Advertisement

Distributed Privacy Preserving Platform for Ridesharing Services

  • Yevhenii Semenko
  • Damien SaucezEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11611)

Abstract

The sharing economy fundamentally changed business and social interactions. Interestingly, while in essence this form of collaborative economy allows people to directly interact with each other, it is also at the source of the advent of eminently centralized platforms and marketplaces, such as Uber and Airbnb. One may be concerned with the risk of giving the control of a market to a handful of actors that may unilaterally fix their own rules and threaten privacy. In this paper, we propose a decentralized ridesharing architecture which gives the opportunity to shift from centralized platforms to decentralized ones. Digital communications in our proposition are specifically designed to preserve data privacy and avoid any form of centralization. We integrate a blockchain in our proposition to guarantee the essential roles of a marketplace, but in a decentralized way. Our numerical evaluation quantifies the advantages and limits of decentralization and our Android implementation shows the feasibility of our proposition.

Keywords

Data privacy Decentralized Sharing economy Blockchain Peer-to-peer 

Notes

Acknowledgments

This work has been supported by the project Data Privacy funded by the IDEX of Université Côte d’Azur.

References

  1. 1.
    Arcade City: The Future of Ridesharing Is Decentralized. https://fee.org/articles/arcade-city-the-future-of-ridesharing-is-decentralized/
  2. 2.
    Hailing Rides Down Crypto Lane: The Future Of Ridesharing. https://www.forbes.com/sites/andrewrossow/2018/07/18/hailing-rides-down-crypto-lane-the-future-of-ridesharing/. Accessed 11 December 2018
  3. 3.
    LaZooz. http://lazooz.org. Accessed 11 December 2018
  4. 4.
    Spring Framework. https://spring.io. Accessed 14 February 2019
  5. 5.
    TNCs TODAY. http://tncstoday.sfcta.orgtncstoday.sfcta.org. Accessed 17 August 2018
  6. 6.
    Aïvodji, U.M., Gambs, S., Huguet, M.J., Killijian, M.O.: Meeting points in ridesharing: A privacy-preserving approach. Transp. Res. Part C Emerg. Technol. 72, 239–253 (2016)CrossRefGoogle Scholar
  7. 7.
    Cadwalladr, C., Graham-Harrison, E.: Revealed: 50 million facebook profiles harvested for Cambridge analytica in major data breach. The Guardian 17 (2018)Google Scholar
  8. 8.
    Dai, C., Yuan, X., Wang, C.: Privacy-preserving ridesharing recommendation in geosocial networks. In: Nguyen, H.T.T., Snasel, V. (eds.) CSoNet 2016. LNCS, vol. 9795, pp. 193–205. Springer, Cham (2016).  https://doi.org/10.1007/978-3-319-42345-6_17CrossRefGoogle Scholar
  9. 9.
    Fletcher, D.: How facebook is redefining privacy (2010)Google Scholar
  10. 10.
    Goel, P., Kulik, L., Ramamohanarao, K.: Privacy-aware dynamic ride sharing. ACM Trans. Spat. Algorithms Syst. (TSAS) 2(1), 4 (2016)Google Scholar
  11. 11.
    Lua, E.K., Crowcroft, J., Pias, M., Sharma, R., Lim, S.: A survey and comparison of peer-to-peer overlay network schemes. IEEE Commun. Surv. Tutor. 7(2), 72–93 (2005)CrossRefGoogle Scholar
  12. 12.
    Maymounkov, P., Mazières, D.: Kademlia: A peer-to-peer information system based on the XOR metric. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 53–65. Springer, Heidelberg (2002).  https://doi.org/10.1007/3-540-45748-8_5CrossRefzbMATHGoogle Scholar
  13. 13.
    Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008)Google Scholar
  14. 14.
    Pham, T.V.A., Dacosta Petrocelli, I.I., Endignoux, G.F.M., Troncoso-Pastoriza, J.R., Huguenin, K., Hubaux, J.P.: Oride: A privacy-preserving yet accountable ride-hailing service. In: Proceedings of the 26th USENIX Security Symposium (2017), http://infoscience.epfl.ch/record/228219
  15. 15.
    Piorkowski, M., Sarafijanovoc-Djukic, N., Grossglauser, M.: A parsimonious model of mobile partitioned networks with clustering. In: The First International Conference on COMmunication Systems and NETworkS (COMSNETS), January 2009. http://www.comsnets.org
  16. 16.
    Robbins, J.M., Sechooler, A.M.: Once more unto the breach: What the equifax and uber data breaches reveal about the intersection of information security and the enforecement of securities laws. Crim. Justice 33(1), 4–7 (2018)Google Scholar
  17. 17.
    Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)MathSciNetCrossRefGoogle Scholar
  18. 18.
    Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: A scalable peer-to-peer lookup service for internet applications. ACM SIGCOMM Comput. Commun. Rev. 31(4), 149–160 (2001)CrossRefGoogle Scholar
  19. 19.
    Tapscott, D., Tapscott, A.: Blockchain revolution: How the technology behindbitcoin is changing money, business, and the world. Penguin (2016)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Université Côte d’AzurInriaFrance

Personalised recommendations