Abstract
Most user-collaborative location privacy protection mechanisms assume that collaborative group members are trustworthy and can strictly enforce collaboration rules. Such assumptions do not match reality and reduce the usability of the schemes. In this paper, we propose Invisible Man, a blockchain-enabled framework for peer-to-peer collaborative privacy games for location-based services. The framework enables users to protect their privacy in extreme environments and allows members of a collaborative group without trust to collaborate efficiently. To defend against inference attacks, a user-collaborative privacy game model is constructed, and a dual-verification mechanism with Chainlink and Witnet oracles is developed to provide security guarantees for model generation. Members can conduct cooperative games under the guidance of the model. To realize secure and efficient in-group collaboration, a blockchain-based reward and punishment mechanism for collaboration is designed, integrating token incentives and a blacklisting mechanism to ensure the verifiability and audibility of user behaviors. Security analysis and extensive simulation results demonstrate that the proposed scheme achieves high security and privacy with low costs.
Similar content being viewed by others
Availibility of supportig data
Data sharing is not applicable to this article as no new data were created or analyzed in this study.
References
Jiang H, Li J, Zhao P, Zeng F, Xiao Z, Iyengar A (2021) Location privacy-preserving mechanisms in location-based services: A comprehensive survey. ACM Comput Surv 54(1)
Pawlick J, Colbert E, Zhu Q (2020) A game-theoretic taxonomy and survey of defensive deception for cybersecurity and privacy. ACM Comput Surv 52(4)
Do CT, Tran NH, Hong C, Kamhoua CA, Kwiat KA, Blasch E, Ren S, Pissinou N, Iyengar SS (2018) Game theory for cyber security and privacy. ACM Comput Surv 50(2)
Hong S, Duan L, Huang J (2022) Protecting location privacy by multiquery: A dynamic bayesian game theoretic approach. IEEE Trans Inf Forensics Secur 17:2569–2584
Shokri R, Theodorakopoulos G, Troncoso C (2016) Privacy games along location traces: A game-theoretic framework for optimizing location privacy. ACM Trans Priv Secur 19(4):1–31
Xue L, Liu D, Huang C, Shen X, Zhuang W, Sun R, Ying B (2022) Blockchain-based data sharing with key update for future networks. IEEE J Sel Areas Commun 40(12):3437–3451
Jiang H, Wang M, Zhao P, Xiao Z, Dustdar S (2021) A utility-aware general framework with quantifiable privacy preservation for destination prediction in LBSs. IEEE/ACM Trans Netw 29(5):2228–2241
Backes M, Humbert M, Pang J, Zhang Y (2017) Walk2Friends: Inferring social links from mobility profiles. In Proc ACM SIGSAC CCS 1943–1957
Eyal I, Gencer AE, Sirer EG, Van Renesse R (2016) Bitcoin-ng: A scalable blockchain protocol. In Proc. of USENIX NSDI, pages 45–59
Pasdar A, Lee YC, Dong Z (2023) Connect api with blockchain: A survey on blockchain oracle implementation. ACM Comput Surv 55(10):1–39
Shokri R, Theodorakopoulos G, Papadimitratos P, Kazemi E, Hubaux J-P (2013) Hiding in the mobile crowd: Location privacy through collaboration. IEEE Trans Depend Sec Comput 11(3):266–279
Peng T, Liu Q, Meng D, Wang G (2017) Collaborative trajectory privacy preserving scheme in location-based services. Inf. Sci. 387:165–179
Niu B, Zhu X, Li W, Li H (2014) Epcloak: An efficient and privacy-preserving spatial cloaking scheme for LBSs. In IEEE MASS pp. 398–406
Chow C-Y, Mokbel MF, Liu X (2006) A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In Proc ACM SIGSPATIAL GIS, pp. 171–178
Niu B, Zhu X, Li Q, Chen J, Li H (2015) A novel attack to spatial cloaking schemes in location-based services. Future Gener. Comput. Syst. 49:125–132
Ghaffari M, Ghadiri N, Manshaei MH, Lahijani MS (2017) P4QS: A peer-to-peer privacy preserving query service for location-based mobile applications. IEEE Trans Veh Technol 66(10):9458–9469
Jin H, Papadimitratos P (2019) Resilient privacy protection for location-based services through decentralization. ACM Trans Priv Secur 22(4)
Shokri R, Theodorakopoulos G, Troncoso C, Hubaux J-P, Le Boudec J-Y (2012) Protecting location privacy: Optimal strategy against localization attacks. In Proc ACM SIGSAC CCS, pp. 617–627
Shen H, Bai G, Yang M, Wang Z (2017) Protecting trajectory privacy: A user-centric analysis. J Netw Comput Appl 82:128–139
Shokri R (2015) Privacy games: Optimal user-centric data obfuscation. Proc Priv Enh Technol 2015(2):299–315
Ding K, Zhang J (2020) Multi-party privacy conflict management in online social networks: A network game perspective. IEEE/ACM Trans Netw 28(6):2685–2698
Hong S, Duan L (2022) Multi-user privacy cooperation game by leveraging users service flexibility. In IEEE Int Symp Info Theory pp. 637–642
Li B, Liang R, Zhu D, Chen W, Lin Q (2020) Blockchain-based trust management model for location privacy preserving in vanet. IEEE Trans Intell Transp Syst 22(6):3765–3775
Feng J, Wang Y, Wang J, Ren F (2020) Blockchain-based data management and edge-assisted trusted cloaking area construction for location privacy protection in vehicular networks. IEEE Internet Things J 8(4):2087–2101
Li B, Liang R, Zhou W, Yin H, Gao H, Cai K (2021) LBS meets blockchain: an efficient method with security preserving trust in sagin. IEEE Internet Things J 9(8):5932–5942
Chaudhary B, Singh K (2021) A blockchain enabled location-privacy preserving scheme for vehicular ad-hoc networks. Peer-to-Peer Netw Appl 14:3198–3212
Li H, Pei L, Liao D, Sun G, Du X (2019) Blockchain meets vanet: An architecture for identity and location privacy protection in vanet. Peer-to-Peer Netw Appl 12:1178–1193
Huang C, Wang W, Liu D, Rongxing L, Shen X (2022) Blockchain-assisted personalized car insurance with privacy preservation and fraud resistance. IEEE Trans Veh Technol 72(3):3777–3792
Xue L, Ni J, Liu D, Lin X, Shen X (2023) Blockchain-based fair and fine-grained data trading with privacy preservation. IEEE Trans Comput
Niu B, Chen Y, Wang Z, Li F, Wang B, Li H (2022) Eclipse: Preserving differential location privacy against long-term observation attacks. IEEE Trans Mobile Comput 21(1):125–138
Jiang H, Zhao P, Wang C (2018) RobLoP: Towards robust privacy preserving against location dependent attacks in continuous LBS queries. IEEE/ACM Trans Netw 26(2):1018–1032
Zhao Y, Chen J (2024) Vector-indistinguishability: Location dependency based privacy protection for successive location data. IEEE Trans Comput 73(4):970–979
Benarous L, Kadri B (2022) Obfuscation-based location privacy-preserving scheme in cloud-enabled internet of vehicles. Peer-to-Peer Netw Appl 15(1):461–472
Breidenbach L, Cachin C, Chan B, Coventry A, Ellis S, Juels A, Koushanfar F, Miller A, Magauran B, Moroz D et al (2021) Chainlink 2.0: Next steps in the evolution of decentralized oracle networks. Chainlink Labs 1:1–136
De Pedro AS, Levi D, Cuende LI (2017) Witnet: A decentralized oracle network protocol. arXiv preprint arXiv:1711.09756
Bhalerao S, Ansari IA, Kumar A (2021) A secure image watermarking for tamper detection and localization. J Ambient Intell Humaniz Comput 12(1):1057–1068
Shen H, Bai G, Yujia H, Wang T (2019) P2TA: Privacy-preserving task allocation for edge computing enhanced mobile crowdsensing. J Syst Archit 97:130–141
Acknowledgements
The authors gratefully acknowledge the financial assistance provided by the National Natural Science Foundation of China and the Natural Science Foundation of Jiangsu Province.
Funding
This work was supported in part by the National Natural Science Foundation of China under Grants 61502230 and 61501224, the Natural Science Foundation of Jiangsu Province under Grant BK20201357, and the Six Talent Peaks Project in Jiangsu Province under Grant RJFW-020.
Author information
Authors and Affiliations
Contributions
Beining Zhang and Hang Shen wrote the main manuscript text. Tianjing Wang and Guangwei Bai provided guiding ideas and suggestions. All authors reviewed the manuscript.
Corresponding author
Ethics declarations
Ethical approval and consent to participate
This article does not contain any studies with human participants or animals performed by any of the authors.
Consent for publication
All authors agree to publish the paper and related research results of the paper.
Competing interests
We declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper. We declare that there is no financial interest/personal relationship which may be considered as potential competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Zhang, B., Shen, H., Wang, T. et al. Invisible man: blockchain-enabled peer-to-peer collaborative privacy games in LBSs. Peer-to-Peer Netw. Appl. 17, 2595–2607 (2024). https://doi.org/10.1007/s12083-024-01728-5
Received:
Accepted:
Published:
Version of record:
Issue date:
DOI: https://doi.org/10.1007/s12083-024-01728-5