Solution Probing Attack Against Coin Mixing Based Privacy-Preserving Crowdsourcing Platforms

被引:0
|
作者
Mao, Yunlong [1 ]
Dang, Ziqin [1 ]
Wang, Heng [2 ]
Zhang, Yuan [1 ]
Zhong, Sheng [1 ]
机构
[1] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210023, Peoples R China
[2] Pony AI, Beijing 100023, Peoples R China
基金
中国国家自然科学基金;
关键词
Crowdsourcing; Task analysis; Blockchains; Encryption; Data models; Smart contracts; Estimation; Crowdsourcing security; probing attacks; coin mixing; decentralized platform;
D O I
10.1109/TDSC.2024.3355453
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Conventional crowdsourcing platforms primarily rely on a central server as the broker for information exchange. Although many efforts have been made, centralized platforms are still vulnerable to underlying security issues, such as an untrusted central server and single-point failure. Fortunately, blockchain has emerged as an alternative infrastructure for building crowdsourcing platforms. Many excellent designs of blockchain-based decentralized crowdsourcing (BDCS) solutions have been proposed. Benefiting from blockchain, BDCS can provide fascinating features, like tampering resistance and anonymity. However, a new attack surface appears in BDCS. Recently, a new attack against BDCS named solution probing attack has been identified. The solution-probing adversary can take advantage of the anonymity of BDCS to probe valid solutions using a generative model. Due to the transparency of blockchain transactions, the probing attack is effective even if solutions are encrypted. Nevertheless, we find transaction-mixing techniques effective in defending against probing attacks. In this article, we introduce the solution probing attack and an improved variant, which can attack coin mixing-based BDCS. We evaluate probing attacks on large-scale crowdsourcing tasks. Experimental results show that the adversary is capable of deceiving BDCS with a limited number of probing, even if the BDCS is protected by solution encryption and coin mixing techniques.
引用
收藏
页码:4684 / 4698
页数:15
相关论文
共 50 条
  • [41] DCentroid: Location Privacy-Preserving Scheme in Spatial Crowdsourcing
    Alharthi, Raed
    Aloufi, Esam
    Alqazzaz, Ali
    Alrashdi, Ibrahim
    Zohdy, Mohamed
    2019 IEEE 9TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2019, : 715 - 720
  • [42] Location Privacy-Preserving Distance Computation for Spatial Crowdsourcing
    Han, Song
    Lin, Jianhong
    Zhao, Shuai
    Xu, Guangquan
    Ren, Siqi
    He, Daojing
    Wang, Licheng
    Shi, Leyun
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (08): : 7550 - 7563
  • [43] Optimizing rewards allocation for privacy-preserving spatial crowdsourcing
    Xiong, Ping
    Zhu, Danyang
    Zhang, Lefeng
    Ren, Wei
    Zhu, Tianqing
    COMPUTER COMMUNICATIONS, 2019, 146 : 85 - 94
  • [44] Secure Application of MIoT: Privacy-Preserving Solution for Online English Education Platforms
    Yin, Jiming
    Cui, Jie
    APPLIED SCIENCES-BASEL, 2023, 13 (14):
  • [45] Attack on the Privacy-Preserving Carpooling Service TAROT
    Vargheese, Meghana
    Vivek, Srinivas
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2023, 14424 LNCS : 249 - 258
  • [46] Attack on the Privacy-Preserving Carpooling Service TAROT
    Vargheese, Meghana
    Vivek, Srinivas
    INFORMATION SYSTEMS SECURITY, ICISS 2023, 2023, 14424 : 249 - 258
  • [47] Cross the Chasm: Scalable Privacy-Preserving Federated Learning against Poisoning Attack
    Li, Yiran
    Hu, Guiqiang
    Liu, Xiaoyuan
    Ying, Zuobin
    2021 18TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2021,
  • [48] PPNNI: Privacy-Preserving Neural Network Inference Against Adversarial Example Attack
    He, Guanghui
    Ren, Yanli
    He, Gang
    Feng, Guorui
    Zhang, Xinpeng
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (06) : 4083 - 4096
  • [49] Lightweight asymmetric privacy-preserving authentication protocols secure against active attack
    Cui, Yang
    Kobara, Kazukuni
    Matsuura, Kanta
    Imai, Hideki
    FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2007, : 223 - +
  • [50] Efficient Privacy-Preserving Fingerprint-based Indoor Localization using Crowdsourcing
    Armengol, Patrick
    Tobkes, Rachelle
    Akkaya, Kemal
    Ciftler, Bekir S.
    Guvenc, Ismail
    2015 IEEE 12TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS), 2015, : 549 - 554