Font Size: a A A

Research On Location Privacy Protection Technology Based On Smart Contract

Posted on:2022-05-12Degree:MasterType:Thesis
Country:ChinaCandidate:X LiFull Text:PDF
GTID:2518306539469404Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
In recent years,the use of Location-Based Service(LBS)has been increasing,providing people with many convenient and fast services.However,location-based services require users to provide their real location information as the basis of the service,and assuming the service provider is selfish,the request data of the requesting user may be stolen,making the user's personal data in the hands of criminals.Therefore,how to use location services more securely has become the focus of research by domestic and international scholars.The research work in this paper includes.(1)Research on location-oriented privacy protection is carried out in conjunction with existing literature and blog posts,with an in-depth understanding of the technical principles of these schemes,a summary of four types of currently used privacy protection methods and three technical architectures in location privacy protection,and an explanation of the technical principles related to cryptography and blockchain technology and an introduction to the corresponding basic content.(2)In response to the inefficiency of using the K-anonymity algorithm to form anonymity zones in the current literature and the possibility that other users may submit the wrong location,which ultimately makes the anonymity zone generation error resulting in location privacy not being protected and the response data requested by users not being fully utilized,a privacy protection method that does not use other users' locations is studied,using the Chinese residual definition to calculate the same residual split from the user's location A set of linear equations is computed by using the Chinese residual definition,and a set of general solutions is used as an equivalent set of request locations to form an anonymity zone,using L-diversity to protect the query content of the requesting user,combined with a caching policy to reduce the interaction with the server.Experiments show that this method outperforms the comparative literature in terms of anonymity zone generation efficiency and cache hit ratio.(3)The feasibility of applying blockchain and smart contract technologies to the field of location privacy protection is explored by improving on the anonymous or central server that still exists in the approach of most papers.An auction-based incentive mechanism is implemented through smart contracts to motivate users to enthusiastically participate in privacy protection tasks initiated by requesting users,avoiding the involvement of anonymous servers or central servers and providing a fair and trustworthy trading platform for requesting and participating users.Experiments show that the average generation time of the method in this chapter is smaller than that of the comparative literature under different platform environments.The innovations of this paper include.(1)proposing a trajectory privacy protection method CRTTP that can form an anonymity zone using only its own location information,which obtains the equivalence set by solving the system of equations for the location of the requesting user and thus generates an anonymity zone,and introduces L-diversity and caching strategies to enhance the protection of user query content and trajectory information.(2)A multi-party incentive-based privacy protection method is proposed,which implements an auction-based incentive mechanism through a smart contract to maximize the incentive for participants to participate in the privacy protection task and to maintain the interests of both parties,eliminating the participation of anonymous servers or central servers.In addition,in order to improve the efficiency of anonymity zone generation and the robustness of the whole method,the remaining location data is calculated by the location replenishment module when the incentive mechanism fails to accomplish the desired effect,ensuring that the anonymity zone can be formed even if there are not enough participating users.
Keywords/Search Tags:location privacy protection, k-Anonymity, Chinese Remainder Theorem, l-diversity, smart contract
PDF Full Text Request
Related items