[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

ConGradetect: : Blockchain-based detection of code and identity privacy vulnerabilities in crowdsourcing

Published: 01 March 2021 Publication History

Abstract

At present, various types of code vulnerabilities lead to a huge workload of detection. Although multi-party cooperation detection methods can be applied to improve efficiency, common crowdsourcing models are difficult to guarantee the privacy of code and identity. We design a code and identity privacy vulnerability crowdsourcing detection system ConGradetect. The system is built on a blockchain and solves code privacy issues, identity privacy issues, and reward preemption issues during the crowdsourcing detection process of vulnerabilities. In ConGradetect, users have a dynamic fake identity, which ensures that the identity of the user is not exposed, thereby avoiding the problem of information exposure caused by data accumulation. In the meantime, ConGradetect uses a local code granulation tool to perform off-line code cutting for task publishers, and uses proxy re-encryption to allocate task code blocks to ensure that the complete original code is only known to the code owner. When the task is received, a trusted key conversion is performed using smart contract. Further, we propose a method for anonymous verification of the binding relationship between task and user to prevent reward preemption and ensure that task performers can obtain corresponding legal benefits. Finally, we run the system on the Ethereum blockchain and test its performance. After testing, the feasibility of ConGradetect is proved.

References

[1]
Singh Amritraj, Parizi Reza M., Zhang Qi, Choo Kim-Kwang Raymond, Dehghantanha Ali, Blockchain smart contracts formalization: Approaches and challenges to address vulnerabilities, Comput. Secur. 88 (2020).
[2]
Fu Menglin, Wu Lifa, Hong Zheng, Zhu Feng, Sun He, Feng Wenbo, A critical-path-coverage-based vulnerability detection method for smart contracts, IEEE Access 7 (2019) 147327–147344.
[3]
Hasanova Huru, Baek Ui-Jun, Shin Mu-Gon, Cho Kyunghee, Kim Myung-Sup, A survey on blockchain cybersecurity vulnerabilities and possible countermeasures, Int. J. Netw. Manage. 29 (2) (2019).
[4]
Wang Shaofei, Dang Depeng, Incentive mechanism for the listing item task in crowdsourcing, Inform. Sci. 512 (2020) 80–95.
[5]
Park Jeman, Choi Jinchun, Nyang DaeHun, Mohaisen Aziz, Transparency in the new gTLD era: Evaluating the DNS centralized zone data service, IEEE Trans. Netw. Serv. Manage. 16 (4) (2019) 1782–1796.
[6]
Sharma Vishal, You Ilsun, Jayakody Dushantha Nalin K., Atiquzzaman Mohammed, Cooperative trust relaying and privacy preservation via edge-crowdsourcing in social internet of things, Future Gener. Comput. Syst. 92 (2019) 758–776.
[7]
Afzal Muhammad, Huang Qi, Amin Waqas, Umer Khalid, Raza Asif, Naeem Muhammad, Blockchain enabled distributed demand side management in community energy system with smart homes, IEEE Access 8 (2020) 37428–37439.
[8]
Khacef Kahina, Pujolle Guy, Secure peer-to-peer communication based on blockchain, in: Barolli Leonard, Takizawa Makoto, Xhafa Fatos, Enokido Tomoya (Eds.), AINA Workshops 2019, in: Advances in Intelligent Systems and Computing, vol. 927, Springer, 2019, pp. 662–672.
[9]
Jiang Shan, Cao Jiannong, McCann Julie A., Yang Yanni, Liu Yang, Wang Xiaoqing, Deng Yuming, Privacy-preserving and efficient multi-keyword search over encrypted data on blockchain, in: IEEE International Conference on Blockchain, IEEE, 2019, pp. 405–410.
[10]
Azaria Asaph, Ekblaw Ariel, Vieira Thiago, Lippman Andrew, Medrec: Using blockchain for medical data access and permission management, in: Awan Irfan, Younas Muhammad (Eds.), 2nd International Conference on Open and Big Data, OBD 2016, Vienna, Austria, August 22-24, 2016, IEEE Computer Society, 2016, pp. 25–30.
[11]
Buldas Ahto, Laanoja Risto, Truu Ahto, Keyless signature infrastructure and PKI: hash-tree signatures in pre- and post-quantum world, IJSTM 23 (1/2) (2017) 117–130.
[12]
Mousavi Reza, Stewart Maya, Amazon mechanical turk and the reconfiguration of relations of data production, in: Krcmar Helmut, Fedorowicz Jane, Boh Wai Fong, Leimeister Jan Marco, Wattal Sunil (Eds.), Proceedings of the 40th International Conference on Information Systems, ICIS 2019, Association for Information Systems, 2019.
[13]
McInnis Brian James, Cosley Dan, Nam Chaebong, Leshed Gilly, Taking a HIT: Designing around rejection, mistrust, risk, and workers’ experiences in amazon mechanical turk, in: Kaye Jofish, Druin Allison, Lampe Cliff, Morris Dan, Hourcade Juan Pablo (Eds.), Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, ACM, 2016, pp. 2271–2282.
[14]
Li Z., Barenji A.V., Huang G.Q., Toward a blockchain cloud manufacturing system as a peer to peer distributed network platform, Robot. Comput.-Integr. Manuf. 54 (2018) 133–144.
[15]
T. Hepp, M. Sharinghousen, P. Ehret, et al., On-chain vs. off-chain storage for supply-and blockchain integration, IT-Inf. Technol. 60 (2018) 283–291.
[16]
Buldas Ahto, Laanoja Risto, Truu Ahto, Efficient quantum-immune keyless signatures with identity, IACR Cryptol. ePrint Arch. 2014 (2014) 321.
[17]
Bogner Andreas, Chanson Mathieu, Meeuw Arne, A decentralised sharing app running a smart contract on the ethereum blockchain, in: Schneegass Stefan, Schmidt Albrecht, Michahelles Florian, Kritzler Mareike, Ilic Alexander, Kunze Kai (Eds.), Proceedings of the 6th International Conference on the Internet of Things, IOT 2016, ACM, 2016, pp. 177–178.
[18]
Zhang Yinghui, Deng Robert H., Liu Ximeng, Zheng Dong, Blockchain based efficient and robust fair payment for outsourcing services in cloud computing, Inform. Sci. 462 (2018) 262–277.
[19]
Zheng Huang, Li Xiangxue, Lai Xuejia, Chen Kefei, Blockchain technology and its applications, J. Inf. Secur. Res. (2017).
[20]
Lu Yuan, Tang Qiang, Wang Guiling, Zebralancer: Private and anonymous crowdsourcing system atop open blockchain, in: 38th IEEE International Conference on Distributed Computing Systems, ICDCS 2018, IEEE Computer Society, 2018, pp. 853–865.
[21]
Ding Qingyang, Gao Sheng, Zhu Jianming, Yuan Chongxuan, Permissioned blockchain-based double-layer framework for product traceability system, IEEE Access 8 (2020) 6209–6225.
[22]
Yin Hui, Xiong Yinqiao, Deng Tiantian, Deng Hua, Zhu Peidong, A privacy-preserving and identity-based personalized recommendation scheme for encrypted tasks in crowdsourcing, IEEE Access 7 (2019) 138857–138871.
[23]
Yuan Dong, Li Qi, Li Guoliang, Wang Qian, Ren Kui, Priradar: A privacy-preserving framework for spatial crowdsourcing, IEEE Trans. Inf. Forensics Secur. 15 (2020) 299–314.
[24]
Maruseac Mihai, Ghinita Gabriel, Avci Besim, Trajcevski Goce, Scheuermann Peter, Privacy-preserving detection of anomalous phenomena in crowdsourced environmental sensing, in: Claramunt Christophe, Schneider Markus, Wong Raymond Chi-Wing, Xiong Li, Loh Woong-Kee, Shahabi Cyrus, Li Ki-Joune (Eds.), Advances in Spatial and Temporal Databases - 14th International Symposium, SSTD 2015, in: Lecture Notes in Computer Science, vol. 9239, Springer, 2015, pp. 313–332.
[25]
Wang Yingjie, Cai Zhipeng, Tong Xiangrong, Gao Yang, Yin Guisheng, Truthful incentive mechanism with location privacy-preserving for mobile crowdsourcing systems, Comput. Netw. 135 (2018) 32–43.
[26]
Shu Jiangang, Liu Ximeng, Jia Xiaohua, Yang Kan, Deng Robert H., Anonymous privacy-preserving task matching in crowdsourcing, IEEE Internet Things J. 5 (4) (2018) 3068–3078.
[27]
Shu Jiangang, Yang Kan, Jia Xiaohua, Liu Ximeng, Wang Cong, Deng Robert, Proxy-free privacy-preserving task matching with efficient revocation in crowdsourcing, IEEE Trans. Dependable Secure Comput. (2018) 1.
[28]
Pawlak Michal, Guziur Jakub, Poniszewska-Maranda Aneta, Towards the blockchain technology for ensuring the integrity of data storage and transmission, in: Panetto Hervé, Debruyne Christophe, Proper Henderik A., Ardagna Claudio Agostino, Roman Dumitru, Meersman Robert (Eds.), On the Move to Meaningful Internet Systems. OTM 2018 Conferences - Confederated International Conferences: CoopIS, C&TC, and ODBASE 2018, in: Lecture Notes in Computer Science, vol. 11230, Springer, 2018, pp. 297–304.
[29]
Hao Kun, Xin Junchang, Wang Zhiqiong, Cao Keyan, Wang Guoren, Blockchain-based outsourced storage schema in untrusted environment, IEEE Access 7 (2019) 122707–122721.
[30]
Huang Yongfeng, Bian Yiyang, Li Renpu, Zhao J. Leon, Shi Peizhong, Smart contract security: A software lifecycle perspective, IEEE Access 7 (2019) 150184–150202.
[31]
Liu Jing, Liu Zhen-Tian, A survey on security verification of blockchain smart contracts, IEEE Access 7 (2019) 77894–77904.
[32]
Wu Yiming, Tang Shaohua, Zhao Bowen, Peng Zhiniang, BPTM: Blockchain-based privacy-preserving task matching in crowdsourcing, IEEE Access 7 (2019) 45605–45617.
[33]
Zhu Saide, Hu Huafu, Li Yingshu, Li Wei, Hybrid blockchain design for privacy preserving crowdsourcing platform, in: IEEE International Conference on Blockchain, IEEE, 2019, pp. 26–33.
[34]
Qian Chen, Lossy Trapdoor Primitives, Zero-Knowledge Proofs and Applications. (Les Primitives Lossy Trapdoor, Preuve à Divulgation Nulle de Connaissance et Applications), (Ph.D. thesis) University of Rennes 1, France, 2019.
[35]
Guo Hui, Zhang Zhenfeng, Xu Jing, An Ningyu, Non-transferable proxy re-encryption, Comput. J. 62 (4) (2019) 490–506.
[36]
Kawai Yutaka, Matsuda Takahiro, Hirano Takato, Koseki Yoshihiro, Hanaoka Goichiro, Proxy re-encryption that supports homomorphic operations for re-encrypted ciphertexts, IEICE Trans. 102-A (1) (2019) 81–98.
[37]
Hong Huiting, Li Xin, He Daqing, Zhang Yiwei, Wang Mingzhong, Crowdsourcing incentives for multi-hop urban parcel delivery network, IEEE Access 7 (2019) 26268–26277.
[38]
Liu Tonglai, Wu Jigang, Chen Long, Wu Yalan, Li Yinan, Smart contract-based long-term auction for mobile blockchain computation offloading, IEEE Access 8 (2020) 36029–36042.
[39]
Li Ya-Nan, Feng Xiaotao, Xie Jan, Feng Hanwen, Guan Zhenyu, Wu Qianhong, A decentralized and secure blockchain platform for open fair data trading, Concurr. Comput. Pract. Exp. 32 (7) (2020).
[40]
Wan Changsheng, Zhang Juan, SCRPM: securing crowdsourcing-based road pavement monitoring system with location privacy, Wirel. Netw. 26 (2) (2020) 1139–1149.
[41]
Sari Asli, Tosun Ayse, Alptekin Gülfem Isiklar, A systematic literature review on crowdsourcing in software engineering, J. Syst. Softw. 153 (2019) 200–219.
[42]
Ferrag Mohamed Amine, Derdour Makhlouf, Mukherjee Mithun, Derhab Abdelouahid, Maglaras Leandros A., Janicke Helge, Blockchain technologies for the internet of things: Research issues and challenges, IEEE Internet Things J. 6 (2) (2019) 2188–2204.
[43]
Xu Yanwei, Liu Hanwen, Yan Chao, A privacy-preserving exception handling approach for dynamic mobile crowdsourcing applications, EURASIP J. Wirel. Commun. Netw. 2019 (2019) 113.
[44]
Ma Zhuo, Zhang Junwei, Guo Yongzhen, Liu Yang, Liu Ximeng, He Wei, An efficient decentralized key management mechanism for VANET with blockchain, IEEE Trans. Veh. Technol. 69 (6) (2020) 5836–5849.
[45]
Ma Zhuo, Ge Haoran, Wang Zhuzhu, Liu Yang, Liu Ximeng, Droidetec: Android malware detection and malicious code localization through deep learning, 2020, CoRR, abs/2002.03594.
[50]
Selvi S. Sharmila Deva, Paul Arinjita, Dirisala Siva, Basu Saswata, Rangan C. Pandu, Sharing of encrypted files in blockchain made simpler, IACR Cryptol. ePrint Arch. 2019 (2019) 418.
[51]
PBC library with golang, 2017, https://github.com/Nik-U/pbc.
[52]
PBC library with javascript, 2017, https://github.com/herumi/mcl-wasm.

Index Terms

  1. ConGradetect: Blockchain-based detection of code and identity privacy vulnerabilities in crowdsourcing
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Please enable JavaScript to view thecomments powered by Disqus.

            Information & Contributors

            Information

            Published In

            cover image Journal of Systems Architecture: the EUROMICRO Journal
            Journal of Systems Architecture: the EUROMICRO Journal  Volume 114, Issue C
            Mar 2021
            258 pages

            Publisher

            Elsevier North-Holland, Inc.

            United States

            Publication History

            Published: 01 March 2021

            Author Tags

            1. Crowdsourcing
            2. Code privacy
            3. Identity privacy
            4. Blockchain

            Qualifiers

            • Research-article

            Contributors

            Other Metrics

            Bibliometrics & Citations

            Bibliometrics

            Article Metrics

            • 0
              Total Citations
            • 0
              Total Downloads
            • Downloads (Last 12 months)0
            • Downloads (Last 6 weeks)0
            Reflects downloads up to 12 Jan 2025

            Other Metrics

            Citations

            View Options

            View options

            Media

            Figures

            Other

            Tables

            Share

            Share

            Share this Publication link

            Share on social media