这是indexloc提供的服务,不要输入任何密码
Skip to main content
Log in

Invisible man: blockchain-enabled peer-to-peer collaborative privacy games in LBSs

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Most user-collaborative location privacy protection mechanisms assume that collaborative group members are trustworthy and can strictly enforce collaboration rules. Such assumptions do not match reality and reduce the usability of the schemes. In this paper, we propose Invisible Man, a blockchain-enabled framework for peer-to-peer collaborative privacy games for location-based services. The framework enables users to protect their privacy in extreme environments and allows members of a collaborative group without trust to collaborate efficiently. To defend against inference attacks, a user-collaborative privacy game model is constructed, and a dual-verification mechanism with Chainlink and Witnet oracles is developed to provide security guarantees for model generation. Members can conduct cooperative games under the guidance of the model. To realize secure and efficient in-group collaboration, a blockchain-based reward and punishment mechanism for collaboration is designed, integrating token incentives and a blacklisting mechanism to ensure the verifiability and audibility of user behaviors. Security analysis and extensive simulation results demonstrate that the proposed scheme achieves high security and privacy with low costs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+
from $39.99 /Month
  • Starting from 10 chapters or articles per month
  • Access and download chapters and articles from more than 300k books and 2,500 journals
  • Cancel anytime
View plans

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Availibility of supportig data

Data sharing is not applicable to this article as no new data were created or analyzed in this study.

References

  1. Jiang H, Li J, Zhao P, Zeng F, Xiao Z, Iyengar A (2021) Location privacy-preserving mechanisms in location-based services: A comprehensive survey. ACM Comput Surv 54(1)

  2. Pawlick J, Colbert E, Zhu Q (2020) A game-theoretic taxonomy and survey of defensive deception for cybersecurity and privacy. ACM Comput Surv 52(4)

  3. Do CT, Tran NH, Hong C, Kamhoua CA, Kwiat KA, Blasch E, Ren S, Pissinou N, Iyengar SS (2018) Game theory for cyber security and privacy. ACM Comput Surv 50(2)

  4. Hong S, Duan L, Huang J (2022) Protecting location privacy by multiquery: A dynamic bayesian game theoretic approach. IEEE Trans Inf Forensics Secur 17:2569–2584

    Article  Google Scholar 

  5. Shokri R, Theodorakopoulos G, Troncoso C (2016) Privacy games along location traces: A game-theoretic framework for optimizing location privacy. ACM Trans Priv Secur 19(4):1–31

    Article  Google Scholar 

  6. Xue L, Liu D, Huang C, Shen X, Zhuang W, Sun R, Ying B (2022) Blockchain-based data sharing with key update for future networks. IEEE J Sel Areas Commun 40(12):3437–3451

    Article  Google Scholar 

  7. Jiang H, Wang M, Zhao P, Xiao Z, Dustdar S (2021) A utility-aware general framework with quantifiable privacy preservation for destination prediction in LBSs. IEEE/ACM Trans Netw 29(5):2228–2241

    Article  Google Scholar 

  8. Backes M, Humbert M, Pang J, Zhang Y (2017) Walk2Friends: Inferring social links from mobility profiles. In Proc ACM SIGSAC CCS 1943–1957

  9. Eyal I, Gencer AE, Sirer EG, Van Renesse R (2016) Bitcoin-ng: A scalable blockchain protocol. In Proc. of USENIX NSDI, pages 45–59

  10. Pasdar A, Lee YC, Dong Z (2023) Connect api with blockchain: A survey on blockchain oracle implementation. ACM Comput Surv 55(10):1–39

  11. Shokri R, Theodorakopoulos G, Papadimitratos P, Kazemi E, Hubaux J-P (2013) Hiding in the mobile crowd: Location privacy through collaboration. IEEE Trans Depend Sec Comput 11(3):266–279

    Google Scholar 

  12. Peng T, Liu Q, Meng D, Wang G (2017) Collaborative trajectory privacy preserving scheme in location-based services. Inf. Sci. 387:165–179

    Article  Google Scholar 

  13. Niu B, Zhu X, Li W, Li H (2014) Epcloak: An efficient and privacy-preserving spatial cloaking scheme for LBSs. In IEEE MASS pp. 398–406

  14. Chow C-Y, Mokbel MF, Liu X (2006) A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In Proc ACM SIGSPATIAL GIS, pp. 171–178

  15. Niu B, Zhu X, Li Q, Chen J, Li H (2015) A novel attack to spatial cloaking schemes in location-based services. Future Gener. Comput. Syst. 49:125–132

    Article  Google Scholar 

  16. Ghaffari M, Ghadiri N, Manshaei MH, Lahijani MS (2017) P4QS: A peer-to-peer privacy preserving query service for location-based mobile applications. IEEE Trans Veh Technol 66(10):9458–9469

    Article  Google Scholar 

  17. Jin H, Papadimitratos P (2019) Resilient privacy protection for location-based services through decentralization. ACM Trans Priv Secur 22(4)

  18. Shokri R, Theodorakopoulos G, Troncoso C, Hubaux J-P, Le Boudec J-Y (2012) Protecting location privacy: Optimal strategy against localization attacks. In Proc ACM SIGSAC CCS, pp. 617–627

  19. Shen H, Bai G, Yang M, Wang Z (2017) Protecting trajectory privacy: A user-centric analysis. J Netw Comput Appl 82:128–139

    Article  Google Scholar 

  20. Shokri R (2015) Privacy games: Optimal user-centric data obfuscation. Proc Priv Enh Technol 2015(2):299–315

    Google Scholar 

  21. Ding K, Zhang J (2020) Multi-party privacy conflict management in online social networks: A network game perspective. IEEE/ACM Trans Netw 28(6):2685–2698

    Article  Google Scholar 

  22. Hong S, Duan L (2022) Multi-user privacy cooperation game by leveraging users service flexibility. In IEEE Int Symp Info Theory pp. 637–642

  23. Li B, Liang R, Zhu D, Chen W, Lin Q (2020) Blockchain-based trust management model for location privacy preserving in vanet. IEEE Trans Intell Transp Syst 22(6):3765–3775

    Article  Google Scholar 

  24. Feng J, Wang Y, Wang J, Ren F (2020) Blockchain-based data management and edge-assisted trusted cloaking area construction for location privacy protection in vehicular networks. IEEE Internet Things J 8(4):2087–2101

    Article  Google Scholar 

  25. Li B, Liang R, Zhou W, Yin H, Gao H, Cai K (2021) LBS meets blockchain: an efficient method with security preserving trust in sagin. IEEE Internet Things J 9(8):5932–5942

    Article  Google Scholar 

  26. Chaudhary B, Singh K (2021) A blockchain enabled location-privacy preserving scheme for vehicular ad-hoc networks. Peer-to-Peer Netw Appl 14:3198–3212

    Article  Google Scholar 

  27. Li H, Pei L, Liao D, Sun G, Du X (2019) Blockchain meets vanet: An architecture for identity and location privacy protection in vanet. Peer-to-Peer Netw Appl 12:1178–1193

    Article  Google Scholar 

  28. Huang C, Wang W, Liu D, Rongxing L, Shen X (2022) Blockchain-assisted personalized car insurance with privacy preservation and fraud resistance. IEEE Trans Veh Technol 72(3):3777–3792

    Article  Google Scholar 

  29. Xue L, Ni J, Liu D, Lin X, Shen X (2023) Blockchain-based fair and fine-grained data trading with privacy preservation. IEEE Trans Comput

  30. Niu B, Chen Y, Wang Z, Li F, Wang B, Li H (2022) Eclipse: Preserving differential location privacy against long-term observation attacks. IEEE Trans Mobile Comput 21(1):125–138

    Google Scholar 

  31. Jiang H, Zhao P, Wang C (2018) RobLoP: Towards robust privacy preserving against location dependent attacks in continuous LBS queries. IEEE/ACM Trans Netw 26(2):1018–1032

    Article  Google Scholar 

  32. Zhao Y, Chen J (2024) Vector-indistinguishability: Location dependency based privacy protection for successive location data. IEEE Trans Comput 73(4):970–979

    Article  Google Scholar 

  33. Benarous L, Kadri B (2022) Obfuscation-based location privacy-preserving scheme in cloud-enabled internet of vehicles. Peer-to-Peer Netw Appl 15(1):461–472

    Article  Google Scholar 

  34. Breidenbach L, Cachin C, Chan B, Coventry A, Ellis S, Juels A, Koushanfar F, Miller A, Magauran B, Moroz D et al (2021) Chainlink 2.0: Next steps in the evolution of decentralized oracle networks. Chainlink Labs 1:1–136

    Google Scholar 

  35. De Pedro AS, Levi D, Cuende LI (2017) Witnet: A decentralized oracle network protocol. arXiv preprint arXiv:1711.09756

  36. Bhalerao S, Ansari IA, Kumar A (2021) A secure image watermarking for tamper detection and localization. J Ambient Intell Humaniz Comput 12(1):1057–1068

    Article  Google Scholar 

  37. Shen H, Bai G, Yujia H, Wang T (2019) P2TA: Privacy-preserving task allocation for edge computing enhanced mobile crowdsensing. J Syst Archit 97:130–141

    Article  Google Scholar 

Download references

Acknowledgements

The authors gratefully acknowledge the financial assistance provided by the National Natural Science Foundation of China and the Natural Science Foundation of Jiangsu Province.

Funding

This work was supported in part by the National Natural Science Foundation of China under Grants 61502230 and 61501224, the Natural Science Foundation of Jiangsu Province under Grant BK20201357, and the Six Talent Peaks Project in Jiangsu Province under Grant RJFW-020.

Author information

Authors and Affiliations

Authors

Contributions

Beining Zhang and Hang Shen wrote the main manuscript text. Tianjing Wang and Guangwei Bai provided guiding ideas and suggestions. All authors reviewed the manuscript.

Corresponding author

Correspondence to Hang Shen.

Ethics declarations

Ethical approval and consent to participate

This article does not contain any studies with human participants or animals performed by any of the authors.

Consent for publication

All authors agree to publish the paper and related research results of the paper.

Competing interests

We declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper. We declare that there is no financial interest/personal relationship which may be considered as potential competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, B., Shen, H., Wang, T. et al. Invisible man: blockchain-enabled peer-to-peer collaborative privacy games in LBSs. Peer-to-Peer Netw. Appl. 17, 2595–2607 (2024). https://doi.org/10.1007/s12083-024-01728-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Version of record:

  • Issue date:

  • DOI: https://doi.org/10.1007/s12083-024-01728-5

Keywords