Report Final

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 50

A PRELIMENERY REPORT ON

PEER-TO-PEER CAR SHARING

SUBMITTED TO THE SAVITRIBAI PHULE PUNE UNIVERSITY,


PUNE IN THE PARTIAL FULFILLMENT OF THE REQUIREMENTS
FOR THE AWARD OF THE DEGREE

OF

BACHELOR OF ENGINEERING (COMPUTER ENGINEERING)


SUBMITTED BY

STUDENT NAME Exam No:

1. Mr. ADARSH BIRHADE 72206543E

2. Miss. VAISHNAVI NANDU GHODE 72206551F

DEPARTMENT OF COMPUTER ENGINEERING

AAEMF AL-AMEEN COLLEGE OF


ENGINEERING
SHARAD CAMPUS, KORGAON BHIMA, PUNE 412216
SAVITRIBAI PHULE PUNE UNIVERSITY
2023 -2024
CERTIFICATE

This is to certify that the project report entitles.

“PEER TO PEER CAR SHARING”

Submitted by

STUDENT NAME Exam No

1. Mr. ADARSH BIRHADE72206543E

2. Miss. VAISHNAVI NANDU GHODE 72206551F

is a bonafide student of this institute and the work has been carried out by him/her under the supervision of Prof.
and it is approved for the partial fulfillment of the requirement of Savitribai Phule Pune University, for the
award of the degree of Bachelor of Engineering (Computer Engineering).

(Prof.Deokate V.P) (Prof.)


Guide Head,
Department of Computer Engineering Department of Computer

(Dr. J.N. Shinde)


Principal,
Al-Ameen College of Engineering Pune – 412216

Place : Pune
Date :
ACKNOWLEDGEMENT

This has been the light of the day due to invaluable contribution of certain
indi- viduals whose constant guidance, support and encouragement resulted in the
real- ization of our project.

We are grateful to our Guide Prof.Deokate V.P of Computer En- gineering, for
providing us the necessary help and en- couragement whenever we needed, which
has resulted in the success of our project.

We take this opportunity to thank, Principal of P K Technical Campus,


Chakan, Pune for providing a healthy environment in the college, which helped us
in concen- trating on our task.

We would also like to thank all the staff members of our department, Without
whose constructive suggestions and valuable advice, the simple idea, which had
borne by us, would not have been able to blossom forth to give such a beautiful
bloom.

Last but not the least, we are grateful to all our friends and our parents for
their direct or indirect constant moral support throughout the course of this
project.

Mr. ADARSH BIRHADE


Miss. VAISHNAVI NANDU GHODE
Bachelor of Engineering (Computer Engineering)

Date:
Place :
Abstract

Blockchain technology is a distributed, decentralized public ledger


that allows peer-to-peer transactions in a secured way without any third
party. This project proposes a blockchain-based framework from the ex-
isting centralized framework for a ride-sharing service and implements
the same as a decentralized application (DApp) based on smart
contracts on Ethereum Blockchain. Using smart contracts facilitate the
users with automated transactions, removes the intermediaries, and
enables various activities to be carried out safely and securely.
Implementation of smart contracts is done using the Solidity
programming language. This DApp uses the min matching algorithm to
match riders requesting rideshare to save total travel distance. With the
overwhelming growth in the usage of cryptocurrencies, smart contracts
usage in applications as proposed in this paper can transform the
sharing economy.Car-sharing systems can solve various urban problems
by providing shared vehicles to people and reducing the operation of
personal vehicles. With the Internet of Things development, people can
easily use a shared car through simple opera- tions on their mobile
devices. However, the car-sharing system has secu- rity problems.
Sensitive information, such as the user’s identity, location information, and
access code, is transmitted through a public channel for car-sharing.
Hence, an attacker can access this information for ille- gal purposes,
making the establishment of a secure authentication pro- tocol
essential.This study designed a decentralized car-sharing scheme using
blockchain. Specifically, blockchain technology was used to pro- vide a
decentralization car-sharing service and ensure data integrity. The
participant entities of the proposed system can be authenticated anony-
mously. The proposed car-sharing system can be secured against various
attacks and provide mutual authentication using informal analysis.

Keywords:- Keywords:- Car Sharing, Automobiles, Authentication, Blockchain.

i
INDEX

1 Introduction 1
1.1 Motivation Of The Project . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Problem Defination . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3 Objective Statements . . . . . . . . . . . . . . . . . . . . . . . . . 2

2 Literature Survey 3
2.1 Literature Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

3 Software Requirements
Specification 7
3.1 Project Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
3.1.1 User Classes and Characteristics . . . . . . . . . . . . . . . 7
3.2 OVERVIEW AND RESPONSIBILITIES OF DEVELOPER . . . . 8
3.3 Nonfunctional Requirements . . . . . . . . . . . . . . . . . . . . . 8
3.3.1 Hardware and Software Quality Characterisctics . . . . . . 8
3.3.2 Design Constraint . . . . . . . . . . . . . . . . . . . . . . 8
3.3.3 Software Interface Description . . . . . . . . . . . . . . . . 9
3.4 System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.4.1 Hardware Requirements . . . . . . . . . . . . . . . . . . . 9
3.4.2 Software Requirements . . . . . . . . . . . . . . . . . . . . 9

4 System Design 10
4.1 System Architecture.................................................................................10
4.1.1 Use Case Diagram.......................................................................11
4.1.2 Activity Diagram.........................................................................12
4.1.3 Sequence Diagram.......................................................................13
4.1.4 Class Diagram..............................................................................14

5 Other Specifications 15
5.1 Advantages...............................................................................................15

5.2 FEATURES OF THE PROJECT..............................................................15


5.3 Applications..............................................................................................16
6 References 17

7 Base Paper 19

8 Synopsis 23

9 Published Paper with Certificates 34

10 Information of Project Group Members 42

iii
List of Figures

2.1 Literature Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

4.1 System Workflow.....................................................................................10


4.2 Use Case Diagram....................................................................................11
4.3 Activity Diagram......................................................................................12
4.4 Sequence Diagram....................................................................................13
4.5 Class Diagram..........................................................................................14
CHAPTER 1

INTRODUCTION

Car-sharing systems were introduced to help solve transportation problems


in urban areas, such as traffic congestion on the road, and pollution from fuel
combus- tion Carsharing is an alternative to car ownership that enables individuals
to enhance their mobility without the maintenance and storage costs associated
with private ve- hicle ownership The P2P service model is a system in which car
owners convert their personal vehicles into shared cars and rent them to other users
on rent.
In a traditional car-sharing system, the user’s information and service informa-
tion can be stored and controlled at a centralized service server. However, a
central- ized server suffers from a single point of failure by a malicious attacker. In
addition, if the stored information has been leaked, it brings serious privacy issues
because it is related to the user’s privacy. Therefore, it is necessary to resolve the
abovementioned problems incurred from a centralized structure.
This paper aims to provide a deeper understanding of blockchain technology
and give considerations of how to integrate it into their business strategies. The
paper humbly claims two-fold contribution:
• A blockchain-based ride-sharing architecture is proposed for safe and
secure traveling.
• A prototype of the proposed architecture is developed as a Decentralized
Application (DApp) on the Ethereum blockchain.

1.1 MOTIVATION OF THE PROJECT

Currently it proves costly for customers while the driver also gets the
payment after commission deduction.. Indeed, extra costs arise from the presence
of interme- diaries between a driver and a passenger.So proposed system will
deduct that cost. One major challenge that companies face is ensuring the security
and privacy of in- formation related to drivers and riders. So blockchain will
remove that challenge.
Drivers fail how these firms work because of the lack of accountability in the exist-
ing, centralized systems. Proposed system will provide transparency . Blockchain
enables riders via the decentralized network to communicate directly with drivers.
It minimizes the extra costs accrued due to the presence of multiple intermediaries.

1.2 PROBLEM DEFINATION

Currently, there are hundreds and thousands of vehicles in India that travel
from one city to another and pass every day from neighborhoods to the
metropolitan area.However,the number of taxis in major cities is far below the
demand, as many people wait for a taxi on the roadside. The online car-sharing
problem can be phrased in terms of interval scheduling if all the pick-up and drop-
off locations are the same. Let a car be a machine and each interval is associated to
a request, one for each car in the instance.

1.3 OBJECTIVE STATEMENTS

• This Peer to peer car sharing system has been developed to encourage
sharing by helping car owners to “offer a ride” in their vehicle or “find a
ride” with other users.Security is always a concern with car sharing and
strangers could prove to be risky.

• To address this issue and improve security, the admin has been given the sole
authority to verify users. Users can’t log in and access the modules unless
their request has been verified by the admin. Along with being helpful for
commuting, peer to peer car sharing is also a viable method of inter-city or
inter-state travel.

• A large group of car-sharing users sold their first or second car. Their car use
has reduced substantially

2
CHAPTER 2

LITERATURE SURVEY

Short information about Project ex. analysis, techniques.

2.1 LITERATURE SURVEY

The aim of this project [1], they propose a blockchain-based ridesharing


framework utilizing sensible agreements to alleviate the only purpose of
disappointing prob- lems introduced in ancient client employee structures. In any
case, apart from being wholly disseminated what is additional, easy, the receptivity
of blockchain prompts a possible security concern wherever the knowledge may be
overtly open. In spite of the use of mysterious verification, this is not up to secure
the protection of the top shoppers. For instance, by following the action of a driver
or rider, associate in nurs- ing aggressor with very little foundation data thereon
consumer will mapped out the whole thing of his space follow. to boot, since in
open blockchains, anybody will be a part of and execute within the organization
namelessly, malignant consumer will upset the blockchain-based ride-sharing help
by causation, for occasion, numerous solicitation/ offers whereas not that specialize
in any of them. Thusly, it’s required to watch driver’s practices and fabricate a
standing framework that helps a ride to settle on with bound a fitting driver for his
ride demand. Therefore, to deconcentrate ridesharing administrations in Associate
in nursing vital manner, security worry with relevancy ride-sharing ought to be
deliberately assessed and cared-for. This prepon- derantly needs setting 2
incompatible targets/i.e., (i) the desire to possess a simple framework whereas
securing consumer protection, and (ii) guarantee responsibility whereas being
unknown.
The aim of the project [2] is to manage the on the web/dynamic ride-sharing
means transcription issue for PV frameworks, they proposes a solution based
mostly on a restricted potential quest territory for each vehicle to sift through the
solicita- tions that abuse individual QoS imperatives, as an example, diversion,
during this
means, the worldwide hunt is faded to a close-by inquiry conjointly, the machine
unpredictability is diminished. It in addition considers the solace of travelers (e.g.,
holding up time and diversion) and the entire travel distance of PVs. During this
means, travelers will build the foremost of their distributed ride imparting admin-
istrations to forfeiting a touch ride comfort. In addition, the planned arrangement
are often effectively reached dead set the longer term worldwide ideal calculation
(if it’ll exist) to hurry the calculation time wherever all the design are often
modified simply if the individual has not been gotten. This text likewise
investigates the de- crease proportion of machine multifarious nature utilizing the
planned arrangement. The re-enactments obsessed on Manhattan taxi informational
collections assess the machine productivity of the planned arrangement.
This project [3] they introduced BlockV, a style that follows these four stan-
dards and offers a lively finish to finish arrangement. The strategy of using a
vehicle includes an arrangement for a passage against a ride, cheap an inexpensive
an afford- able installment instrument affordable to all or any and a decentralized
framework that guarantees reasonable, trusted, savvy exchanges. The framework
that is being followed as of now could be the applying based mostly vehicle
impartation to several incorporated staff observant every a part of the ride. The
decency in current state of affairs is sure to be actual by the basic specialist
organizations, but not sure from the rider finish. This type of trust based mostly
framework makes disappointment because the internal process techniques don’t
seem to be remarkably celebrated to rides. Thus, vehicle sharing, to be broadly
speaking acknowledged by all categories of people, have appreciated the part of a
decentralized companion to look at the organization of blockchain BlockV because
of the foundation of the planning.
In this work [4] the Ride coin offers a localized business center to riders and
travelers to interface and execute, confiscating the dependence on a go between to
regulate the exchange and set prices. Today, travelers hoping to book rides ought to
escort a unified organization. The United Nations agency can at that time provide a
driver and set a value for the outing. Likewise, drivers cannot opt for travelers
squarely but ought to rather rely upon an associated incorporated company to find
and apply travelers to them. At no matter purpose a guardian has the facility to
lineprices on associate exchange, the agent has large force.Drivers wanting to add a
particular piece of city or drive towards their homes at the end of their work day
could also be needing to take a somewhat lower admission. Rider United Nations
agency ought to get some place as fast as conceivable could also be needing to pay
additional to get gotten faster. Ridecoin permits every market member to line the
worth that bodies well for them and organize wherever essential. What is more,
Ridecoin offers responsibility for to its consumer.

4
This project [5] proposes a thought to utilize blockchain innovation for
rideshare administrations. This paper replaces the brought along power that matches
drivers and riders, with block chain and a coordinating application that utilizes 2
kinds of coins, that supports the drivers remodeling into diggers. To assess the
projected framework, this paper applies the projected blockchain rideshare
administration to a discourse analysis to mimic and find the foremost un-
coordinating probability to create drivers advantage from this framework. Besides,
this paper sets up a numer- ical model of the fastened conveyance of drivers what is
additional, work out the fastened advantage of each driver within the blockchain
rideshare framework.
In this work [6] the Blockchain, the institution of Bitcoin, has gotten broad
issues as recently. Blockchain fills in an exceedingly changeless record which al-
lows exchanges to happen in a suburbanised means. Blockchain-based applications
square measure jumping up, covering numerous fields together with financial
admin- istrations, infamy framework and net of Things (IoT, etc. In any case, their
square measure hitherto various difficulties of blockchain innovation like ability
and secu- rity problems holding back to be survived. This paper presents an
intensive define on blockchain innovation. We tend to provide an overview of
blockchain design right off the bat and analyse some common agreement
calculations used in numer- ous blockchains. Besides, specialized difficulties and
late advances square measure momentarily recorded. We tend to boot displayed
conceivable future patterns for blockchain.

5
Figure 2.1: Literature Survey

6
CHAPTER 3

SOFTWARE
REQUIREMENTS
SPECIFICATION

3.1 PROJECT SCOPE

In this project, the application will be worked between three entities called
driver, passenger and central authority. The system will work in three stages ; the
first stage is the driver will be verified by central authority. The second stage is the
passenger will be verified by central authority. The third stage is after verification
driver and passenger will join the ride. The existing system was a centralized
system where a single point of failure caused the whole system to work down. But
the proposed system will be decentralized so the data will be secured.

3.1.1 User Classes and Characteristics

There are two types of users in this system who will interact with each other.
These two users are called driver and passenger.
1. Driver:- Driver can create a profile in the system by registering . The
driver needs to get the verification in order to start the ride. For that purpose
they need to upload documents of vehicles and many more. After the verification
the driver can avail himself in the system so passengers can connect to him.After
connected to passenger he could set the fare on previous experiences and distance
of location.If passenger is ready for ride the both will join and complete the ride.
2. Passenger:- Passenger can also create a profile in the system by entering
his details like name , phone number , email id etc. If a passenger gets verified
successfully he can search for a ride for his destination and he can send the join
ride request to the driver.After the ride completes then he can make payment and
complete the ride.
3.2 OVERVIEW AND RESPONSIBILITIES OF DEVELOPER

• Recognize the precise problem dentition.

• Obtain the project’s requirements.

• Analyze the model and the requirements.

• Efficient coding that makes use of the right.

• Algorithms and data structures.

• To successfully execute the project and grow it in accordance with the avail-
able time.

3.3 NONFUNCTIONAL REQUIREMENTS

• The user-needed requirements make no mention of safety or security consid-


erations. The application should be effective,manipulative, self-adaptive, and
self-constrained at the same time.

• Performance Standards: superior performance to the current system.

• User-friendly interface requirements.

• Safety prerequisite.

• System should process data in a secure and safe manner, making it safe.

• Features of high-quality software

• The reliability application needs to be unambiguous, educational, simple to


use, and secure.

3.3.1 Hardware and Software Quality Characterisctics

• A reliable system will provide the necessary data in a changed format.

• Performance of this system is good if the CPU is used appropriately.

3.3.2 Design Constraint

User interface design is necessary for proper operation, and users must see it user
friendly

8
3.3.3 Software Interface Description

• The system’s software interface is user-friendly.

• The user will be notified

3.4 SYSTEM REQUIREMENTS

3.4.1 Hardware Requirements

RAM – 8GB
ROM – 1TB (500MB Min Space
Required) Speed – 2.5Ghz

3.4.2 Software Requirements

IDE :- Visual Studio


Code Database :-
Firebase

9
CHAPTER 4

SYSTEM

DESIGN

4.1 SYSTEM ARCHITECTURE

We are proposing to create a ride sharing application which is helps to grow finan-
cially and independently. Two kinds of stakeholders are identified for this DApp
i.e. the driver and the rider. Each user has different roles and responsibilities that
are offered using different dashboards of the DApp. Driver Dashboard shows, i)
The pick-up and Drop details of the user ii) The ride fare and iii) Payment Status
whereas, the Rider Dashboard shows, i) Pick up and Drop details and ii) Ride Fare.
Whenever a user detail is entered, the details are stored in MongoDB and the
metadata of the credential is pushed into the blockchain. The DApp contains a
front end which at the back end runs a decentralized platform. The workflow of the
DApp is shown in Figure 4.1.

Figure 4.1: System Workflow


4.1.1 Use Case Diagram

A use case diagram in the Unified Modeling Language (UML) can condense the
specifics of your system’s users (sometimes referred to as actors) and their inter-
actions with the system. You’ll need a specific set of connectors and symbols to
construct one.

Figure 4.2: Use Case Diagram

1
4.1.2 Activity Diagram

Similar to a flowchart or data flow diagram, an activity diagram visually displays a


series of actions or the flow of control in a system. A common tool in business pro-
cess modelling is the activity diagram.Additionally, they can outline the procedures
in a use case diagram.

Figure 4.3: Activity Diagram

1
4.1.3 Sequence Diagram

A sequence diagram is a diagram created using the Unified Modeling Language


(UML) that shows the flow of messages sent and received by objects during an in-
teraction. A group of objects that are represented by lifelines and the messages they
exchange over the course of an interaction make up a sequence diagram.

Figure 4.4: Sequence Diagram

1
4.1.4 Class Diagram

The class diagrams are the system or subsystem’s blueprints. Class diagrams are
useful for modelling the system’s constituent parts, showing the relationships
among them, and describing the functions and services that each perform.

Figure 4.5: Class Diagram

1
CHAPTER 5

OTHER SPECIFICATIONS

5.1 ADVANTAGES

Blockchain as we know is a peer-to-peer decentralized, public ledger that allows


transactions to happen without any intermediaries. And any transaction on a blockchain
network is transparent, immutable, and secured. Therefore, adopting blockchain in
ridesharing services removes the middle man and makes the transaction between the
drivers and users at a reasonable cost. This attracts more users onboard and benefits
them financially.

5.2 FEATURES OF THE PROJECT

• Less Cost: Apparently, blockchain removes the intermediates for the


informa- tion exchange and thereby slashing the costs involved in the
transaction to a greater extent. Moreover, it enables the user to trust the data
on blockchain rather than an unknown third-party.

• Transparency: Although Blockchain is anonymous it provides transparency


of the transactions at the same time. Therefore, it is always possible to trace
back to the information if something goes wrong.

• Safety: Authenticity of data is assured as all the data blockchain are crypto-
graphically protected. It is impossible to have any fraudulent data over the
network.

• Transparency: In the blockchain, the data is available over the network and
the raiding parties can have a transparent view of each other.

• Safe Payments: Users will be able to make a safe payment directly to the
drivers using smart contracts, another unique feature of blockchain
5.3 APPLICATIONS

• A Car rental system

• Cab Driver

• Auto rickshaw agency

• Personal Car owner

16
CHAPTER 6

REFERENCES

• 1 Mohamed Baza, Noureddine Lasla, Mohamed Mahmoud, Gautam Srivas-


tava and Mohamed Abdallah, “B-Ride: Ride Sharing with Privacy-
preservation, Trust and Fair Payment atop Public Blockchain,” 2019, IEEE

• 2 Ming Zhu, Xiao-Yang Liu, and Xiaodong Wang, “An Online Ride-Sharing
Path-Planning Strategy for Public Vehicle Systems,” 2018 Transactions on
In- telligent Transportation Systems, IEEE

• 3 Panchalika Pal and Sushmita Ruj, “BlockV: A Blockchain Enabled Peer-


Peer Ride Sharing Service,” 2019 International Conference on Blockchain
(Blockchain), IEEE

• 4 RideCoin-Whitepaper “An incentivized, blockchain-based peer-to-peer


trans- portation platform,” 2018 February Article on Ridecoin

• 5 Kosuke Kato, Yutong Yan, Hiroshi Toyoizumi, “Blockchain Application


for Rideshare Service,” 2018 International Conference on Blockchain, IEEE

• 6 Z. Zheng, S. Xie, H. Dai, X. Chen and H. Wang, ”An Overview of


Blockchain Technology: Architecture, Consensus, and Future Trends,” 2017
IEEE Inter- national Congress on Big Data (Big Data Congress), Honolulu,
HI, 2017, pp. 557-564

• 7 A. Dorri, M. Steger, S. S. Kanhere, and R. Jurdak, ”Blockchain: A dis-


tributed solution to automotive security and privacy,” IEEE Communications
Magazine, vol. 55, no. 12, pp. 119-125, 2017.

• 8 Xian Yu, Sigian Shen, “An Integrated Decomposition and Approximate


Dy- namic Programming Approach,” 2019
• 9 Saatvik Jain, Pravesh Biyani, “Improved Real Time Ride Sharing Via
Graph Colouring,” 2019, IEEE Intelligent Transportation Systems Conference
(ITSC) 27-30-2019

• 10 Satoko Itaya, Rie Tanaka, Naoki Yoshinaga, Taku Konishi, Shinichi Doi,
Keiji Yamada, “Proposal of Ride-Sharing System using Harmonic aggregation
of user Demand,” 2011 IEEE 36th Conference

• 11 P. W. Wadhwani and P. Saha, “Car sharing market size by model (P2P,


sta- tionbased, free-floating), by business model (round trip, one way), by
applica- tion (business, private), industry analysis report, regional outlook,
application potential, price trend, competitive market share forecast, 2020–
2026,” Global Market Insights, Pune, India, Tech. Rep., Apr. 2020. [Online].
Available:

• 12 K. Munzel, L. Piscicelli, W. Boon, and K. Frenken, “Different business


mod- ¨ els–different users? Uncovering the motives and characteristics of
business-toconsumer and peer-to-peer carsharing adopters in The
Netherlands,” Transp. Res. D, Transp. Environ., vol. 73, pp. 276–306, Aug.
2019.

• 13 S. Shaheen, N. Chan, A. Bansal, and A. Cohen, “Shared mobility: A sus-


tainability technologies workshop: Definitions, industry developments, and
early understanding,” Tech. Rep., 2015.

• 14 Ramachandran, G.S., Radhakrishnan, R., Krishnamachari, B. (2018). To-


wards a decentralized data marketplace for smart cities. 2018 IEEE Inter-
national Smart Cities Conference (ISC2), Kansas City, MO, USA, pp. 1-8.
https://doi.org/10.1109/ISC2.2018.8656952

• 15 Marchi, A., Parekh, E.J. (2016). How the sharing economy can make its
case. McKinsey Quarterly, 1: 112.
18
CHAPTER 7

BASE

PAPER
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 09 | Sep 2023 www.irjet.net p-ISSN: 2395-0072

Survey on Peer to Peer Car Sharing System Using Blockchain


Adarsh Birhade1, VAISHNAVI GHODE 2,
Adarsh Birhade, Student AAEMF. AL-AMEEN COLLEGE
OF ENGINEERING
VAISHNAVI GHODE, AAEMF. AL-AMEEN COLLEGE OF
ENGINEERING,

---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – By giving people access to shared transportation resources,
vehicles and limiting the use of private automobiles, car-
sharing programs can help with a number of urban
challenges. People may now utilize a shared automobile
by performing basic operations on their mobile devices
thanks to the growth of the Internet of Things. The car-
sharing program, however, has security issues. Sensitive
data is communicated for car-sharing via a public
channel, including the user's identification, position
data, and access code. As a result, an attacker may be
able to obtain this data for improper reasons, making
the development of a secure authentication protocol
crucial.

Key W o r d s : Car Sharing, automobiles,


authentication, blockchain .

1. INTRODUCTION

In order to deal with urban transportation issues


including road congestion and fuel combustion
pollution, car-sharing programs were created.
Carsharing is a substitute for owning a vehicle
that enables people to increase their mobility
without having to pay for upkeep and storage.
Peer-to-peer (P2P) carsharing is a cutting-edge
shared-use vehicle concept in which individuals
in the neighborhood have access to privately
owned vehicles. P2P start-ups are a part of a
group of internet businesses that have promoted
the development of "collaborative consumption"
and the "sharing economy" ideas. P2P vehicle
sharing is one of several shared-use mobility
services that are concentrated on sharing

© 2023, | Impact Factor value: | ISO 9001:2008 Certified | Page


and the sharing economy is emerging as a
more significant force in society..

The P2P service model is a system where


automobile owners turn their own
vehicles into shared cars and rent them
out to other customers.

In a conventional car-sharing
system, a centralised service server can
store and manage user data as well as
service data. A centralised server,
however, is vulnerable to a malevolent
attacker's single point of failure. For
instance, if the service server is hacked and
all the sharing records are wiped, the user
won't be able to access the earlier data
matching to the information about the
used cars when anything goes missing
from the cars. Additionally, if the user
engaged in fraudulent activity during car-
sharing, or if the sharing records are
altered. Finding the user's proof of a crime
from these recordings is challenging.
Additionally, if the information that has
been saved has been compromised, it
poses a major risk to user privacy.

1.1 Literature Survey

System analysis is a thorough assessment of


the system's many systems, as well as their
interactions both inside and outside the
system. Why are there so many faults in the
present system is the crucial query here. What
actions need to be performed to fix the issue?
The analysis starts when a user or
administrator launches a software survey on
the live system. The information is gathered
through a variety of files, decision-making
processes, and analysis-related activities
carried out by the present system. Example
Data Stream The method makes extensive use
of drawings and other media. Training,
expertise, and common sense are needed to
obtain the crucial data needed to create a
system.

© 2023, | Impact Factor value: | ISO 9001:2008 Certified | Page


International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 09 | Sep 2023 www.irjet.net p-ISSN: 2395-0072

The way in which the problem is discovered, Advantages:


thoroughly read, and properly executed by choosing
a solution, is essentially what determines the Blockchain provides a high degree of security due to
effectiveness of the system. A good analytical model independent verification procedures that occur across all
should provide a framework for solving the problem participating computers on a blockchain network. In
in addition to methods for understanding it. As a situations involving digital currencies, this verification is
consequence, further information should be looked used to validate transaction blocks prior to their inclusion
into through gathering system-related data. The needs in the chain.
of the proposed system should then be carefully
1. Fast, Secure, and Efficient Transactions
assessed. There are four sections in the system
2. Transparent and Accurate Pricing Model.
analysis. 3. Less work is required thanks to online
reservation tools.
1. Initial analysis and system layout. 4. Traveling is simplified.
2. Performing systematic analysis with the use of 5. Strengthened Security and Privacy Standards.
analytical tools.
3. A study of the possibilities.
4. Examine the expenses and advantages.

2. PROPOSED SYSTEM 3. Future Work


Although blockchain may be used
The proposed protocol will protect users from man- independently, its effectiveness is expected to be better
in- the-middle, replay, offline password guessing, when combined with other technologies like the
impersonation, and stolen mobile device threats. By Internet of Things, artificial intelligence, and big data.
doing a loose security analysis, the suggested Better answers for location-based automobile services
protocol offers reciprocal authentication, anonymity, might result from this. Future extensions of the study
and secrecy. Comparisons were made between the include I an analysis of the application's performance
proposed protocol's performance and similar and cost. Since blockchain technology is a trust-free
systems. The suggested protocol may be used in the system that enables consumers to trust data, it is also
blockchain- based car-sharing system and is effective. important to examine the technology from the
The protocol will eventually be tested and applied to standpoint of data processing. Although blockchain
a genuine car- sharing system using a simulation. The technology generally improves data quality, it is
suggested car- sharing system authentication crucial to understand the data processing capabilities
technique was built on the blockchain and consists of when connecting the blockchain with a larger
five entities: the trust authority, stations, owners, software system. iii) Examine the data processing
vehicles, and users. workloads across various blockchain architectures.

4. CONCLUSIONS
As a solution to the mobility issues in
metropolitan areas, car-sharing programmes have
garnered a lot of interest. However, the centralised
system structure and communication over a public
channel of the conventional car-sharing system
expose it to various security issues. In order to
provide a decentralised sharing service for
authorised users, this article presented a safe
decentralised model of a car-sharing system as well
as a secure authentication technique. Blockchain
was utilised to offer a decentralised car-sharing
service and guarantee the accuracy of service
Chart -1: Flowchart information. In order to ensure the user's privacy, a
pseudonym was also used in the car-sharing system.

© 2023, | Impact Factor value: | ISO 9001:2008 Certified | Page


As a result, even

© 2023, | Impact Factor value: | ISO 9001:2008 Certified | Page


International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 09 | Sep 2023 www.irjet.net p-ISSN: 2395-0072

if the adversary accesses the stored data, they are


unable to determine the user's true identity. The
suggested protocol may enable safe mutual
authentication between the user, station, and
owner,

according to BAN logic analysis, which was used to


demonstrate this. Additionally, the suggested
protocol's security against replay and man-in-the-
middle attacks was shown using the AVISPA
simulation.

ACKNOWLEDGEMENT

Up until now, we have put forth a tremendous amount of


work to support this endeavour. Whatever the case, it
would not have been possible without the thoughtful
support and cooperation of several people and
organisations. We could want to let them know how
appreciative we are to each of them. We are excited to
provide this research on "Peer to Peer Car Sharing
System Using Blockchain." We would like to thank Mrs.
K.S. Hangargi, who served as our guide, for her
invaluable advice in helping us analyse our project. We
also like to express our gratitude to the Prof.S.R.Bhujbal
HOD of Computer Engineering for providing the required
resources.

REFERENCES

[1] A. Dorri, M. Steger, S. S. Kanhere, and R. Jurdak,,


“BlockChain: A distributed solution to automotive
security and privacy,’’ IEEE Commun. Mag., vol. 55, no.
12, pp. 119–125, Dec. 2017.
[2] D.Puthal, “The blockchain as a decentralized security
framework,” IEEE Consum. Electron. Mag., vol. 7.
[3] P.W. Wadhwani and P. Saha, “Car sharing market size
by model”.

© 2023, | Impact Factor value: | ISO 9001:2008 Certified | Page


CHAPTER 8

SYNOPSIS
A SYNOPSIS FOR DISSERTATION STAGE

I ON

PEER TO PEER
CAR SHARING
Submitted by

Name of student Roll No

Adarsh Birhade 722065E


Vaishnavi Ghode 722065F

Under the Guidance of

Prof.Deokate V.P

DEPARTMENT OF COMPUTER ENGINEERING


AAEMF. AL-AMEEN COLLEGE OF
ENGINEERING
SHARAD CAMPUS, KORGAON BHIMA, PUNE 412216
SAVITRIBAI PHULE PUNE UNIVERSITY
2023 -2024

1
ABSTRACT

Blockchain technology is a distributed, decentralized public ledger that


allows peer-to-peer transactions in a secured way without any third party. This paper
proposes a blockchain-based framework from the existing centralized framework for a
ride-sharing service and implements the same as a decentralized application (DApp) based
on smart contracts on Ethereum Blockchain. Using smart contracts facilitate the users with
automated transactions, removes the intermediaries, and enables various activities to be
carried out safely and securely. Implementation of smart contracts is done using the
Solidity programming language. This DApp uses the min matching algorithm to match
riders requesting rideshare to save total travel distance. With the overwhelming growth in
the usage of cryptocurrencies, smart contracts usage in applications as proposed in this
paper can transform the sharing economy.
Car-sharing systems can solve various urban problems by providing shared
vehicles to people and reducing the operation of personal vehicles. With the Internet of
Things development, people can easily use a shared car through simple operations on their
mobile devices. However, the car-sharing system has security problems. Sensitive
information, such as the user’s identity, location information, and access code, is
transmitted through a public channel for car-sharing. Hence, an attacker can access this
information for illegal purposes, making the establishment of a secure authentication
protocol essential.
This study designed a decentralized car-sharing scheme using blockchain. Specifically,
blockchain technology was used to provide a decentralization car-sharing service and
ensure data integrity. The participant entities of the proposed system can be authenticated
anonymously. The proposed car-sharing system can be secured against various attacks and
provide mutual authentication using informal analysis.

2
INDEX

TOPICS Page No

1. Intoduction 4
2. ProblemStatement 5
3. Goals & Objectives 5
4. Feasibility_Study 6
5. TechnicalDetails 6
6. Technologiesused 7
7. Innovativeness & Usefulness 8
8. System_Architecture 9
9. Conclusion 9
10.References 10

3
INTRODUCTION

Car-sharing systems were introduced to help solve transportation problems in


urban areas, such as traffic congestion on the road, and pollution from fuel combustion
Carsharing is an alternative to car ownership that enables individuals to enhance their
mobility without the maintenance and storage costs associated with private vehicle
ownership The P2P service model is a system in which car owners convert their personal
vehicles into shared cars and rent them to other users on rent.
In a traditional car-sharing system, the user’s information and service information
can be stored and controlled at a centralized service server. However, a centralized server
suffers from a single point of failure by a malicious attacker. In addition, if the stored
information has been leaked, it brings serious privacy issues because it is related to the
user’s privacy. Therefore, it is necessary to resolve the above-mentioned problems incurred
from a centralized structure.
This paper aims to provide a deeper understanding of blockchain technology and
give considerations of how to integrate it into their business strategies. The paper humbly
claims two-fold contribution:

 A blockchain-based ride-sharing architecture is proposed for safe and secure traveling.


 A prototype of the proposed architecture is developed as a Decentralized Application
(DApp) on the Ethereum blockchain.

4
PROBLEM STATEMENT:

Currently, there are hundreds and thousands of vehicles in India that travel from one
city to another and pass every day from neighborhoods to the metropolitan area. However,
the number of taxis in major cities is far below the demand, as many people wait for a taxi
on the roadside.
At last, ride service networks also face issues of user privacy like the security of financial
details, the privacy of personal details, and location.
The online car-sharing problem can be phrased in terms of interval scheduling if all the
pick- up and drop-off locations are the same. Let a car be a machine and each interval is
associated to a request, one for each car in the instance.

GOALS AND OBJECTIVES:

 This Peer to peer car sharing system has been developed to help encourage sharing system
by helping car owners to “offer a ride” in their vehicle or “find a ride” with other
users.Security is always a concern with car sharing and strangers could prove to be risky.
 To address this issue and improve security, the admin has been given the sole authority to
verify users. User can’t log in and access the modules unless their request has been verified
by the admin. Along with being helpful for commuting, peer to peer car sharing is also a
viable method of inter-city or inter-state travel.
 A large group of car-sharing users sold their first or second car. Their car use has reduced
substantially.
 Car Sharing causes less Traffic.

5
FEASIBILITY STUDY:

• The authentication phase is more frequent than other phases, so only the authentication phase
was compared. The proposed scheme was compared because these schemes perform
authentication
using blockchain and similar cryptography. This comparison shows that the proposed scheme is
appropriate for practical car-sharing system because it considers three party authentication,
including user, station and car owner.
• Informal security analysis was performed to demonstrate that the proposed protocol prevents
various attacks and supports user anonymity and mutual authentication. P2P carsharing offers a
greater selection of locations, vehicle types, and daily and hourly rental prices than classic and
one-way carsharing.

TECHNICAL DETAILS:

Blockchain is a statistics recording mechanism that makes it hard or not possible to


adjust, hack, or cheat the gadget. A blockchain is basically a digit transaction ledger this is
duplicated and disbursed on the blockchain through the entire community of pc device.
Blockchain is a database that save all transaction grouped in blocks. Each block consists of a
cryptographic hash of the previous block, a timestamp, and transaction records. While a
sparkling transaction is created, the sender pronounces in the peer to look community to all of
the other nodes.
Peer-to-peer (P2P) carsharing connects registered car owners with pre-qualified renters
to maximize the use of a vehicle. It is a type of person-to-person lending that allows car owners
to list their cars for rent for a set period of time when the owner is not using it. At the same time,
non-car owners have access to vehicles when they need it. Like many other shared economy
business models, everyone benefits.
All of this is possible because of the Internet, data, apps, and GPS. Just like many other
shared economy businesses, peer-to-peer carsharing is a wonderful way to share the
responsibility of car ownership.

6
TECHNOLOGIES USED:
Tool Visual studio code community 2022
Front-end
1 Next js
18.2.0
 Next.js is a React framework that gives you building blocks to create web applications. By
framework, we mean Next.js handles the tooling and configuration needed for React, and
provides additional structure, features, and optimizations for your application
2 Web3js
 Open source Javascript library provides API to interact with local Ethereum nodes.
3 Tailwind CSS
 First CSS framework which make it very easy to apply great styling to you react web
applicationby choosing from the framework ready made CSS classes.
 This easy approach makes Tailwind CSS very popular among today’s CSS frameworks and
speeds up the development and styling process significantly.

Backend
Solidity
 Object Oriented programming Knowledge to write and Implement Smart contracts in
Ethereum Blockchain.

Truffle Framework
 Allows creating apps on Ethereum network. Provides a suite to tools to write smart contracts
using solidity.
 Provides for testing the contracts . Give tools to deploy smart contracts in the blockchain.
 Used to develop client side applications inside Truffle.

Database
MongoDB: Ide
 Core data is saved in blockchain however to facilitate the user details and displaying
dashboard details we use MongoDB.

7
Innovativeness and Usefulness:

To ensure fair payment in a reliable way between driver and passenger. The driver needs
to send in the normal past time distance to the authorized passenger by signing it using his
or her secret key. After that, if the passenger has provided a guaranteed distance (that is, a
previous pass once driver's signature), a smart contract transfers money to the driver. In
this way, the driver is paid as he drives. In the meantime, if a passenger stops sending
evidence to block, can stop the trip immediately.
Moreover, the distances only ended is stored in the blockchain and no other
sensitive information has been disclosed to the public. It is useful for Driver because while
using OLA and UBER apps the drivers are facing the Problem of low cost. But in our
service we are removing the third party person and giving more Profit to Car Owner. This
app will help both Driver and Passenger driver will get more profit and Passenger can
reach their Destination Fast and Secure.
The easiest way is probably to just do a Google search for "car sharing" plus the
name of where you live. If you are in a big city, your chances are pretty good. If you are in
a rural area, you're probably out of luck. Another way to find a shared ride is to look at
Wikipedia's list of car sharing operators by country. There will be a little variation from
one car sharing service to the other, but most of the big ones will send you a membership
car that can be used to unlock the cars.
The car-sharing market is changing at a dynamic pace. Along with changes and
new user habits, car-sharing systems are required to make this market even more accessible
and flexible. This solution is possible due to the joining of Mobility-as-a-Service (MaaS)
systems and the sharing of data, as well as the implementation of open innovations.

8
SYSTEM ARCHITECTURE:

CONCLUSION:

9
Car-sharing systems have attracted widespread attention as an approach that alleviates
the transportation problems in urban areas. However, the traditional car-sharing system is
exposed to some security problems owing to the centralized system structure and
communication via a public channel. This paper proposed a secure decentralized model of a car-
sharing system and a secure authentication scheme to provide a decentralized sharing service for
legitimate users.

REFRENCES:

1 P. W. Wadhwani and P. Saha, ‘‘Car sharing market size by model (P2P, station-based, free-
floating), by business model (round trip, one way), by application (business, private), industry
analysis report, regional outlook, application potential, price trend, competitive market share &
forecast, 2020–2026,’’ Global Market Insights, Pune, India, Tech. Rep., Apr. 2020. [Online].
Available: https://www.gminsights.com/industryanalysis/carsharing-market

2 K. Münzel, L. Piscicelli, W. Boon, and K. Frenken, ‘‘Different business models–different users?


Uncovering the motives and characteristics of business-to-consumer and peer-to-peer
carsharing adopters in The Netherlands,’’ Transp. Res. D, Transp. Environ., vol. 73, pp. 276–306,
Aug. 2019.
3 S. Shaheen, N. Chan, A. Bansal, and A. Cohen, ‘‘Shared mobility: A sustainability & technologies
workshop: Definitions, industry developments, and early understanding,’’ Tech. Rep., 2015.

4 Ramachandran, G.S., Radhakrishnan, R., Krishnamachari, B. (2018). Towards a decentralized


data marketplace for smart cities. 2018 IEEE International Smart Cities Conference (ISC2), Kansas
City, MO, USA, pp. 1-8. https://doi.org/10.1109/ISC2.2018.8656952

5 Marchi, A., Parekh, E.J. (2016). How the sharing economy can make its case. McKinsey
Quarterly, 1: 112.

1
CHAPTER 9

PUBLISHED PAPER WITH


CERTIFICATES
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 12 | Oct 2023 www.irjet.net p-ISSN: 2395-0072

Survey on Peer to Peer Car Sharing System Using Blockchain


Adarsh Birhade1, VAISHNAVI GHODE 2,
Adarsh Birhade, Student AAEMF. AL-AMEEN COLLEGE
OF ENGINEERING
VAISHNAVI GHODE, AAEMF. AL-AMEEN COLLEGE OF
ENGINEERING,
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – By giving people access to shared vehicles and if the sharing records are altered. Finding the user's proof of
limiting the use of private automobiles, car-sharing a
programs can help with a number of urban challenges.
People may now utilize a shared automobile by performing
basic operations on their mobile devices thanks to the
growth of the Internet of Things. The car-sharing program,
however, has security issues. Sensitive data is communicated
for car-sharing via a public channel, including the user's
identification, position data, and access code. As a result, an
attacker may be able to obtain this data for improper
reasons, making the development of a secure authentication
protocol crucial.

Key Words: Car Sharing, automobiles, authentication,


blockchain .

1. INTRODUCTION
In order to deal with urban transportation issues including
road congestion and fuel combustion pollution, car-
sharing programs were created. Carsharing is a substitute
for owning a vehicle that enables people to increase their
mobility without having to pay for upkeep and storage.
Peer- to-peer (P2P) carsharing is a cutting-edge shared-use
vehicle concept in which individuals in the neighborhood
have access to privately owned vehicles. P2P start-ups are
a part of a group of internet businesses that have
promoted the development of "collaborative
consumption" and the "sharing economy" ideas. P2P
vehicle sharing is one of several shared-use mobility
services that are concentrated on sharing transportation
resources, and the sharing economy is emerging as a more
significant force in society..

The P2P service model is a system where automobile owners


turn their own vehicles into shared cars and rent them out
to other customers.

In a conventional car-sharing system, a centralised


service server can store and manage user data as well as
service data. A centralised server, however, is vulnerable to a
malevolent attacker's single point of failure. For instance,
if the service server is hacked and all the sharing records
are wiped, the user won't be able to access the earlier data
matching to the information about the used cars when
anything goes missing from the cars. Additionally, if the
user engaged in fraudulent activity during car-sharing, or

© 2023, | Impact Factor value: | ISO 9001:2008 Certified | Page


crime from these recordings is challenging.
Additionally, if the information that has been saved has
been compromised, it poses a major risk to user
privacy.

1.1 Literature Survey

System analysis is a thorough assessment of the


system's many systems, as well as their interactions
both inside and outside the system. Why are there so
many faults in the present system is the crucial query
here. What actions need to be performed to fix the
issue? The analysis starts when a user or administrator
launches a software survey on the live system. The
information is gathered through a variety of files,
decision-making processes, and analysis-related
activities carried out by the present system. Example
Data Stream The method makes extensive use of
drawings and other media. Training, expertise, and
common sense are needed to obtain the crucial data
needed to create a system.

The way in which the problem is discovered,


thoroughly read, and properly executed by choosing a
solution, is essentially what determines the effectiveness
of the system. A good analytical model should provide a
framework for solving the problem in addition to
methods for understanding it. As a consequence,
further information should be looked into through
gathering system-related data. The needs of the
proposed system should then be carefully assessed.
There are four sections in the system analysis.

1. Initial analysis and system layout.


2. Performing systematic analysis with the use of
analytical tools.
3. A study of the possibilities.
4. Examine the expenses and advantages.

2. PROPOSED SYSTEM
The proposed protocol will protect users from man-in-
the- middle, replay, offline password guessing,
impersonation, and stolen mobile device threats. By
doing a loose security analysis, the suggested protocol
offers reciprocal authentication, anonymity, and
secrecy. Comparisons were made between the
proposed protocol's performance and similar systems.
The suggested protocol may be used in the blockchain-
based car-sharing system and is effective. The

© 2023, | Impact Factor value: | ISO 9001:2008 Certified | Page


International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 12 | Oct 2023 www.irjet.net p-ISSN: 2395-0072

protocol will eventually be tested and applied to a genuine


4. CONCLUSIONS
car-sharing system using a simulation. The suggested car-
sharing system authentication technique was built on the As a solution to the mobility issues in metropolitan
blockchain and consists of five entities: the trust authority, areas, car-sharing programmes have garnered a lot of
stations, owners, vehicles, and users. interest. However, the centralised system structure and
communication over a public channel of the conventional
car-sharing system expose it to various security issues. In
order to provide a decentralised sharing service for
authorised users, this article presented a safe
decentralised model of a car-sharing system as well as a
secure authentication technique. Blockchain was utilised
to offer a decentralised car-sharing service and guarantee
the accuracy of service information. In order to ensure the
user's privacy, a pseudonym was also used in the car-
sharing system. As a result, even if the adversary accesses
the stored data, they are unable to determine the user's
true identity. The suggested protocol may enable safe
mutual authentication between the user, station, and
owner, according to BAN logic analysis, which was used to
demonstrate this. Additionally, the suggested protocol's
security against replay and man-in-the-middle attacks was
Chart -1: Flowchart
shown using the AVISPA simulation.
Advantages:
ACKNOWLEDGEMENT
Blockchain provides a high degree of security due to
independent verification procedures that occur across all Up until now, we have put forth a tremendous amount of
participating computers on a blockchain network. In work to support this endeavour. Whatever the case, it
situations involving digital currencies, this verification is would not have been possible without the thoughtful
used to validate transaction blocks prior to their inclusion support and cooperation of several people and
in the chain. organisations. We could want to let them know how
appreciative we are to each of them. We are excited to
1. Fast, Secure, and Efficient Transactions provide this research on "Peer to Peer Car Sharing
System Using Blockchain." We would like to thank Mrs.
2. Transparent and Accurate Pricing Model. K.S. Hangargi, who served as our guide, for her invaluable
3. Less work is required thanks to online advice in helping us analyse our project. We also like to
reservation tools. express our gratitude to the Prof.S.R.Bhujbal HOD of
Computer Engineering for providing the required
4. Traveling is simplified. resources.
5. Strengthened Security and Privacy Standards.
REFERENCES
3. Future Work
[1] A. Dorri, M. Steger, S. S. Kanhere, and R. Jurdak,,
Although blockchain may be used independently, its “BlockChain: A distributed solution to automotive
effectiveness is expected to be better when combined with security and privacy,’’ IEEE Commun. Mag., vol. 55, no.
other technologies like the Internet of Things, artificial 12, pp. 119–125, Dec. 2017.
intelligence, and big data. Better answers for location-
based automobile services might result from this. Future [2] D.Puthal, “The blockchain as a decentralized security
extensions of the study include I an analysis of the framework,” IEEE Consum. Electron. Mag., vol. 7.
application's performance and cost. Since blockchain
[3] P.W. Wadhwani and P. Saha, “Car sharing market size
technology is a trust-free system that enables consumers
by model”.
to trust data, it is also important to examine the
technology from the standpoint of data processing.
Although blockchain technology generally improves data
quality, it is crucial to understand the data processing
capabilities when connecting the blockchain with a larger
software system. iii) Examine the data processing
workloads across various blockchain architectures.

© 2023, | Impact Factor value: | ISO 9001:2008 Certified | Page

You might also like