Using Blockchain to Protect Personal Privacy in the Scenario of Online Taxi-hailing
Keywords:
Online taxi-hailing, blockchain, personal privacy protectionAbstract
Personal privacy protection issues has gradually caused widespread concern in society which will lead to economic and reputation losses, hinder network and E-commerce innovation or some other consequences if not handled properly. In this paper, we make use of the de-centralization, permanent and audibility of the blockchain to propose a blockchain-based personal privacy protection mechanism, which uses Online taxi-hailing as the application scenario. We not only provide the details of the blockchain custom transaction domain used by the scene, but also expound the information exchanging and blockchain auditing between passengers, Online taxi-hailing platform and drivers in Online taxi-hailing scene, providing a case model for the blockchain solution to personal privacy protection and a technical mechanism solution for further study of personal privacy protection issues.References
Barlas P., Heavey C., Dagkakis G. (2015); An Open Source Tool for Automated Input Data in Simulation, International Journal of Simulation Modelling, 14(4), 596-608, 2015. https://doi.org/10.2507/IJSIMM14(4)3.306
Chang M.K., Cheung W., Tang M. (2013); Building trust online: Interactions among trust building mechanisms, Information & Management, 50, 439-445, 2013. https://doi.org/10.1016/j.im.2013.06.003
Claassen R. A. (2016); An introduction to bitcoin and blockchain technology, Kaye Scholer LLP, 2016.
Cotet C.E., Popa C.L., Enciu G., Popescu A., Dobrescu T. (2016); Using CAD and Flow Simulation for Educational Platform Design and Optimation, International Journal of Simulation Modelling, 15(1), 5-15, 2016. https://doi.org/10.2507/IJSIMM15(1)1.310
Forte P., Romano D., Schmid G. (2015); Beyond bitcoin part 1: acritical look at blockchain-based systems, IACR Cryptology ePrint Archive:1164, 2015.
Herbert J., Litchfield A. (2015); A Novel Method for Decentralised Peer-to-Peer Software License Validation Using Cryptocurrency Blockchain Technology, Australasian Computer Science Conference, 27-35, 2015.
Kosba A. E., Miller A. J., Shi E., Wen Z., Papamanthou C. (2016); Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts, IEEE symposium on security and privacy, 839-858, 2016.
Lazarovich A. (2015); Invisible Ink : blockchain for data privacy, Thesis: S.M., Massachusetts Institute of Technology, School of Architecture and Planning, Program in Media Arts and Sciences, 2015.
Li M., Tang M. (2013); Information Security Engineering: a Framework for Research and Practices, International Journal of Computers Communications & Control, 8(4), 578-587, 2013. https://doi.org/10.15837/ijccc.2013.4.579
Pilkington M.(2015); Blockchain technology: principles and applications, Social Science Electronic Publishing, 2015.
Shultz B.L. (2015); Certification of witness: mitigating blockchain fork attacks, Undergraduate Thesis in Mathematics, Columbia University in the City of New York, 2015.
Swan M. (2015); Blockchain: Blueprint for a New Economy, O'Reilly Media, Inc. 2015.
Swan M. (2015); Blockchain thinking : the brain as a decentralized autonomous corporation, IEEE Technology & Society Magazine, 34(4), 41-52, 2015. https://doi.org/10.1109/MTS.2015.2494358
Wright A., De Filippi P.(2015); Decentralized Blockchain Technology and the Rise of Lex Cryptographia, Social Science Electronic Publishing, 2015.
Zyskind G., Nathan O., Pentland A.(2015); Decentralizing Privacy: Using Blockchain to Protect Personal Data, Security and Privacy Workshops IEEE, 180-184, 2015
Published
Issue
Section
License
ONLINE OPEN ACCES: Acces to full text of each article and each issue are allowed for free in respect of Attribution-NonCommercial 4.0 International (CC BY-NC 4.0.
You are free to:
-Share: copy and redistribute the material in any medium or format;
-Adapt: remix, transform, and build upon the material.
The licensor cannot revoke these freedoms as long as you follow the license terms.
DISCLAIMER: The author(s) of each article appearing in International Journal of Computers Communications & Control is/are solely responsible for the content thereof; the publication of an article shall not constitute or be deemed to constitute any representation by the Editors or Agora University Press that the data presented therein are original, correct or sufficient to support the conclusions reached or that the experiment design or methodology is adequate.