Smart contract for secure billing in ride-hailing service via blockchain

Ride-hailing service is gaining an increasing popularity due to its great advantages on fare estimation, automatic payments, and reputation ratings. However, how to build the trust between the driver and the passenger and achieve the secure billing still remains an open challenge. This paper proposes a novel secure billing protocol which removes the presence of the online third party by a smart contract on a publicly-verifiable two-party blockchain. In the proposed secure billing protocol, the driver and the passenger generate a blockchain which contains information about the ride. The driver and the passenger measure their own trajectories respectively in rounds. At the end of each round, they exchange their trajectories of the current round. If the difference of trajectories is within a threshold, they jointly compute the fare of current round. After completing the computation, the passenger pays the driver the fare of the current round via a micropayment channel. The driver and the passenger end each round by adding the information generated in this round into the blockchain. The blockchain can be considered as an evidence of the ride since it contains all the information of the ride. We evaluate the performance and the effectiveness of the proposed protocol via extensive experiments and detailed analysis.

[1]  Rajesh K. Gupta,et al.  Sensor localization with deterministic accuracy guarantee , 2011, 2011 Proceedings IEEE INFOCOM.

[2]  Yuan-Shun Dai,et al.  Personalized Search Over Encrypted Data With Efficient and Secure Updates in Mobile Clouds , 2018, IEEE Transactions on Emerging Topics in Computing.

[3]  Srdjan Capkun,et al.  Secure Localization with Hidden and Mobile Base Stations , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[4]  Srdjan Capkun,et al.  Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[5]  Rafail Ostrovsky,et al.  Position-Based Cryptography , 2014, SIAM J. Comput..

[6]  Xuemin Shen,et al.  Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage , 2015, IEEE Transactions on Emerging Topics in Computing.

[7]  Yih-Chun Hu,et al.  Secure and precise location verification using distance bounding and simultaneous multilateration , 2009, WiSec '09.

[8]  Yuguang Fang,et al.  Secure localization and authentication in ultra-wideband sensor networks , 2006, IEEE Journal on Selected Areas in Communications.

[9]  Josep Domingo-Ferrer,et al.  Co-utile P2P ridesharing via decentralization and reputation management , 2016 .

[10]  Ran Canetti,et al.  Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.

[11]  Jean-Pierre Hubaux,et al.  PrivateRide: A Privacy-Enhanced Ride-Hailing Service , 2017, Proc. Priv. Enhancing Technol..

[12]  Athanasios V. Vasilakos,et al.  Multimedia Processing Pricing Strategy in GPU-Accelerated Cloud Computing , 2020, IEEE Transactions on Cloud Computing.

[13]  Yong Guan,et al.  Lightweight Location Verification Algorithms for Wireless Sensor Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.

[14]  Rafail Ostrovsky,et al.  Position-Based Quantum Cryptography: Impossibility and Constructions , 2011, IACR Cryptol. ePrint Arch..

[15]  Ran Canetti,et al.  Universally composable signature, certification, and authentication , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..

[16]  Mikhail Nesterenko,et al.  Secure Location Verification Using Radio Broadcast , 2004, IEEE Transactions on Dependable and Secure Computing.

[17]  David Brumley,et al.  GPS software attacks , 2012, CCS.

[18]  Ran Canetti,et al.  Security and composition of cryptographic protocols: a tutorial (part I) , 2006, SIGA.

[19]  Yong Xiang,et al.  Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data , 2020, IEEE Transactions on Cloud Computing.

[20]  David A. Wagner,et al.  Secure verification of location claims , 2003, WiSe '03.

[21]  Kotagiri Ramamohanarao,et al.  Optimal Pick up Point Selection for Effective Ride Sharing , 2017, IEEE Transactions on Big Data.

[22]  Srdjan Capkun,et al.  On the requirements for successful GPS spoofing attacks , 2011, CCS '11.

[23]  Serge Fehr,et al.  One-Sided Device-Independent QKD and Position-Based Cryptography from Monogamy Games , 2013, EUROCRYPT.

[24]  Bart Preneel,et al.  Location verification using secure distance bounding protocols , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[25]  Christof Paar,et al.  Secure Location Verification , 2010 .