Volume 30 Issue 2
Apr.  2021
Turn off MathJax
Article Contents
YANG Qiliang, ZHANG Mingrui, ZHOU Yanwei, YU Yong. Attribute-Based Worker Selection Scheme by Using Blockchain in Decentralized Crowdsourcing Scenario[J]. Chinese Journal of Electronics, 2021, 30(2): 249-257. doi: 10.1049/cje.2021.01.007
Citation: YANG Qiliang, ZHANG Mingrui, ZHOU Yanwei, YU Yong. Attribute-Based Worker Selection Scheme by Using Blockchain in Decentralized Crowdsourcing Scenario[J]. Chinese Journal of Electronics, 2021, 30(2): 249-257. doi: 10.1049/cje.2021.01.007

Attribute-Based Worker Selection Scheme by Using Blockchain in Decentralized Crowdsourcing Scenario

doi: 10.1049/cje.2021.01.007
Funds:

the National Natural Science Foundation of China U19B2021

the Research Funds of Guangxi Key Laboratory of Trusted Software KX202002

More Information
  • Author Bio:

    YANG Qiliang   was born in 1991. He received the M.S. degree in computer science and engineering from Sun Yat-sen University. He is a Ph.D. candidate of Shaanxi Normal University. His research interests include blockchain and cryptography. (Email: qlyang68@163.com)

    ZHANG Mingrui   was born in 1996. He received the B.E. degree in software engineering from Xi'an University of Posts and Telecommunications. He is an M.S. candidate of Shaanxi Normal University. His research interests include secure network protocols and its analysis. (Email: 1797763610@qq.com)

    ZHOU Yanwei   was born in 1986. He received the Ph.D. degree in cryptography from Shaanxi Normal University. He is a senior engineer of Shaanxi Normal University. His research interests include anonymous communication and cryptography. (Email: zyw@snnu.edu.cn)

  • Corresponding author: YU Yong   (corresponding author) was born in 1980. He received the Ph.D. degree in cryptography from Xidian University. He is a professor of Shaanxi Normal University. His research interests include cryptography and its applications. (Email: yuyonguestc@126.com)
  • Received Date: 2020-04-21
  • Accepted Date: 2020-10-10
  • Publish Date: 2021-03-01
  • Traditional crowdsourcing based on centralized management platform is vulnerable to Distributed denial of service (DDoS) attack and single point of failure. Combining blockchain technology with crowdsourcing can well solve the above problems, enabling users to realize peer-to-peer transactions and collaboration based on decentralized trust in distributed systems where nodes do not need to trust each other. Although the current methods have solved the above problems, task publishers select workers based on their reputation values, which has two disadvantages: subjectivity and difficulty in initial value setting. Due to the complexity of crowdsourcing network, there will be malicious users in the network. The requirement for anonymity protects both legitimate and malicious users. In order to solve these problems, we propose an attribute-based worker selection scheme using the private set intersection technology. Our scheme also realizes the malicious user identity disclosure function. A concrete example of our scheme is given.
  • loading
  • [1]
    J. Howe, "The rise of crowdsourcing", Wired Magazine, Vol. 14, No. 6, pp. 1–4, 2006. http://ci.nii.ac.jp/naid/10029969381
    [2]
    M. Li, J. Weng, A.J. Yang, et al., "CrowdBC: A blockchain-based decentralized framework for crowdsourcing", IEEE Transactions on Parallel and Distributed Systems, Vol. 30, No. 6, pp. 1251–1266, 2019. doi: 10.1109/TPDS.2018.2881735
    [3]
    X.T. Ma, W.P. Ma and X.X. Liu, "A cross domain authentication scheme based on blockchain technology", Chinese Journal of Electronics, Vol. 46, No. 11, pp. 2571–2579, 2018. http://en.cnki.com.cn/Article_en/CJFDTOTAL-JSJY201802005.htm
    [4]
    Y. Lu, Q. Tang and G.L. Wang, "ZebraLancer: Private and anonymous crowdsourcing system atop open blockchain", 38th IEEE International Conference on Distributed Computing Systems, Vienna, Austria, pp. 853–865, 2018.
    [5]
    Q.K. Zhang, B.L. Wang, X.S. Zhang, et al., "Blockchain-based dynamic group key agreement protocol for Ad Hoc network", Chinese Journal of Electronics, Vol. 29, No. 3, pp. 447–454, 2020. doi: 10.1049/cje.2020.02.020
    [6]
    Z.F. Ma, W.H. Huang and H.M. Gao, "Secure DRM scheme based on blockchain with high credibility", Chinese Journal of Electronics, Vol. 27, No. 5, pp. 1025–1036, 2018. doi: 10.1049/cje.2018.07.003
    [7]
    N. Szabo, "The idea of smart contracts", https://nakamotoinstitute.org/the-idea-of-smart-contracts/, 1997-9-1.
    [8]
    N. Satoshi, "Bitcoin: A peer-to-peer electronic cash system", https://www.bibsonomy.org/bibtex/23db66df0fc9fa2b5033f096a901f1c36/ngnn, 2009-10-31.
    [9]
    J.Z. Wang, M.R. Li, Y.H. He, et al., "A blockchain based privacy-preserving incentive mechanism in crowdsensing applications", IEEE Access, Vol. 6, pp. 17545–17556, 2018. doi: 10.1109/ACCESS.2018.2805837
    [10]
    T. Lappas, K. Liu and E. Terzi, "Finding a team of experts in social networks", Proc. of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, pp. 467–476, 2009.
    [11]
    M. Sozio and A. Gionis, "The community-search problem and how to plan a successful cocktail party", Proc. of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, pp. 939–948, 2010.
    [12]
    D.N. Yang, C.Y. Shen, W.C. Lee, et al., "On socio-spatial group query for location-based social networks", Proc. of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Beijing, China, pp. 949–957, 2012.
    [13]
    D. Papadias, Q.M. Shen, Y.F. Tao, et al., "Group nearest neighbor queries", Proc. of the 20th International Conference on Data Engineering, Boston, MA, USA, pp. 301–312, 2004.
    [14]
    S. Reddy, D. Estrin and M.B. Srivastava, "Recruitment framework for participatory sensing data collections", Proc. of the 8th International Conference on Pervasive Computing, Helsinki, Finland, pp. 138–155, 2010.
    [15]
    L. Kazemi and C. Shahabi, "GeoCrowd: Enabling query answering with spatial crowdsourcing", Proc. of the SIGSPATIAL 2012 International Conference on Advances in Geographic Information Systems, Redondo Beach, CA, USA, pp. 189–198, 2012.
    [16]
    C.Y. Miao, H. Yu, Z.Q. Shen, et al., "Balancing quality and budget considerations in mobile crowdsourcing", Decision Support Systems, Vol. 90, pp. 56–64, 2016. doi: 10.1016/j.dss.2016.06.019
    [17]
    B. Pinkas, M. Rosulek, N. Trieu, et al., "PSI from PaXoS: Fast, malicious private set intersection", Proc. of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, pp. 739–767, 2020.
    [18]
    O. Ruan, Z. Wang, J. Mi, et al., "New approach to set representation and practical private set-intersection protocols", IEEE Access, Vol. 7, pp. 64897–64906, 2019. doi: 10.1109/ACCESS.2019.2917057
    [19]
    S.Y. Lv, J.H. Ye, S.J. Yin, et al., "Unbalanced private set intersection cardinality protocol with low communication cost", Future Generation Computer Systems, Vol. 102, pp. 1054–1061, 2020. doi: 10.1016/j.future.2019.09.022
    [20]
    E.D. Cristofaro and G. Tsudik, "Practical private set intersection protocols with linear complexity", 14th Financial Cryptography 2010, Tenerife, Canary Islands, Spain, pp. 143–159, 2010.
    [21]
    D. Chaum, "Blind signatures for untraceable payments", 2nd CRYPTO, Santa Barbara, California, USA, pp. 199–203, 1982.
    [22]
    R. Attarian, L. Abdi and S. Hashemi, "AdaWFPA: Adaptive online website fingerprinting attack for tor anonymous network: A stream-wise paradigm", Computer Communications, Vol. 148, pp. 74–85, 2019. doi: 10.1016/j.comcom.2019.09.008
    [23]
    M. Blum, P. Feldman and S. Micali, "Non-interactive zero-knowledge and its applications", 20th STOC, Chicago, Illinois, USA, pp. 103–112, 1988.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(4)  / Tables(2)

    Article Metrics

    Article views (74) PDF downloads(10) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return