Matching as You Want: A Decentralized, Flexible, and Efficient Realization for Crowdsourcing With Dual-Side Privacy

IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY IEEE Transactions on Network Science and Engineering Pub Date : 2024-12-26 DOI:10.1109/TNSE.2024.3522914
Liang Li;Haiqin Wu;Liangen He;Jucai Yang;Zhenfu Cao;Boris Düdder
{"title":"Matching as You Want: A Decentralized, Flexible, and Efficient Realization for Crowdsourcing With Dual-Side Privacy","authors":"Liang Li;Haiqin Wu;Liangen He;Jucai Yang;Zhenfu Cao;Boris Düdder","doi":"10.1109/TNSE.2024.3522914","DOIUrl":null,"url":null,"abstract":"As the first service procedure in crowdsourcing, task matching is crucial for users and has aroused extensive attention. However, due to the submission of sensitive information, task requesters and workers have growing concerns about matching security and privacy, as well as efficiency and flexibility for service quality. Prior privacy-aware task-matching resolutions either rely on a central semi-honest crowdsourcing platform for matching integrity, or still suffer from low efficiency, limited privacy considerations, and inflexibility even if blockchain is incorporated for decentralized matching. In this paper, we construct a decentralized, secure, and flexibly expressive crowdsourcing task-matching system robust to misbehaviors based on consortium blockchain. Particularly, to support fine-grained worker selection and worker-side task search with dual-side privacy under no central trust, we propose a multi-authority policy-hiding attribute-based encryption scheme with keyword search, enforced by smart contracts. We optimize the ciphertext and key size by designing a novel approach for policy and attribute vector generation, meanwhile immune to malicious workers submitting incorrect vectors. Such a verifiable vector generation approach exploits verifiable multiplicative homomorphic secret sharing and Viète's formulas. Formal security analysis and extensive experiments conducted over Hyperledger Fabric demonstrate the desired security properties and superior on-chain and off-chain performance.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"12 2","pages":"1026-1040"},"PeriodicalIF":7.9000,"publicationDate":"2024-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Network Science and Engineering","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10816472/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, MULTIDISCIPLINARY","Score":null,"Total":0}
引用次数: 0

Abstract

As the first service procedure in crowdsourcing, task matching is crucial for users and has aroused extensive attention. However, due to the submission of sensitive information, task requesters and workers have growing concerns about matching security and privacy, as well as efficiency and flexibility for service quality. Prior privacy-aware task-matching resolutions either rely on a central semi-honest crowdsourcing platform for matching integrity, or still suffer from low efficiency, limited privacy considerations, and inflexibility even if blockchain is incorporated for decentralized matching. In this paper, we construct a decentralized, secure, and flexibly expressive crowdsourcing task-matching system robust to misbehaviors based on consortium blockchain. Particularly, to support fine-grained worker selection and worker-side task search with dual-side privacy under no central trust, we propose a multi-authority policy-hiding attribute-based encryption scheme with keyword search, enforced by smart contracts. We optimize the ciphertext and key size by designing a novel approach for policy and attribute vector generation, meanwhile immune to malicious workers submitting incorrect vectors. Such a verifiable vector generation approach exploits verifiable multiplicative homomorphic secret sharing and Viète's formulas. Formal security analysis and extensive experiments conducted over Hyperledger Fabric demonstrate the desired security properties and superior on-chain and off-chain performance.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
如你所愿的匹配:一个分散、灵活、高效的双面隐私众包实现
任务匹配作为众包的第一个服务流程,对用户来说至关重要,引起了广泛关注。然而,由于敏感信息的提交,任务请求者和工作人员越来越关注安全与隐私的匹配,以及服务质量的效率和灵活性。先前的隐私感知任务匹配解决方案要么依赖于一个中央的半诚实的众包平台来匹配完整性,要么仍然存在效率低、隐私考虑有限和不灵活的问题,即使区块链被纳入去中心化匹配。在本文中,我们构建了一个基于财团区块链的分散、安全、灵活表达的对错误行为鲁棒的众包任务匹配系统。特别是,为了在没有中央信任的情况下支持细粒度的工人选择和具有双重隐私的工作端任务搜索,我们提出了一种基于多权威策略隐藏属性的加密方案,该方案具有关键字搜索功能,由智能合约强制执行。我们通过设计一种新的策略和属性向量生成方法来优化密文和密钥大小,同时不受恶意工作者提交错误向量的影响。这种可验证向量生成方法利用了可验证的乘法同态秘密共享和vi公式。在Hyperledger Fabric上进行的正式安全分析和广泛的实验证明了所需的安全特性和卓越的链上和链下性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Transactions on Network Science and Engineering
IEEE Transactions on Network Science and Engineering Engineering-Control and Systems Engineering
CiteScore
12.60
自引率
9.10%
发文量
393
期刊介绍: The proposed journal, called the IEEE Transactions on Network Science and Engineering (TNSE), is committed to timely publishing of peer-reviewed technical articles that deal with the theory and applications of network science and the interconnections among the elements in a system that form a network. In particular, the IEEE Transactions on Network Science and Engineering publishes articles on understanding, prediction, and control of structures and behaviors of networks at the fundamental level. The types of networks covered include physical or engineered networks, information networks, biological networks, semantic networks, economic networks, social networks, and ecological networks. Aimed at discovering common principles that govern network structures, network functionalities and behaviors of networks, the journal seeks articles on understanding, prediction, and control of structures and behaviors of networks. Another trans-disciplinary focus of the IEEE Transactions on Network Science and Engineering is the interactions between and co-evolution of different genres of networks.
期刊最新文献
Heterogeneity-Aware Proactive MAC for Efficient Resource Allocation in WBANs FD-RAN Empowered Multiple Base Stations Cooperative ISAC for Low-Altitude Networks Evolutionary Knowledge-Enhanced Semantic Communication: Transition From SISO to MIMO SecHeto-FL: A Secure and Resilient Federated Learning Framework for Heterogeneous IoT Networks TerseChain: A Stateless UTXO-Based Blockchain With Sharding Support
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1