An Edge Trajectory Protection Approach Using Blockchain

Meiquan Wang, Guangshun Li, Yue Zhang, Keke Gai*, Meikang Qiu

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

With the popularity of edge-based trajectory applications, application providers have accumulated a large amount of user trajectory data. However, direct use of trajectory data containing rich privacy information has the risk of leaking user privacy. In this paper, we propose an edge trajectory protection approach using the technique of blockchain. This protection mechanism not only takes account of users information protection and identity authentication in block generation, but considers the screening mechanism to ensure the integrity of most authorized nodes. We propose trajectory entropy suppression method that combines it with a cost function evaluation sequence and achieve collaboration between regions by deploying smart contracts. Our experimental results demonstrate the efficiency and effectiveness of our proposed model.

Original languageEnglish
Title of host publicationKnowledge Science, Engineering and Management - 14th International Conference, KSEM 2021, Proceedings
EditorsHan Qiu, Cheng Zhang, Zongming Fei, Meikang Qiu, Sun-Yuan Kung
PublisherSpringer Science and Business Media Deutschland GmbH
Pages647-658
Number of pages12
ISBN (Print)9783030821524
DOIs
Publication statusPublished - 2021
Event14th International Conference on Knowledge Science, Engineering and Management, KSEM 2021 - Tokyo, Japan
Duration: 14 Aug 202116 Aug 2021

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume12817 LNAI
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference14th International Conference on Knowledge Science, Engineering and Management, KSEM 2021
Country/TerritoryJapan
CityTokyo
Period14/08/2116/08/21

Keywords

  • Anonymity
  • Blockchain
  • Edge trajectory
  • Location privacy

Fingerprint

Dive into the research topics of 'An Edge Trajectory Protection Approach Using Blockchain'. Together they form a unique fingerprint.

Cite this

Wang, M., Li, G., Zhang, Y., Gai, K., & Qiu, M. (2021). An Edge Trajectory Protection Approach Using Blockchain. In H. Qiu, C. Zhang, Z. Fei, M. Qiu, & S.-Y. Kung (Eds.), Knowledge Science, Engineering and Management - 14th International Conference, KSEM 2021, Proceedings (pp. 647-658). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 12817 LNAI). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-030-82153-1_53