A Blockchain-Based Privacy Protection Model Under Quality Consideration in Spatial Crowdsourcing Platforms

被引:0
作者
Albilali, Amal [1 ,2 ]
Abulkhair, Maysoon [1 ]
Bayousef, Manal [1 ]
Albalwy, Faisal [3 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Jeddah 21589, Saudi Arabia
[2] Al Majmaah Univ, Fac Comp Sci & Informat Technol, Al Majmaah 15341, Saudi Arabia
[3] Taibah Univ, Coll Comp Sci & Engn, Dept Cybersecur, Madinah 42353, Saudi Arabia
关键词
Privacy; Protection; Blockchains; Crowdsourcing; Servers; Homomorphic encryption; Costs; Heuristic algorithms; Differential privacy; Process control; Spatial crowdsourcing; task assignment; task quality; blockchain; location privacy; TASK ASSIGNMENT; TECHNOLOGY; FRAMEWORK;
D O I
10.1109/ACCESS.2024.3518973
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Spatial crowdsourcing (SC) is gaining popularity owing to the expansion of mobile devices and internet utilization, enabling cost-effective location-based task completion. However, relying on performing and submitting tasks to specific locations can raise concerns about privacy and task quality, which impacts SC effectiveness. Therefore, protecting workers' privacy and ensuring high-quality task performance are crucial for trust and satisfaction, consequently, promoting the SC system's success. This paper proposes a novel efficient Privacy Protection Task Assignment (ePPTA) model that incorporates centralized and decentralized platforms. This innovative model combines the strengths of centralized efficiency and decentralized privacy, and introduces a unique mechanism that significantly enhances privacy protection and ensures data integrity. Furthermore, the model enhances task performance quality by integrating task and worker constraints to effectively manage the task assignment process. The model was evaluated using a real-world dataset (Gowalla and Yelp), comparing its results with the most related state-of-the-art approaches through comprehensive testing and measuring its performance based on determined metrics. The ePPTA model achieves high utility with the Gowalla dataset, while reaching reasonable results with the Yelp dataset. Furthermore, it demonstrated significantly lower latency in both datasets than state-of-the-art approaches. Additionally, the ePPTA model has theoretically demonstrated its capability to prevent task tracking, eavesdropping attacks, and reward-reneging threats from external entities, thereby enhancing SC privacy protection. The results of the performance evaluation confirmed the efficiency of the proposed model, which is highly effective in addressing the identified challenges.
引用
收藏
页码:191695 / 191718
页数:24
相关论文
共 50 条
[1]   A Framework for Optimal Worker Selection in Spatial Crowdsourcing Using Bayesian Network [J].
Abdullah, Nor Aniza ;
Rahman, Mohammad Mustaneer ;
Rahman, Md. Mujibur ;
Ghauth, Khairil Imran .
IEEE ACCESS, 2020, 8 :120218-120233
[2]  
Alharthi R, 2019, 2019 IEEE 9TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), P715, DOI 10.1109/CCWC.2019.8666501
[3]  
[Anonymous], 2024, TaskRbbit
[4]  
[Anonymous], 2024, Gowalla Dataset
[5]  
[Anonymous], 2024, Yelp dataset
[6]   The power of a blockchain-based supply chain [J].
Azzi, Rita ;
Chamoun, Rima Kilany ;
Sokhn, Maria .
COMPUTERS & INDUSTRIAL ENGINEERING, 2019, 135 :582-592
[7]   A Survey on Blockchain Technology: Evolution, Architecture and Security [J].
Bhutta, Muhammad Nasir Mumtaz ;
Khwaja, Amir A. ;
Nadeem, Adnan ;
Ahmad, Hafiz Farooq ;
Khan, Muhammad Khurram ;
Hanif, Moataz A. ;
Song, Houbing ;
Alshamari, Majed ;
Cao, Yue .
IEEE ACCESS, 2021, 9 :61048-61073
[8]  
Blum A., 1994, Proceedings of the Twenty-Sixth Annual ACM Symposium on the Theory of Computing, P163, DOI 10.1145/195058.195125
[9]   Elliptic Curve Cryptography in Practice [J].
Bos, Joppe W. ;
Halderman, J. Alex ;
Heninger, Nadia ;
Moore, Jonathan ;
Naehrig, Michael ;
Wustrow, Eric .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 :157-175
[10]   PKI, elliptic curve cryptography, and digital signatures [J].
Caelli, WJ ;
Dawson, EP ;
Rea, SA .
COMPUTERS & SECURITY, 1999, 18 (01) :47-66