User privacy protection method based on secure smart contract k-anonymity incentive mechanism

A technology of smart contracts and incentive mechanisms, applied in the field of safe privacy protection, can solve problems such as potential safety hazards, the absence of a trusted third party, and failure of the incentive mechanism to operate normally, and achieve the effect of avoiding potential safety hazards

Active Publication Date: 2017-12-29
NORTH CHINA UNIVERSITY OF TECHNOLOGY
View PDF2 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This scheme uses auction game to realize the incentive mechanism, in which the auctioneer is a trusted third party, which may lead to certain security risks
In real life scenarios, a trusted third party usually does not exist or is difficult to achieve, and once the third party is attacked or captured, the incentive mechanism will not work properly
[0006] The application of decentralized smart contracts can effectively avoid security risks brought by trusted centers. However, during the incentive process, smart contracts will record user information and related transaction records. Attackers can obtain user information by viewing the contract content, and there is privacy. leak problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User privacy protection method based on secure smart contract k-anonymity incentive mechanism
  • User privacy protection method based on secure smart contract k-anonymity incentive mechanism
  • User privacy protection method based on secure smart contract k-anonymity incentive mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0023] The execution flow of the incentive mechanism in this embodiment is as follows: figure 1 As shown, the following steps are included, wherein the buyer and the seller represent the buyer's client device and the seller's client device respectively:

[0024] (1) The buyer and the seller construct a smart contract after negotiating, and the buyer gives a bid b to realize k-anonymity i , the seller offers an asking price a for assisting in achieving k-anonymity j , record the buyer information and its bidding price in the smart contract in the order of decreasing bidding price, and record the seller information and its asking price in the smart contract in the order of increasing asking price.

[0025] (2) Buyers and sellers conduct an auction game, and select the winning buyers and sellers according to the following screening conditions:

[002...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a user privacy protection method based on a secure smart contract k-anonymity incentive mechanism. According to the method, contracts are divided into public contracts and private contracts, the private contracts can be seen only by users in an anonymous group, the public contracts are encrypted through group keys to be prevented from being viewed by outsiders, and the private contracts and the public contracts are jointly verified, such that the security when the users request service is effectively guaranteed. According to the invention, the users can be encouraged to join the k-anonymous group and apply decentralized smart contracts such that potential security risks in a trusted center can be avoided; a part of information of the public contracts is encrypted by use of the group keys so that transaction relations are hidden; and joint verification is carried out by use of the private contracts and the public contracts and group verification is performed by use of a blind group signature such that the k-anonymous success rate is improved while the security is guaranteed.

Description

technical field [0001] The invention belongs to the field of LBS privacy protection, and specifically relates to a privacy protection method that encourages user cooperation to realize k-anonymity security. Background technique [0002] With the rapid development of positioning technology and wireless communication technology, location-based service (Location Based Service, LBS) has become one of the popular service modes. In LBS applications, mobile users obtain their own location information through GPS positioning, etc., and then send the location information and service requests to the service provider, and the service provider provides users with corresponding services, such as navigation services, querying restaurants near the user, etc. . However, while LBS provides convenient services, it also leads to more and more privacy leakage problems. In these LBS applications, the service provider can obtain the location or track of the mobile user, and extract useful infor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08G06Q30/06
CPCG06Q30/0615H04L9/0869H04L9/3236H04L9/3247H04L63/0421H04L63/0428H04L63/06H04L63/083
Inventor 耿子烨何云华肖珂李琛
Owner NORTH CHINA UNIVERSITY OF TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products