CN115828311B - Block chain-based crowd sensing privacy protection incentive mechanism method - Google Patents
Block chain-based crowd sensing privacy protection incentive mechanism method Download PDFInfo
- Publication number
- CN115828311B CN115828311B CN202310114476.7A CN202310114476A CN115828311B CN 115828311 B CN115828311 B CN 115828311B CN 202310114476 A CN202310114476 A CN 202310114476A CN 115828311 B CN115828311 B CN 115828311B
- Authority
- CN
- China
- Prior art keywords
- worker
- workers
- task
- bidding
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Abstract
The invention discloses a block chain-based crowd sensing privacy protection excitation mechanism method, which can effectively stimulate workers to participate in crowd sensing tasks under given cost constraint, maximize coverage functions and ensure the privacy of users; the block chain-based crowd sensing system provided by the invention can realize decentralization and ensure privacy and safety; the excitation mechanism method provided by the invention can maximize the coverage function under the given budget, and carry out the user recruitment process and the reward calculation process; the invention designs a specific protocol based on the intelligent contract of the block chain, and can be suitable for most block chain systems; the incentive mechanism provided by the invention has the advantages of calculation effectiveness, individuality, authenticity, approximation degree and privacy protection, and can obtain higher coverage, lower payment and more complete security than the similar algorithm, including authorization authentication, user anonymity and user data privacy.
Description
Technical Field
The invention relates to the field of Internet of things application, approximation algorithm and distributed systems, in particular to a block chain-based crowd sensing privacy protection incentive mechanism method.
Background
Crowd sensing is a data collection mode combining sensing capability and crowd sourcing of mobile equipment, and can collect large-scale sensing data by means of the strength of a general user; crowd sensing is now widely used in a number of fields including traffic monitoring, environmental detection, medical protection, location-based services, etc.; crowd sensing has the characteristics of high extensibility and low professional requirements.
The traditional crowd sensing system is too dependent on a centralized server and has the problem of single-point failure, so that the robustness of the crowd sensing system is lost; therefore, the block chain technology is introduced to replace the traditional server, so that a decentralised crowd sensing system is realized, and the safety of the crowd sensing system is improved; at present, most of block chains support intelligent contract technology, and intelligent contracts can realize the protocol functions set by a system, automatically and reliably execute given tasks, and are suitable for realizing specific interactions in a crowd sensing flow.
The main problem of limiting crowd sensing is insufficient participation and unstable data quality, so that it is important to design an effective excitation mechanism for the crowd sensing system to improve the participation; the goal of the incentive mechanism is to select the appropriate crowd-sourced participants and pay rewards in the form of rewards based on their contributions; the mainstream design concept is to set an optimization target, for example, to maximize the profit of the crowd sensing platform, and accordingly select the appropriate crowd sensing participants and decide to pay them.
The current blockchain-based incentive scheme design has the following problems: part of the work designs various incentive mechanisms, but omits how to realize the mechanisms in the blockchain through intelligent contracts, so that the work has no universality; some works are mainly optimizing the income of entities when designing the optimization scene, but neglecting the importance of the data quality factors in crowd sensing; most of the work considers that the blockchain and the intelligent contract have high security, but in practice, due to the openness of the blockchain and the transparency of the intelligent contract, privacy leakage is easily caused by the operation of an incentive mechanism, and the participation enthusiasm of users is restrained.
Disclosure of Invention
Aiming at the problems, the invention designs a block chain-based crowd sensing privacy protection excitation mechanism method, which can effectively stimulate workers to participate in crowd sensing tasks under given cost constraint, maximize coverage functions and ensure the privacy of users; the block chain-based crowd sensing system provided by the invention can realize decentralization and ensure privacy and safety; the incentive mechanism method provided by the invention comprises a user recruitment process and a reward calculation process; the invention designs a specific protocol based on intelligent contracts of the block chain according to the steps of crowd sensing, and can be suitable for most block chain systems; the incentive mechanism method provided by the invention has the advantages of calculation effectiveness, individuality, authenticity, approximation degree and privacy protection, and can obtain higher coverage, lower payment and more complete security than the similar algorithm, including authorization authentication, user anonymity and user data privacy.
The technical scheme of the invention is as follows:
the block chain-based crowd sensing privacy protection incentive mechanism method is characterized by comprising the following steps of:
step 1: designing and mathematical modeling is carried out on a block chain-based crowd sensing system, a crowd sensing system structure comprising a requester, workers, block chains and an excitation mechanism is built based on reverse auction, and mathematical models of the requester, workers, crowd sensing tasks, rewards and benefits of the workers are built;
step 2: based on the characteristics of the position-related crowd sensing system, designing a coverage function as an optimization target, and constructing an optimization problem of maximizing the coverage function under budget constraint;
step 3: the intelligent contract technology based on the block chain designs a group intelligent perception privacy protection incentive mechanism framework, which comprises six stages: a registration phase, a task delivery phase, a bidding phase, a worker recruitment phase, a data submission phase, and a payment phase;
step 4: in the registration stage, workers and requesters register on the blockchain to acquire identity certificates for authentication in subsequent operation, and elliptic curve cryptography is used as a public and private key system;
step 5: in the task delivery stage, the registered requester issues the crowd sensing task to the blockchain by calling a task delivery contract;
Step 6: in the bidding stage, the registered workers perform bidding operations by calling bidding contracts, in order to ensure the privacy of bidding books, the bidding books are uploaded to a blockchain in the form of Pedersen promise, and in order to ensure the anonymity of the workers, a ring signature method is adopted as an authentication mode;
step 7: in the recruitment stage of workers, all workers participating in bidding need to disclose own real bidding books, the bidding books disclose that the bidding information of the workers is verified by the closing date, all workers with illegal information are eliminated, the information of the rest workers is input into an incentive mechanism contract, the incentive mechanism contract is automatically executed at preset time, and the obtained result is published;
step 8: in the data submitting stage, all winners need to encrypt the data of the winners and submit the encrypted data to an interstellar file system, and the abstract and the storage address of the data are uploaded to a blockchain through a data submitting contract;
step 9: during the payoff phase, the requester gives each winner a consideration that is calculated by the incentive mechanism.
Further, in the step 1, the crowd sensing system has the following structure:
the crowd sensing system comprises four roles of a requester, a worker, a blockchain and an incentive mechanism; requester (E) Is the initiator of the perception task, the requestor is gathered with +.>Indicating (I)>Task set usefulness->Indicating (I)>Comprises->A plurality of perception tasks; worker->Is the executor of the perception task, and the worker is integrated with +.>Indicating that it contains->A worker; the block chain provides a security platform for crowd sensing; the incentive mechanism is a program deployed on the blockchain with the goal of selecting workers and deciding to pay the workers;
each workerSubmitting a triplet tagbook +.>Wherein->Is worker->Is (are) located>Is the task set of the worker, including all tasks that he is willing to perform, < >>Is worker->For quotations of>Indicating worker->Is>Is private and known only by the inventor;
given bidding documentThe goal of the incentive mechanism is to select a set of winners +.>And decides to give each winner a reward whose size depends on its contribution to the task, with +.>Representing files, wherein->Is to give workers +.>If the worker is ++>Is a delivery house, then->;
Further, in the step 2, an overlay function is defined in consideration of the location-dependent crowd sensing systemThe following are provided: / >
Wherein the method comprises the steps ofIs task->Is determined by the importance and value of the task's position, +.>Is task->Is assembled->The number of times of worker's execution, +.>Is a system parameter controlling the decreasing gradient of benefit, by +.>And->Respectively represent task->Position importance and value of (2), weight +.>The calculation formula is that
Wherein the method comprises the steps ofIs a balance parameter; the goal of the incentive mechanism is to have a fixed budget +.>Under maximizing coverage function, a problem called maximizing coverage function under budget constraint, formalized as
Further, in the step 3, the crowd sensing privacy protection incentive mechanism framework includes six stages: a registration phase, a task delivery phase, a bidding phase, a worker recruitment phase, a data submission phase, and a payment phase; the operation of the client side realizes the interaction between a requester and a worker and the intelligent contract, the intelligent contract realizes the request processing, the function realization and the data uplink, the intelligent contract interacts with the blockchain to complete the data uplink process, and the process forms a group intelligent perception privacy protection incentive mechanism framework.
Further, in the step 4, the registration stage is as follows:
all requesters and workers need to register when joining the crowd sensing system for the first time, and acquire a pair of public key and private key, the system adopts elliptic curve cryptography as a key management scheme, and the system sets the adopted elliptic curve in advance Prime order->And a common datum point on the curve->And discloses these information, workman +.>Randomly selecting private key +.>Satisfy->The corresponding public key is +.>The private key is stored by the worker himself, the public key is disclosed, and the worker can acquire an identity mark during registration>Requester->The registration procedure is the same.
Further, in the step 5, the task delivery stage is as follows:
the registered requester can issue own tasks by calling task delivery contracts, the requester needs to attach a digital signature generated by using own private keys and verify the digital signature by using intelligent contracts, and after the tasks are issued, workers can check task information on a blockchain and select interested tasks;
each perception task comprises a task name, a task position and a task description, the task position is divided according to a pre-determined area and is represented by a number, and the perception task information is attached with a abstract so as to ensure that the perception task is not tampered with and a task requesterIt will also be disclosed that the worker can find the public key of the requester later, and after delivering all the tasks, the requester will also submit a budgetIndicating the payability it can offer to recruit workers.
Further, in the step 6, the bidding phase is as follows:
The registered worker can select the task set according to his own will, bid by calling a bidding contract, the information in the bidding including position information, task set and quotation are all present in a numerical mode, and hidden by using Pedersen promise, giving an elliptic curve in advanceAnd two datum points->And->And->Unknown, true value for the need to be hidden +.>The Pedersen promise calculation formula is +.>Wherein->Blind factors selected randomly; />
In addition to submitting the petersen commitment, the worker needs to attach a ring signature to anonymously verify his identity, giving an elliptic curve, during the bidding stepAnd datum point->,/>The public key of the individual worker is denoted +.>,/>It is assumed that the order parameter of the real signer is +.>,/>The private key of the signer is denoted +.>Use->A key image representing a signer, wherein +.>Is the public key of the signer,/->Is a hash function satisfying cryptographic security, its return value is +.>At the last point, the signature process is as follows:
by usingRepresenting a message to be signed, the signer being all workers +.>Generating a randomization factor->And random variable->Wherein->Is->Prime order of->Is an integer modulo +.>The remaining set of >Indicating worker->Corresponding to the public key with +.>Indicating worker->Corresponding to the key image with +.>Indicating worker->The signer performs the following calculation on the hash value after the random factors of the random factors are combined;
wherein the method comprises the steps ofIs a return +.>The signer then continues to perform the following calculations as a hash function of a certain value in (a)
The final ring signature is denoted asThe signer attaches the generated ring signature to complete the bidding process, in which all bidding information is hidden, and the bidding worker identity is anonymous, the intelligent contract needs to verify the ring signature, and the verification process is as follows:
the intelligent contract end performs the following calculation
If it isThen the ring signature +.>Is legal, in particular if two ring signatures have duplicate key images +.>Then the two ring signatures are said to be linked and their signers are the same worker, for convenience of identification, a new +.>After the intelligent contract is verified, the bidding phase is ended.
Further, in the step 7, the worker recruiting stage is as follows:
all the workers participating in bidding need to reveal the true value of their own bidding by calling the bidding disclosure contract, and the intelligent closing date is compared and verified with the previously submitted Pedersen promise according to the true value, and for promise And received true value->Calculate->If->Then the promise is legal, the intelligent contract excludes all promise illegal workers, and the information of the rest workers is integrated, and the intelligent contract is used for +.>Representing the final anonymous set of workers with +.>Representing the final tagbook document,/->And->Will be sent to the incentive mechanism contract as input;
the incentive mechanism is realized through intelligent contracts, can be triggered at a given time, and aims to solve the problem of maximizing coverage functions under budget constraint, select workers and decide to give a return to winners, and the specific steps are as follows:
s1: initializing a set of winnersInitializing the reward set +.>Initializing a set of screening workers;
S5: will anonymize workersAdd to the winner set->And give anonymity workers +.>The reward of (2) is->Wherein->For budget, jump to S17;
S9: finding collectionsCan make->Anonymous worker with the greatest value->,/>Is indicated at->Middle exclusion set +.>The rest set after the middle element jumps to S7;
s10: for a set of winnersEach anonymous worker in->These workers, also called winners, perform steps S11-S16;
S12: finding collectionsCan make->Second anonymous worker with maximum value +.>,/>Representing exclusion element anonymity worker +>Posterior Collection->;
After the result is obtained by the contract calculation of the incentive mechanism, the result is published on the blockchain, and workers can anonymize through themselvesConfirm whether itself is selected as the winner.
Further, in the step 8, the data submitting stage is as follows:
the winner needs to go through the carryingThe collected perceived data is submitted to a task using the interstellar file system as a distributed storage system to ease the storage burden on the blockchain, the winner first needs to share a secure key with the requester, and the winner generates a one-time private key The corresponding disposable public key is +.>The one-time public key needs to be uplink, the one-time private key is owned by the winner, and the shared secure key calculation formula is +.>The key has only the winner himself and has the private key +.>The requester of the (E) can be obtained through calculation, so that the safety is ensured;
the winner hashes the shared secure key to obtain a final encryption keyEncrypting the submitted data by using the key, transferring the encrypted content to an interstellar file system to finish uploading the data, and then uploading the hash value and the storage address of the submitted data to a blockchain by a winner through a data submitting contract after encrypting the hash value and the storage address of the submitted data by using the encryption key, wherein a requester calculates the encryption key->Decrypting the encrypted hash value and the storage address, and obtaining data information submitted by a winner in an interstellar file system, wherein the hash value of the data ensures the integrity and the non-tamper property of the data.
Further, in the step 9, the payment phase is as follows:
after confirming the receiving of the perception data submitted by the winner, the requester gives a certain amount of payment to the winner according to the reward result calculated by the previous incentive mechanism, and the whole crowd sensing process is completed.
The beneficial effects of the invention are as follows:
the block chain-based crowd sensing privacy protection excitation mechanism method provided by the invention can effectively stimulate workers to participate in crowd sensing tasks, and solves the problem of insufficient crowd sensing participation; the block chain-based crowd sensing system provided by the invention does not need a centralized server, and can realize decentralization, privacy and safety; the excitation mechanism method provided by the invention can maximize the coverage function under a given budget and acquire the calculation effectiveness, individuality, authenticity and approximation degree; the excitation mechanism method provided by the invention is designed based on the intelligent contract of the blockchain, has completeness and feasibility, can be suitable for most blockchain systems, and ensures the privacy of users; compared with the similar algorithm, the incentive mechanism provided by the invention can achieve higher coverage, lower payment and more complete security, including authorization authentication, user anonymity and user data privacy.
Drawings
FIG. 1 is a flow chart of a block chain-based crowd sensing privacy protection incentive mechanism method;
FIG. 2 is a flow diagram of an incentive mechanism algorithm;
FIG. 3 (a) is a graph of test results of time consumption of registration, task delivery, incentive, and chain execution of payment steps in the privacy preserving incentive scheme method;
FIG. 3 (b) is a graph of test results of time consumption of execution on a chain of bidding, bidding disclosure, data submission steps in the privacy preserving incentive mechanism method;
FIG. 4 (a) is a graph of test results of execution time of registration, task delivery, payment steps in the privacy preserving incentive mechanism method;
FIG. 4 (b) is a graph of test results of execution time of bidding, worker recruitment, data submission steps in the privacy preserving incentive mechanism method;
FIG. 5 (a) is a graph of comparison of the optimized target values obtained by the privacy preserving incentive scheme method with the number of workers;
FIG. 5 (b) is a graph of the comparison of payments required by the privacy preserving incentive mechanism method as a function of the number of workers;
FIG. 6 (a) is a graph of comparison of the variation of the optimization target value with the budget obtained by the privacy preserving incentive mechanism method;
fig. 6 (b) is a graph of the comparison of the payment required by the privacy preserving incentive mechanism method as a function of budget.
Detailed Description
The technical scheme and effect of the present invention will be described in detail below with reference to the accompanying drawings. A simulation result compared with the similar excitation mechanism method is also provided as an example, but this example is only for the purpose of explaining the present invention and is not to be construed as a limitation of the present invention.
Example 1: as shown in fig. 1, a block chain-based crowd-sourced privacy-preserving incentive mechanism method includes the following steps:
step 1: designing and mathematical modeling is carried out on a block chain-based crowd sensing system, a crowd sensing system structure comprising a requester, workers, block chains and an excitation mechanism is built based on reverse auction, and mathematical models of the requester, workers, crowd sensing tasks, rewards and benefits of the workers are built;
step 2: based on the characteristics of the position-related crowd sensing system, designing a coverage function as an optimization target, and constructing an optimization problem of maximizing the coverage function under budget constraint;
step 3: the intelligent contract technology based on the block chain designs a group intelligent perception privacy protection incentive mechanism framework, which comprises six stages: a registration phase, a task delivery phase, a bidding phase, a worker recruitment phase, a data submission phase, and a payment phase;
step 4: in the registration stage, workers and requesters register on the blockchain to acquire identity certificates for authentication in subsequent operation, and elliptic curve cryptography is used as a public and private key system;
step 5: in the task delivery stage, the registered requester issues the crowd sensing task to the blockchain by calling a task delivery contract;
Step 6: in the bidding stage, the registered workers perform bidding operations by calling bidding contracts, in order to ensure the privacy of bidding books, the bidding books are uploaded to a blockchain in the form of Pedersen promise, and in order to ensure the anonymity of the workers, a ring signature method is adopted as an authentication mode;
step 7: in the recruitment stage of workers, all workers participating in bidding need to disclose own real bidding books, the bidding books disclose that the bidding information of the workers is verified by the closing date, all workers with illegal information are eliminated, the information of the rest workers is input into an incentive mechanism contract, the incentive mechanism contract is automatically executed at preset time, and the obtained result is published;
step 8: in the data submitting stage, all winners need to encrypt the data of the winners and submit the encrypted data to an interstellar file system, and the abstract and the storage address of the data are uploaded to a blockchain through a data submitting contract;
step 9: during the payoff phase, the requester gives each winner a consideration that is calculated by the incentive mechanism.
Further, in the step 1, the crowd sensing system has the following structure:
the crowd sensing system comprises four roles of a requester, a worker, a blockchain and an incentive mechanism; requester (E) Is the initiator of the perception task, the requestor is gathered with +.>Indicating (I)>Task set usefulness->Indicating (I)>Comprises->A plurality of perception tasks; worker->Is the executor of the perception task, and the worker is integrated with +.>Indicating that it contains->A worker; the block chain provides a security platform for crowd sensing; the incentive mechanism is a program deployed on the blockchain with the goal of selecting workers and deciding to pay the workers;
each workerSubmitting a triplet tagbook +.>Wherein->Is worker->Is (are) located>Is the task set of the worker, including all tasks that he is willing to perform, < >>Is worker->For quotations of>Indicating worker->Is>Is private and known only by the inventor;
given bidding documentThe goal of the incentive mechanism is to select a set of winners +.>And decides to give each winner a reward whose size depends on its contribution to the task, with +.>Representing files, wherein->Is to give workers +.>If the worker is ++>Is a delivery house, then->;
Further, in the step 2, an overlay function is defined in consideration of the location-dependent crowd sensing systemThe following are provided:
Wherein the method comprises the steps ofIs task->Is determined by the importance and value of the task's position, +.>Is task->Is assembled->The number of times of worker's execution, +.>Is a system parameter controlling the decreasing gradient of benefit, by +.>And->Respectively represent task->Position importance and value of (2), weight +.>The calculation formula is that
Wherein the method comprises the steps ofIs a balance parameter; the goal of the incentive mechanism is to have a fixed budget +.>The lower maximizing coverage function, the problem called maximizing coverage function under budget constraint, is formalized as +.>
Further, in the step 3, the crowd sensing privacy protection incentive mechanism framework includes six stages: a registration phase, a task delivery phase, a bidding phase, a worker recruitment phase, a data submission phase, and a payment phase; the operation of the client side realizes the interaction between a requester and a worker and the intelligent contract, the intelligent contract realizes the request processing, the function realization and the data uplink, the intelligent contract interacts with the blockchain to complete the data uplink process, and the process forms a group intelligent perception privacy protection incentive mechanism framework.
Further, in the step 4, the registration stage is as follows:
all requesters and workers need to register when joining the crowd sensing system for the first time, and acquire a pair of public key and private key, the system adopts elliptic curve cryptography as a key management scheme, and the system sets the adopted elliptic curve in advance Prime order->And a common datum point on the curve->And discloses these information, workman +.>Randomly selecting private key +.>Satisfy->Corresponding maleKey of +.>The private key is stored by the worker himself, the public key is disclosed, and the worker can acquire an identity mark during registration>Requester->The registration procedure is the same.
Further, in the step 5, the task delivery stage is as follows:
the registered requester can issue own tasks by calling task delivery contracts, the requester needs to attach a digital signature generated by using own private keys and verify the digital signature by using intelligent contracts, and after the tasks are issued, workers can check task information on a blockchain and select interested tasks;
each perceived task comprises a task name, a task position and a task description, in particular, the task position is divided according to a predetermined area and is represented by a number, and perceived task information is attached with a abstract to ensure that the perceived task information is not tampered with and a task requesterIt will also be disclosed that the worker can find the public key of the requester later, and after delivering all tasks, the requester will also submit a budget +.>Indicating the payability it can offer to recruit workers.
Further, in the step 6, the bidding phase is as follows: the registered worker can select the task set according to his own will, bid by calling a bidding contract, the information in the bidding including position information, task set and quotation are all present in a numerical mode, and hidden by using Pedersen promise, giving an elliptic curve in advanceAnd two datum points->And->And->Unknown, true value for the need to be hidden +.>The Pedersen promise calculation formula isWherein->Blind factors selected randomly;
in addition to submitting the petersen commitment, the worker needs to attach a ring signature to anonymously verify his identity, giving an elliptic curve, during the bidding stepAnd datum point->,/>The public key of the individual worker is denoted +.>,/>It is assumed that the order parameter of the real signer is +.>,/>The private key of the signer is expressed as/>Use->A key image representing a signer, wherein +.>Is the public key of the signer,/->Is a hash function satisfying cryptographic security, its return value is +.>At the last point, the signature process is as follows:
by usingRepresenting a message to be signed, the signer being all workers +.>Generating a randomization factor->And random variable->Wherein- >Is->Prime order of->Is an integer modulo +.>The remaining set of>Indicating worker->Corresponding to the public key with +.>Indicating worker->Corresponding to the key image with +.>Indicating worker->The signer performs the following calculation on the hash value after the random factors of the random factors are combined;
wherein the method comprises the steps ofIs a return +.>The signer then continues to perform the following calculations as a hash function of a certain value in (a)
The final ring signature is denoted asThe signer attaches the generated ring signature to complete the bidding process, in which all bidding information is hidden, and the bidding worker identity is anonymous, the intelligent contract needs to verify the ring signature, and the verification process is as follows:
the intelligent contract end performs the following calculation
If it isThen the ring signature +.>Is legal, in particular if two ring signatures have duplicate key images +.>Then the two ring signatures are said to be linked and their signers are the same worker, for convenience of identification, a new +.>After the intelligent contract is verified, the bidding phase is ended.
Further, in the step 7, the worker recruiting stage is as follows:
All the workers participating in bidding need to reveal the true value of their own bidding by calling the bidding disclosure contract, and the intelligent closing date is compared and verified with the previously submitted Pedersen promise according to the true value, and for promiseAnd received true value->Calculate->If->Then the promise is legal, the intelligent contract excludes all promise illegal workers, and the information of the rest workers is integrated, and the intelligent contract is used for +.>Representing the final anonymous set of workers with +.>Representing the final tagbook document,/->And->Will be sent to the incentive mechanism contract as input;
the incentive mechanism is implemented by intelligent contracts, can be triggered at a given time, and aims to solve the problem of maximizing coverage functions under budget constraints, select workers and decide to give a return to winners, as shown in fig. 2, the specific steps of the incentive mechanism are as follows:
s1: initializing a set of winnersInitializing the reward set +.>Initializing a set of screening workers;
S5: will anonymize workersAdd to the winner set- >And give anonymity workers +.>The reward of (2) is->Wherein->For budget, jump to S17;
S9: finding collectionsCan make->Anonymous worker with the greatest value->,/>Is indicated at->Middle exclusion set +.>The rest set after the middle element jumps to S7;
s10: for a set of winnersEach anonymous worker in->These workers, also called winners, perform steps S11-S16;
S12: finding collectionsCan make->Second anonymous worker with maximum value +.>,/>Representing exclusion element anonymity worker +>Posterior Collection->;
After the result is obtained by the contract calculation of the incentive mechanism, the result is published on the blockchain, and workers can anonymize through themselvesConfirm whether itself is selected as the winner.
Further, in the step 8, the data submitting stage is as follows:
winners need to complete tasks by submitting collected perceived data, use the interstellar file system as a distributed storage system to ease storage burden on the blockchain, the winner first needs to share a secure key with the requester, and the winner generates a one-time private keyThe corresponding disposable public key is +.>The one-time public key needs to be uplink, the one-time private key is owned by the winner, and the shared secure key calculation formula is +.>The key has only the winner himself and has the private key +.>The requester of the (E) can be obtained through calculation, so that the safety is ensured;
the winner hashes the shared secure key to obtain a final encryption keyAnd uses the key to pair the submitted numberEncrypting the data, transmitting the encrypted content to an interstellar file system to finish uploading the data, encrypting the hash value and the storage address of the submitted data by using an encryption key, uploading the encrypted hash value and the storage address to a blockchain through a data submitting contract, and calculating the encryption key by a requester>Decrypting the encrypted hash value and the storage address, and obtaining data information submitted by a winner in an interstellar file system, wherein the hash value of the data ensures the integrity and the non-tamper property of the data.
Further, in the step 9, the payment phase is as follows:
after confirming the receiving of the perception data submitted by the winner, the requester gives a certain amount of payment to the winner according to the reward result calculated by the previous incentive mechanism, and the whole crowd sensing process is completed.
The following is the simulation experiment result:
the crowd sensing privacy protection incentive mechanism method based on the blockchain is compared with an SPPIM method in Towards a smartprivacy-preserving incentive mechanism for vehicular crowd sensing published by Wang et al in Security and Communication Networks and a CrowdBC method in A blockchain-based decentralized framework for crowdsourcing published by Li et al in IEEE Transactions on Parallel and Distributed Systems in 2018 in performance.
All simulation experiments are carried out on one Ubuntu virtual machine, the memory is 50GB, the CPU of the host is i9-7900X 3.30GHz, and the memory is 128GB. Experiments were deployed on a Hyperledger Fabric v2.3 platform, with each test being an average of 5 results.
In the cryptography method, ed25519 is selected as a public key signature scheme, SHA-512 is selected as a hash function, AES-256 is selected as a symmetric encryption algorithm, and the same cryptography scheme is adopted in the comparison algorithm in order to ensure the fairness of comparison. For the excitation mechanism, the criteria are set as follows: number of workers 100, task number->20, the size of the worker task set is from [5,10]Random selection of specific tasks, system parameters->Set to 0.8 and the budget set to 100,000. The offers are randomly selected from the dataset and are all in the range 100,500]Is a kind of medium.
As shown in fig. 3 (a) and 3 (b), the time consumption of the privacy-preserving incentive mechanism method on the chain is tested, it can be seen that the average time of each transaction increases with the number of transactions, and the amount of increase of other contracts except the incentive mechanism contract (IM) is small, and considering the computational complexity of the incentive mechanism algorithm, such increase is normal, and in practical application, there is generally no such number of concurrent requests, and thus no excessive processing time is caused. According to the result of time consumption, fig. 3 is divided into two sub-graphs according to different measurement sizes, it can be seen that the time consumption of registering contracts, task delivery contracts, incentive mechanism contracts and payment contracts is less, while the time consumption of bidding contracts, bidding exposing contracts and data submitting contracts is greater, because the verification process in the ring signature scheme is time consuming, but considering anonymity that can be brought by the ring signature, such time consumption is worth, and the time consumption of all contracts is not more than 330ms, which is suitable for practical application.
As shown in fig. 4 (a), 4 (b), the step execution time of the privacy preserving incentive mechanism method was tested, and the step execution included the client operation under the chain and the smart contract operation on the chain. It can be seen that the registration, task delivery and payment steps are accomplished in a short time, while the bidding, worker recruitment and data submission steps are time consuming. In practice, the time taken to generate the ring signature is about as much as the time taken to verify the ring signature, resulting in a larger time taken for the bidding and data submission steps. The worker recruitment step includes a tagbook exposure and incentive mechanism process, and thus time consumption is also large. As the number of requests increases, the average time cost increases slightly and the rate of increase of the worker recruitment step is greatest.
As shown in table 1, the privacy-preserving incentive mechanism method was tested against the step execution time of the same class of algorithms in milliseconds, N/a indicating that the scheme did not involve the design of the step. It can be seen that the proposed solution of the present invention has a time advantage over the other two solutions in the registration step and the task delivery step. In the worker recruiting step and the data submitting step, the scheme of the invention consumes longer time due to the use of the ring signature, but the scheme also achieves anonymity. The payment step performs a few schemes quite different.
Defining an incentive scheme evaluation index overdrinking rate, the calculation of which is obtained by dividing the total cost by the total cost, i.e。
As shown in fig. 5 (a) and 5 (b), the performance of the privacy preserving incentive scheme method was tested to change with the number of workers, and it can be seen that the proposed scheme is much larger than the coverage function achieved by SPPIM, because the incentive scheme adopted in the scheme selects winners according to the contribution of workers, the coverage function achieved by the scheme is 35.8% higher than SPPIM under standard setting, and the number of users recruited by the scheme is also much higher than SPPIM, which is mainly related to payment strategy. The total payment spent by the scheme is also much smaller than SPPIM, and a lower overdry rate is achieved, indicating the high efficiency of the payment scheme. As the number of workers increases, both the coverage function and the number of workers available to the solution increases, as the mechanism is able to select more valuable workers as more workers become available. Thus, the total payment and overstock rate also decrease slightly as the number of workers increases.
As shown in fig. 6 (a) and 6 (b), the performance of privacy-preserving incentive mechanism methods was tested for changes with budget, and as the budget increases, the number of workers recruited by all mechanisms increases, and thus the coverage function achieved increases. As the budget increases, more users need to be recruited, and thus the overall rewards and overpayment rate increase at the same time.
It should be noted that any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and that scope of preferred embodiments of the present invention includes additional implementations in which functions may be executed out of order from that shown or discussed, including in substantially the same way or in reverse order from that shown or discussed, depending on the functionality involved, as would be understood by those skilled in the art of the embodiments of the patent.
In the description of the present specification, the descriptions of the terms "one embodiment," "some embodiments," "examples," "particular examples," or "some examples" and the like mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present invention. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiments or examples. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present invention have been shown and described above, it will be understood that the above embodiments are illustrative and not to be construed as limiting the invention, and that variations, modifications, alternatives, and variations may be made in the above embodiments by those skilled in the art without departing from the spirit and principles of the invention.
Claims (3)
1. The block chain-based crowd sensing privacy protection incentive mechanism method is characterized by comprising the following steps of:
step 1: designing and mathematical modeling is carried out on a block chain-based crowd sensing system, a crowd sensing system structure comprising a requester, workers, block chains and an excitation mechanism is built based on reverse auction, and mathematical models of the requester, workers, crowd sensing tasks, rewards and benefits of the workers are built;
step 2: based on the characteristics of the position-related crowd sensing system, designing a coverage function as an optimization target, and constructing an optimization problem of maximizing the coverage function under budget constraint;
step 3: the intelligent contract technology based on the block chain designs a group intelligent perception privacy protection incentive mechanism framework, which comprises six stages: a registration phase, a task delivery phase, a bidding phase, a worker recruitment phase, a data submission phase, and a payment phase;
Step 4: in the registration stage, workers and requesters register on the blockchain to acquire identity certificates for authentication in subsequent operation, and elliptic curve cryptography is used as a public and private key system;
step 5: in the task delivery stage, the registered requester issues the crowd sensing task to the blockchain by calling a task delivery contract;
step 6: in the bidding stage, the registered workers perform bidding operations by calling bidding contracts, in order to ensure the privacy of bidding books, the bidding books are uploaded to a blockchain in the form of Pedersen promise, and in order to ensure the anonymity of the workers, a ring signature method is adopted as an authentication mode;
step 7: in the recruitment stage of workers, all workers participating in bidding need to disclose own real bidding books, the bidding books disclose that the bidding information of the workers is verified by the closing date, all workers with illegal information are eliminated, the information of the rest workers is input into an incentive mechanism contract, the incentive mechanism contract is automatically executed at preset time, and the obtained result is published;
step 8: in the data submitting stage, all winners need to encrypt the data of the winners and submit the encrypted data to an interstellar file system, and the abstract and the storage address of the data are uploaded to a blockchain through a data submitting contract;
Step 9: in the payment phase, the requester gives each winner a certain consideration, and the consideration is calculated by an incentive mechanism;
in the step 1, the crowd sensing system has the following structure:
the crowd sensing system comprises four roles of a requester, a worker, a blockchain and an incentive mechanism; requester (E)Is the initiator of the perception task, the requestor is gathered with +.>Indicating (I)>Task set usefulness->Indicating (I)>Comprises->A plurality of perception tasks; worker->Is the executor of the perception task, and the worker is integrated with +.>Indicating that it contains->A worker; the block chain provides a security platform for crowd sensing; the incentive mechanism is a program deployed on the blockchain with the goal of selecting workers and deciding to pay the workers;
each workerSubmitting a triplet tagbook +.>Wherein->Is worker->Is (are) located>Is the task set of the worker, including all tasks that he is willing to perform, < >>Is worker->For quotations of>Indicating worker->Is>Is private and known only by the inventor;
given bidding documentThe goal of the incentive mechanism is to select a set of winners +.>And decides to give each winner a reward whose size depends on its contribution to the task, with +. >The file is represented by a set of data,wherein->Is to give workers +.>If the worker is ++>Is a delivery house, then->;
In the step 2, an overlay function is defined in consideration of a location-dependent crowd sensing systemThe following are provided: />
Wherein the method comprises the steps ofIs task->Is determined by the importance and value of the task's position, +.>Is task->Is assembled->The number of times of worker's execution, +.>Is a system parameter controlling the decreasing gradient of benefit, by +.>And->Respectively represent task->Position importance and value of (2), weight +.>The calculation formula is that
Wherein the method comprises the steps ofIs a balance parameter; the goal of the incentive mechanism is to have a fixed budget +.>Under maximizing coverage function, a problem called maximizing coverage function under budget constraint, formalized as
In the step 3, the crowd sensing privacy protection incentive mechanism framework comprises six stages: a registration phase, a task delivery phase, a bidding phase, a worker recruitment phase, a data submission phase, and a payment phase; the operation of the client side realizes the interaction between a requester and a worker and the intelligent contract, the intelligent contract realizes the request processing, the function realization and the data uplink, and the intelligent contract interacts with the blockchain to complete the data uplink process;
In the step 4, the registration stage is as follows:
all requesters and workers need to register when joining the crowd sensing system for the first time, and acquire a pair of public key and private key, the system adopts elliptic curve cryptography as a key management scheme, and the system sets the adopted elliptic curve in advancePrime order->And a common datum point on the curve->And disclose->、/>、/>Worker->Randomly selecting private key +.>Satisfy->The corresponding public key is +.>The private key is stored by the worker himself, the public key is disclosed, and the worker can acquire an identity mark during registration>Requester->The registration process is the same;
in the step 5, the task delivery stage is as follows:
the registered requester can issue own tasks by calling task delivery contracts, the requester needs to attach a digital signature generated by using own private keys and verify the digital signature by using intelligent contracts, and after the tasks are issued, workers can check task information on a blockchain and select interested tasks;
each perception task comprises a task name, a task position and a task description, the task position is divided according to a pre-determined area and is represented by a number, and the perception task information is attached with a abstract so as to ensure that the perception task is not tampered with and a task requester It will also be disclosed that the worker can find the public key of the requester later, and after delivering all tasks, the requester will also submit a budget +.>Representing its ability to pay for recruiter to offer;
in the step 6, the bidding stage is as follows:
the registered worker can select the task set according to his own will, bid by calling a bidding contract, the information in the bidding including position information, task set and quotation are all present in a numerical mode, and hidden by using Pedersen promise, giving an elliptic curve in advanceAnd two datum points->And->And->Unknown, true value for the need to be hidden +.>The Pedersen promise calculation formula is +.>Wherein->Blind factors selected randomly;
in addition to submitting the petersen commitment, the worker needs to attach a ring signature to anonymously verify his identity, giving an elliptic curve, during the bidding stepAnd datum point->,/>The public key of the individual worker is denoted +.>,/>It is assumed that the order parameter of the real signer is +.>,/>The private key of the signer is denoted +.>Use->A key image representing a signer, wherein +.>Is the public key of the signer,/->Is a hash function satisfying cryptographic security, its return value is +. >At the last point, the signature process is as follows:
by usingRepresenting a message to be signed, the signer being all workers +.>Generating a randomization factor->And random variable->Wherein->Is->Prime order of->Is an integer modulo +.>The remaining set of>Indicating worker->Corresponding to the public key with +.>Indicating worker->Corresponding to the key image with +.>Indicating worker->The signer performs the following calculation on the hash value combined by the random factors:
wherein the method comprises the steps ofIs a return +.>The signer then continues to perform the following calculations:
The final ring signature is denoted asThe signer attaches the generated ring signature to complete the bidding process, in which all bidding information is hidden, and the bidding worker identity is anonymous, the intelligent contract needs to verify the ring signature, and the verification process is as follows:
the intelligent contract end performs the following calculation:
if it isThen the ring signature +.>Is legal, in particular if two ring signatures have duplicate keysImage->Then the two ring signatures are said to be linked and their signers are the same worker, for convenience of identification, a new +. >After the intelligent contract is verified, the bidding phase is ended;
in the step 7, the worker recruitment stage is as follows:
all the workers participating in bidding need to reveal the true value of their own bidding by calling the bidding disclosure contract, and the intelligent closing date is compared and verified with the previously submitted Pedersen promise according to the true value, and for promiseAnd received true value->Calculation ofIf->Then the promise is legal, the intelligent contract excludes all promise illegal workers, and the information of the rest workers is integrated, and the intelligent contract is used for +.>Representing the final anonymous set of workers with +.>Representing the final tagbook document,/->And->Will be sent to the incentive mechanism contract as input;
the incentive mechanism is realized through intelligent contracts, can be triggered at a given time, and aims to solve the problem of maximizing coverage functions under budget constraint, select workers and decide to give a return to winners, and the specific steps are as follows:
s1: initializing a set of winnersInitializing the reward set +.>Initializing a set of screening workers;
S5: will anonymize workersAdd to the winner set->And give anonymity workers +.>The reward of (2) is->Wherein->For budget, jump to S17;
S9: finding collectionsCan make->Anonymous worker with the greatest value->,/>Is indicated at->Middle exclusion set +.>The rest set after the middle element jumps to S7;
s10: for a set of winnersEach anonymous worker in->These workers, also called winners, perform steps S11-S16; />
S12: finding collectionsCan make->Second anonymous worker with maximum value +.>,/>Representing exclusion element anonymity worker +>Posterior Collection->;
2. The blockchain-based crowd-aware privacy-preserving incentive scheme method of claim 1, wherein in step 8, the data submission stage is as follows:
winners need to complete tasks by submitting collected perceived data, use the interstellar file system as a distributed storage system to ease storage burden on the blockchain, the winner first needs to share a secure key with the requester, and the winner generates a one-time private keyThe corresponding disposable public key is +.>The one-time public key needs to be uplink, the one-time private key is owned by the winner, and the shared secure key calculation formula is +.>The key has only the winner himself and has the private key +.>Is->Can be calculated, and ensures the safety;
the winner hashes the shared secure key to obtain a final encryption keyEncrypting the submitted data by using the key, transferring the encrypted content to an interstellar file system to finish uploading the data, and then uploading the hash value and the storage address of the submitted data to a blockchain by a winner through a data submitting contract after encrypting the hash value and the storage address of the submitted data by using the encryption key, wherein a requester calculates the encryption key- >Decrypting the encrypted hash value and the storage address, and obtaining data information submitted by a winner in an interstellar file system, wherein the hash value of the data ensures the integrity and the non-tamper property of the data.
3. The blockchain-based crowd-aware privacy-preserving incentive scheme method of claim 2, wherein in step 9, the payment phase is as follows:
after confirming the receiving of the perception data submitted by the winner, the requester gives a certain amount of payment to the winner according to the reward result calculated by the previous incentive mechanism, and the whole crowd sensing process is completed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310114476.7A CN115828311B (en) | 2023-02-15 | 2023-02-15 | Block chain-based crowd sensing privacy protection incentive mechanism method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310114476.7A CN115828311B (en) | 2023-02-15 | 2023-02-15 | Block chain-based crowd sensing privacy protection incentive mechanism method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115828311A CN115828311A (en) | 2023-03-21 |
CN115828311B true CN115828311B (en) | 2023-06-06 |
Family
ID=85521438
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310114476.7A Active CN115828311B (en) | 2023-02-15 | 2023-02-15 | Block chain-based crowd sensing privacy protection incentive mechanism method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115828311B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113079486A (en) * | 2021-04-08 | 2021-07-06 | 青岛科技大学 | Vehicle networking crowd sensing and incentive method with privacy protection characteristic based on block chain |
CN113452681A (en) * | 2021-06-09 | 2021-09-28 | 青岛科技大学 | Internet of vehicles crowd sensing reputation management system and method based on block chain |
CN114386043A (en) * | 2021-12-09 | 2022-04-22 | 北京理工大学 | Method for evaluating depocenter privacy keeping credit facing crowd sensing |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110493182B (en) * | 2019-07-05 | 2020-05-19 | 北京邮电大学 | Crowd sensing worker selection mechanism and system based on block chain position privacy protection |
CN111262708A (en) * | 2020-01-16 | 2020-06-09 | 安徽大学 | Crowd sensing method based on block chain |
CN111626563B (en) * | 2020-04-27 | 2022-09-23 | 南京邮电大学 | Dual-target robust mobile crowd sensing system and excitation method thereof |
CN114760067B (en) * | 2022-03-30 | 2023-09-12 | 西安电子科技大学 | Privacy security protection method for blockchain crowd sensing system by using zero knowledge proof |
CN115099535B (en) * | 2022-08-24 | 2022-12-20 | 东南大学 | Dual-target crowd sensing excitation mechanism method |
-
2023
- 2023-02-15 CN CN202310114476.7A patent/CN115828311B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113079486A (en) * | 2021-04-08 | 2021-07-06 | 青岛科技大学 | Vehicle networking crowd sensing and incentive method with privacy protection characteristic based on block chain |
CN113452681A (en) * | 2021-06-09 | 2021-09-28 | 青岛科技大学 | Internet of vehicles crowd sensing reputation management system and method based on block chain |
CN114386043A (en) * | 2021-12-09 | 2022-04-22 | 北京理工大学 | Method for evaluating depocenter privacy keeping credit facing crowd sensing |
Also Published As
Publication number | Publication date |
---|---|
CN115828311A (en) | 2023-03-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110419053B (en) | System and method for information protection | |
JP7395701B2 (en) | Computer-implemented systems and methods for transaction mixing on a blockchain | |
CN110337665B (en) | System and method for information protection | |
CA3044907C (en) | Blockchain-based system and method for concealing sender and receiver identities | |
CN113837761B (en) | Block chain and trusted execution environment based federated learning method and system | |
JP2022031817A (en) | Dispersion type transaction propagation and verification system | |
CA3037833C (en) | System and method for information protection | |
JP2019513312A (en) | Tokenizing method and system for implementing exchange on blockchain | |
CN111177778B (en) | Mobile crowd sensing method, system, server and storage medium | |
WO2020165256A1 (en) | System and method for evaluating useful work | |
Zou et al. | Crowdhb: A decentralized location privacy-preserving crowdsensing system based on a hybrid blockchain network | |
Hong et al. | A secure peer to peer multiparty transaction scheme based on blockchain | |
CN112287040B (en) | Rights and interests combination method, device, equipment and medium based on block chain | |
CN115828311B (en) | Block chain-based crowd sensing privacy protection incentive mechanism method | |
Pang et al. | Towards fair and efficient task allocation in blockchain-based crowdsourcing | |
Li et al. | A fair, verifiable and privacy-protecting data outsourcing transaction scheme based on smart contracts | |
Hafeez et al. | Blockchain based competent consensus algorithm for secure authentication in vehicular networks | |
Liu et al. | Permissioned blockchain-based trustworthy edge storage scheme for smart grid | |
KR102480754B1 (en) | Multi-memperships integrated management system and method to provide integrated use among multi-memberships and prevent forgery/counterfeiting of automatic settlement | |
Rahimpour | Designing Efficient and Secure Algorithms for Payment Channel Networks | |
Zhan et al. | Multi-party Non-interactive Atomic Fair Data Exchange based on Blockchain | |
Song et al. | Unveiling Decentralization: A Comprehensive Review of Technologies, Comparison, Challenges in Bitcoin, Ethereum, and Solana Blockchain | |
CN115314352A (en) | Privacy-enhanced fair block chain leader election method and device | |
Pan et al. | Auction-based Storage Resource Allocation for Blockchain | |
CN115203569A (en) | Service recommendation method and device based on joint learning |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |