Blockchain–Based Location Proof Generation and Verification

In location–sensitive applications, service providers need to verify the location of users in order to provide them with access to a service or benefit. This provides dishonest users with an incentive to cheat on their location by submitting fake location claims. To address this issue, a number of location proof mechanisms have been proposed in literature to date. However, they are faced with different security and privacy challenges. In this paper, we utilize the unique features of the blockchain technology to design a decentralized architecture in which mobile users act as witnesses and generate location proofs for other users. In the proposed scheme, a location proof is issued as part of a transaction that is broadcasted into a peer–to–peer network where it can be picked up by verifiers for further verification. Once a transaction is successfully verified, it is stored in a public ledger. Our security and privacy analysis shows that the proposed scheme preserves users’ privacy and achieves a reliable performance against Prover–Prover and Prover–Witness collusions. Moreover, our prototype implementation on the Android platform shows that the location proof generation process in the proposed scheme is faster than the current decentralized schemes and requires low computational resources.

[1]  Alec Wolman,et al.  Enabling new mobile applications with location proofs , 2009, HotMobile '09.

[2]  Maria Luisa Damiani,et al.  Location privacy models in mobile applications: conceptual view and research directions , 2014, GeoInformatica.

[3]  Reza Curtmola,et al.  LINK: Location Verification through Immediate Neighbors Knowledge , 2010, MobiQuitous.

[4]  Serge Vaudenay,et al.  The Bussard-Bagga and Other Distance-Bounding Protocols under Attacks , 2012, Inscrypt.

[5]  Jing Chen,et al.  CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.

[6]  Sanjay Jha,et al.  I Am Alice, I Was in Wonderland: Secure Location Proof Generation and Verification Protocol , 2016, 2016 IEEE 41st Conference on Local Computer Networks (LCN).

[7]  Hai Liu,et al.  Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[8]  Shui Yu,et al.  Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data , 2016, IEEE Access.

[9]  Gang Wang,et al.  On the validity of geosocial mobility traces , 2013, HotNets.

[10]  Guohong Cao,et al.  APPLAUS: A Privacy-Preserving Location Proof Updating System for location-based services , 2011, 2011 Proceedings IEEE INFOCOM.

[11]  Elaine Shi,et al.  Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[12]  Matthew K. Franklin,et al.  Privacy-preserving alibi systems , 2012, ASIACCS '12.

[13]  Abdelhakim Hafid,et al.  K-anonymous location-based fine-grained access control for mobile cloud , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[14]  Prasant Mohapatra,et al.  STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users , 2016, IEEE/ACM Transactions on Networking.

[15]  Serge Vaudenay,et al.  Challenges in Distance Bounding , 2015, IEEE Security & Privacy.

[16]  Björn Scheuermann,et al.  Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies , 2016, IEEE Communications Surveys & Tutorials.

[17]  Sébastien Gambs,et al.  PROPS: A PRivacy-Preserving Location Proof System , 2014, 2014 IEEE 33rd International Symposium on Reliable Distributed Systems.

[18]  Harry Halpin,et al.  Introduction to Security and Privacy on the Blockchain , 2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).

[19]  Leandros Tassiulas,et al.  Stochastic Models and Wide-Area Network Measurements for Blockchain Design and Analysis , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.

[20]  Laurent Bussard,et al.  Distance-Bounding Proof of Knowledge to Avoid Real-Time Attacks , 2005, SEC.

[21]  Serge Vaudenay,et al.  Practical and provably secure distance-bounding , 2013, J. Comput. Secur..