论文标题

分散的区块链,用于保护隐私的大规模接触跟踪

Decentralized Blockchain for Privacy-Preserving Large-Scale Contact Tracing

论文作者

Lv, Wenzhe, Wu, Sheng, Jiang, Chunxiao, Cui, Yuanhao, Qiu, Xuesong, Zhang, Yan

论文摘要

使用短距离通信(SRC)技术的活动跟踪应用程序和基于位置的服务在COVID-19大流行中突然要求,尤其是对于自动接触跟踪。公众和政策的关注不断提出相关的实际问题,包括\ textit {1)如何保护数据安全和位置隐私? 2)如何有效,动态地部署SRC Internet(IoT)证人来监视大区域?}回答这些问题,在本文中,我们提出了一个分散且无许可的区块链协议,名为\ textit {bychain}。具体而言,1)通过连接交互式零知识证明协议和密钥托管机制,开发了用于活动跟踪和相应广义块结构的隐私性SRC协议。结果,个人身份与链上位置信息的所有权之间的联系被解耦。同时,链接位置数据的所有者仍然可以索取其所有权,而无需向其他任何人透露私钥。 2)提出了一种基于人造的基于现场的激励分配机制,以激励物联网证人追求最大的监视覆盖范围。我们使用蓝牙5.0在现实世界中实施并评估了所提出的区块链协议。分析了每个程序的存储,CPU利用率,功耗,时间延迟以及活动的安全性和安全性。证明实验和安全分析可提供实际的绩效评估。

Activity-tracking applications and location-based services using short-range communication (SRC) techniques have been abruptly demanded in the COVID-19 pandemic, especially for automated contact tracing. The attention from both public and policy keeps raising on related practical problems, including \textit{1) how to protect data security and location privacy? 2) how to efficiently and dynamically deploy SRC Internet of Thing (IoT) witnesses to monitor large areas?} To answer these questions, in this paper, we propose a decentralized and permissionless blockchain protocol, named \textit{Bychain}. Specifically, 1) a privacy-preserving SRC protocol for activity-tracking and corresponding generalized block structure is developed, by connecting an interactive zero-knowledge proof protocol and the key escrow mechanism. As a result, connections between personal identity and the ownership of on-chain location information are decoupled. Meanwhile, the owner of the on-chain location data can still claim its ownership without revealing the private key to anyone else. 2) An artificial potential field-based incentive allocation mechanism is proposed to incentivize IoT witnesses to pursue the maximum monitoring coverage deployment. We implemented and evaluated the proposed blockchain protocol in the real-world using the Bluetooth 5.0. The storage, CPU utilization, power consumption, time delay, and security of each procedure and performance of activities are analyzed. The experiment and security analysis is shown to provide a real-world performance evaluation.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源