing systems | |
Toyoda et al. | Blockchain-enabled federated learning with mechanism design | |
US11625694B2 (en) | Blockchain-based exchange with tokenisation | |
CN113079486B (en) | Vehicle networking crowd sensing and incentive method with privacy protection characteristic based on block chain | |
CN109791671A (en) | Method and system for realizing block chain | |
Du et al. | Blockchain-aided edge computing market: Smart contract and consensus mechanisms | |
US12033136B2 (en) | Methods and systems for transferring unspent transaction output (UTXO) tokens in a blockchain network | |
CN111177778A (en) | Mobile crowd sensing method, system, server and storage medium | |
US20190386986A1 (en) | System and method for automated vehicle authentication | |
JP2023145662A (en) | Computer-implemented methods and systems for controlling tasks implemented by cyclically-ordered set of nodes participating in blockchain network | |
Song et al. | Unveiling Decentralization: A Comprehensive Review of Technologies, Comparison, Challenges in Bitcoin, Ethereum, and Solana Blockchain | |
Vasukidevi et al. | BBSSE: Blockchain-based safe storage, secure sharing and energy scheme for smart grid network | |
CN115828311B (en) | Block chain-based crowd sensing privacy protection incentive mechanism method | |
Yu et al. | A double auction mechanism for virtual power plants based on blockchain sharding consensus and privacy preservation | |
Li et al. | A fair, verifiable and privacy-protecting data outsourcing transaction scheme based on smart contracts | |
CN113674072A (en) | Enterprise financial management risk identification method based on financial big data | |
CN112488481A (en) | Service provider determining method and device based on alliance chain | |
Sarfaraz | Blockchain-Coordinated Frameworks for Scalable and Secure Supply Chain Networks | |
US12126735B2 (en) | Secure exchange of cryptographically signed records | |
US20230208646A1 (en) | System and exchange for managing rights of publicity | |
US20230005059A1 (en) | System and exchange for managing rights of publicity | |
US20240249275A1 (en) | Group signatures for a smart wallet on a blockchain platform | |
CN113298629B (en) | Data sharing method based on two-way auction theory and intelligent contract |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |