k-anonymous location privacy protection scheme based on game theory and blockchain fusion

Yang Shaojie1
Zheng Kun1
Zhang Hui1
Zhang Guanghua1,2
1. College of Information Science & Engineering, Hebei University of Science & Technology, Shijiazhuang 050000, China
2. State Key Laboratory of Integrated Services Networks, Xidian University, Xi'an 710071, China

Abstract

Based on the location service of the mobile user, people uses location k-anonymity technology to protect the privacy of users. However, it is difficult to ensure the honest cooperation behavior of the requesting user and the collaborative user in the user collaborative k-anonymous group. Aiming at the above problems, firstly, based on the complete information static game theory, this paper analyzed the behavioral policies of requesting users and honest users, and calculated the requesting users' integrity threshold. The collaborative user decided whether to participate in the anonymous group construction according to the comparison between the request threshold and the cooperation threshold. Secondly, this paper built a reputation mechanism to combine users' recent performance with the benefits, restricted the untrustworthy behavior of the requesting users and the collaborative users who participate in the anonymous group construction. Finally, it used the blockchain to store the game process and the location information of the collaborative users. When discovering the dishonest behavior of requesting users and collaborating users, this paper would punish the dishonest users by reducing their reputation and profit. Security analysis shows that this solution can effectively protect the user's location privacy, promote the integrity cooperation between the requesting user and the collaborative user, and encourage more people to participate in the construction of the anonymous zone.

Foundation Support

国家重点研发计划项目(2016YFB0800703)
国家自然科学基金资助项目(61572255)
河北省高等学校科学技术研究项目(ZD2018236)

Publish Information

DOI: 10.19734/j.issn.1001-3695.2019.10.0654
Publish at: Application Research of Computers Printed Article, Vol. 38, 2021 No. 5
Section: Technology of Blockchain
Pages: 1320-1326
Serial Number: 1001-3695(2021)05-007-1320-07

Publish History

[2021-05-05] Printed Article

Cite This Article

杨少杰, 郑琨, 张辉, 等. 基于博弈论与区块链融合的k-匿名位置隐私保护方案 [J]. 计算机应用研究, 2021, 38 (5): 1320-1326. (Yang Shaojie, Zheng Kun, Zhang Hui, et al. k-anonymous location privacy protection scheme based on game theory and blockchain fusion [J]. Application Research of Computers, 2021, 38 (5): 1320-1326. )

About the Journal

  • Application Research of Computers Monthly Journal
  • Journal ID ISSN 1001-3695
    CN  51-1196/TP

Application Research of Computers, founded in 1984, is an academic journal of computing technology sponsored by Sichuan Institute of Computer Sciences under the Science and Technology Department of Sichuan Province.

Aiming at the urgently needed cutting-edge technology in this discipline, Application Research of Computers reflects the mainstream technology, hot technology and the latest development trend of computer application research at home and abroad in a timely manner. The main contents of the journal include high-level academic papers in this discipline, the latest scientific research results and major application results. The contents of the columns involve new theories of computer discipline, basic computer theory, algorithm theory research, algorithm design and analysis, blockchain technology, system software and software engineering technology, pattern recognition and artificial intelligence, architecture, advanced computing, parallel processing, database technology, computer network and communication technology, information security technology, computer image graphics and its latest hot application technology.

Application Research of Computers has many high-level readers and authors, and its readers are mainly senior and middle-level researchers and engineers engaged in the field of computer science, as well as teachers and students majoring in computer science and related majors in colleges and universities. Over the years, the total citation frequency and Web download rate of Application Research of Computers have been ranked among the top of similar academic journals in this discipline, and the academic papers published are highly popular among the readers for their novelty, academics, foresight, orientation and practicality.


Indexed & Evaluation

  • The Second National Periodical Award 100 Key Journals
  • Double Effect Journal of China Journal Formation
  • the Core Journal of China (Peking University 2023 Edition)
  • the Core Journal for Science
  • Chinese Science Citation Database (CSCD) Source Journals
  • RCCSE Chinese Core Academic Journals
  • Journal of China Computer Federation
  • 2020-2022 The World Journal Clout Index (WJCI) Report of Scientific and Technological Periodicals
  • Full-text Source Journal of China Science and Technology Periodicals Database
  • Source Journal of China Academic Journals Comprehensive Evaluation Database
  • Source Journals of China Academic Journals (CD-ROM Version), China Journal Network
  • 2017-2019 China Outstanding Academic Journals with International Influence (Natural Science and Engineering Technology)
  • Source Journal of Top Academic Papers (F5000) Program of China's Excellent Science and Technology Journals
  • Source Journal of China Engineering Technology Electronic Information Network and Electronic Technology Literature Database
  • Source Journal of British Science Digest (INSPEC)
  • Japan Science and Technology Agency (JST) Source Journal
  • Russian Journal of Abstracts (AJ, VINITI) Source Journals
  • Full-text Journal of EBSCO, USA
  • Cambridge Scientific Abstracts (Natural Sciences) (CSA(NS)) core journals
  • Poland Copernicus Index (IC)
  • Ulrichsweb (USA)