Anonymous Authentication on Trust in Blockchain-Based Mobile Crowdsourcing

Wei Feng, Zheng Yan*, Laurence T. Yang, Qinghua Zheng

*Corresponding author for this work

Research output: Contribution to journalArticleScientificpeer-review

Abstract

Mobile crowdsourcing (MCS) has become an effective data collection method due to its mobility, low cost, and flexibility. However, since centralized MCS confronts severe security and privacy risks in reality, many researchers are devoted to building a decentralized MCS system based on blockchain. Despite the effectiveness of these schemes, they fail to offer anonymous authentication on the trust of MCS nodes, although privacy is a main concern in MCS and trust plays an important role in a series of MCS activities such as worker selection and truth discovery. Nevertheless, anonymous authentication on trust is not a trivial issue since trust evaluation usually conflicts with anonymity, which is a necessary privacy requirement in an open MCS environment. To tackle this problem, we leverage Intel Software Guard Extension (SGX) and propose a scheme to anonymously authenticate trust with trustworthy trust evaluation in a blockchain-based MCS system. The scheme employs an SGX-enabled cloud server to periodically alter user public/private key pairs and mix newly altered keys among a number of faked keys in order to ensure unlinkability. Besides, we consider the unique features of MCS and work out a novel trust evaluation method by aggregating both subjective feedback and objective behaviors. Finally, we conduct several analyses and experiments to illustrate its security and efficiency.
Original languageEnglish
Number of pages18
JournalIEEE Internet of Things Journal
DOIs
Publication statusE-pub ahead of print - 2020
MoE publication typeA1 Journal article-refereed

Keywords

  • Anonymous authentication
  • Mobile crowdsourcing
  • Trust
  • Blockchain

Fingerprint Dive into the research topics of 'Anonymous Authentication on Trust in Blockchain-Based Mobile Crowdsourcing'. Together they form a unique fingerprint.

Cite this