Submit Search
Upload
Survey on Peer to Peer Car Sharing System Using Blockchain
•
0 likes
•
8 views
IRJET Journal
Follow
https://www.irjet.net/archives/V9/i12/IRJET-V9I1211.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 2
Download now
Download to read offline
Recommended
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET Journal
Blockchain based News Application to combat Fake news
Blockchain based News Application to combat Fake news
IRJET Journal
Decentralized Ridesharing System Using Blockchain
Decentralized Ridesharing System Using Blockchain
IRJET Journal
Blockchain Based Car Rental App
Blockchain Based Car Rental App
IRJET Journal
The Web 3.0 Portal with Social Media and Photo Storage application
The Web 3.0 Portal with Social Media and Photo Storage application
IRJET Journal
Online Voting System Using Blockchain Technology
Online Voting System Using Blockchain Technology
IRJET Journal
To Improve Data Storage Security Levels in the Cloud
To Improve Data Storage Security Levels in the Cloud
rahulmonikasharma
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
Iaetsd Iaetsd
Recommended
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET Journal
Blockchain based News Application to combat Fake news
Blockchain based News Application to combat Fake news
IRJET Journal
Decentralized Ridesharing System Using Blockchain
Decentralized Ridesharing System Using Blockchain
IRJET Journal
Blockchain Based Car Rental App
Blockchain Based Car Rental App
IRJET Journal
The Web 3.0 Portal with Social Media and Photo Storage application
The Web 3.0 Portal with Social Media and Photo Storage application
IRJET Journal
Online Voting System Using Blockchain Technology
Online Voting System Using Blockchain Technology
IRJET Journal
To Improve Data Storage Security Levels in the Cloud
To Improve Data Storage Security Levels in the Cloud
rahulmonikasharma
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
Iaetsd Iaetsd
How to leverage blockchain for making machine learning models more accessible
How to leverage blockchain for making machine learning models more accessible
Blockchain Council
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
S3 Infotech IEEE Projects
Women's Maltreatment Redressal System based on Machine Learning Techniques
Women's Maltreatment Redressal System based on Machine Learning Techniques
IRJET Journal
Trust Based Packet Filtering.pptx
Trust Based Packet Filtering.pptx
PoojaG86
Third Party Public Auditing Scheme for Security in Cloud Storage
Third Party Public Auditing Scheme for Security in Cloud Storage
ijtsrd
State of the Art in Cloud Security
State of the Art in Cloud Security
ijsrd.com
Secure and Transparent Insurance Application using Blockchain Technology
Secure and Transparent Insurance Application using Blockchain Technology
IRJET Journal
Top 8 Trends in Performance Engineering
Top 8 Trends in Performance Engineering
Convetit
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET Journal
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Editor IJMTER
IRJET- Effctive In-House Voting and Implementation using Block-Chain Veri...
IRJET- Effctive In-House Voting and Implementation using Block-Chain Veri...
IRJET Journal
IRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing Framework
IRJET Journal
Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd Iaetsd
Decentralized Car Hailing Application
Decentralized Car Hailing Application
IRJET Journal
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds
IRJET Journal
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
IRJET Journal
IRJET- Noisy Content Detection on Web Data using Machine Learning
IRJET- Noisy Content Detection on Web Data using Machine Learning
IRJET Journal
Blockchain Technology: Its Impact on the Consumer-Centric Model in Digital Ma...
Blockchain Technology: Its Impact on the Consumer-Centric Model in Digital Ma...
IRJET Journal
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING
IAEME Publication
Ijciet 08 02_003
Ijciet 08 02_003
IAEME Publication
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to Survey on Peer to Peer Car Sharing System Using Blockchain
How to leverage blockchain for making machine learning models more accessible
How to leverage blockchain for making machine learning models more accessible
Blockchain Council
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
S3 Infotech IEEE Projects
Women's Maltreatment Redressal System based on Machine Learning Techniques
Women's Maltreatment Redressal System based on Machine Learning Techniques
IRJET Journal
Trust Based Packet Filtering.pptx
Trust Based Packet Filtering.pptx
PoojaG86
Third Party Public Auditing Scheme for Security in Cloud Storage
Third Party Public Auditing Scheme for Security in Cloud Storage
ijtsrd
State of the Art in Cloud Security
State of the Art in Cloud Security
ijsrd.com
Secure and Transparent Insurance Application using Blockchain Technology
Secure and Transparent Insurance Application using Blockchain Technology
IRJET Journal
Top 8 Trends in Performance Engineering
Top 8 Trends in Performance Engineering
Convetit
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET Journal
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Editor IJMTER
IRJET- Effctive In-House Voting and Implementation using Block-Chain Veri...
IRJET- Effctive In-House Voting and Implementation using Block-Chain Veri...
IRJET Journal
IRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing Framework
IRJET Journal
Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd Iaetsd
Decentralized Car Hailing Application
Decentralized Car Hailing Application
IRJET Journal
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds
IRJET Journal
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
IRJET Journal
IRJET- Noisy Content Detection on Web Data using Machine Learning
IRJET- Noisy Content Detection on Web Data using Machine Learning
IRJET Journal
Blockchain Technology: Its Impact on the Consumer-Centric Model in Digital Ma...
Blockchain Technology: Its Impact on the Consumer-Centric Model in Digital Ma...
IRJET Journal
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING
IAEME Publication
Ijciet 08 02_003
Ijciet 08 02_003
IAEME Publication
Similar to Survey on Peer to Peer Car Sharing System Using Blockchain
(20)
How to leverage blockchain for making machine learning models more accessible
How to leverage blockchain for making machine learning models more accessible
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
Women's Maltreatment Redressal System based on Machine Learning Techniques
Women's Maltreatment Redressal System based on Machine Learning Techniques
Trust Based Packet Filtering.pptx
Trust Based Packet Filtering.pptx
Third Party Public Auditing Scheme for Security in Cloud Storage
Third Party Public Auditing Scheme for Security in Cloud Storage
State of the Art in Cloud Security
State of the Art in Cloud Security
Secure and Transparent Insurance Application using Blockchain Technology
Secure and Transparent Insurance Application using Blockchain Technology
Top 8 Trends in Performance Engineering
Top 8 Trends in Performance Engineering
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
IRJET- Effctive In-House Voting and Implementation using Block-Chain Veri...
IRJET- Effctive In-House Voting and Implementation using Block-Chain Veri...
IRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing Framework
Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...
Decentralized Car Hailing Application
Decentralized Car Hailing Application
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
IRJET- Noisy Content Detection on Web Data using Machine Learning
IRJET- Noisy Content Detection on Web Data using Machine Learning
Blockchain Technology: Its Impact on the Consumer-Centric Model in Digital Ma...
Blockchain Technology: Its Impact on the Consumer-Centric Model in Digital Ma...
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING
Ijciet 08 02_003
Ijciet 08 02_003
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
misbanausheenparvam
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
vipinkmenon1
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Asst.prof M.Gokilavani
microprocessor 8085 and its interfacing
microprocessor 8085 and its interfacing
jaychoudhary37
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Mark Billinghurst
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
Internship report on mechanical engineering
Internship report on mechanical engineering
malavadedarshan25
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Asst.prof M.Gokilavani
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
power system scada applications and uses
power system scada applications and uses
DevarapalliHaritha
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
VICTOR MAESTRE RAMIREZ
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
Recently uploaded
(20)
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
microprocessor 8085 and its interfacing
microprocessor 8085 and its interfacing
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Internship report on mechanical engineering
Internship report on mechanical engineering
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
power system scada applications and uses
power system scada applications and uses
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Survey on Peer to Peer Car Sharing System Using Blockchain
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 63 Survey on Peer to Peer Car Sharing System Using Blockchain Pankaj Desai1, Mahesh KoltePatil2, Tanmay Dandile3, Shivam Shingare4, Prof. K.S Hangargi5 1Pankaj Desai, Student of Computer Engineering at P.K Technical Campus, Pune 2Mahesh KoltePatil, Student of Computer Engineering at P.K Technical Campus, Pune 3Tanmay Dandile, Student of Computer Engineering Student P.K Technical Campus, Pune 4Shivam Shingare, Student of Computer Engineering at P.K Technical Campus, Pune 5Prof. K.S Hangargi, Dept Computer Engineering, P.K Technical Campus, Pune ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – By giving people access to shared vehicles and limiting the use of private automobiles, car-sharing programs can help with a number of urban challenges. People may now utilize a shared automobile by performingbasicoperations on their mobile devices thanks to the growth of the Internet of Things. The car-sharingprogram, however, hassecurity issues. Sensitive data is communicated for car-sharing via a public channel, including the user's identification, position data, and access code. As a result, an attacker may be able to obtain this data for improper reasons, making the development of a secure authentication protocol crucial. Key Words: Car Sharing, automobiles, authentication, blockchain . 1. INTRODUCTION In order to deal with urban transportation issues including road congestion and fuel combustion pollution, car-sharing programs were created. Carsharing is a substitute for owning a vehicle that enables people to increase their mobility without having to pay forupkeepandstorage.Peer- to-peer (P2P) carsharingisa cutting-edgeshared-usevehicle concept in which individuals in the neighborhood have access to privately owned vehicles. P2P start-ups are a part of a group of internet businesses that have promoted the development of "collaborative consumption" and the "sharing economy" ideas. P2P vehicle sharing is one of several shared-use mobility services that are concentrated on sharing transportation resources, and the sharing economy is emerging as a more significant force in society.. The P2P service model isa systemwhereautomobileowners turn their own vehicles into shared carsandrentthemout to other customers. In a conventional car-sharing system, a centralised service server can store and manage user data as well as service data. A centralisedserver,however,isvulnerabletoa malevolent attacker's single point of failure. For instance, if the service server is hacked and all the sharing records are wiped, the user won't be able to access the earlier data matching to the information about the used cars when anything goes missing from the cars. Additionally, iftheuser engaged in fraudulent activity during car-sharing, or if the sharing records are altered. Finding the user's proof of a crime from these recordings is challenging. Additionally, if the information that has been saved has been compromised, it poses a major risk to user privacy. 1.1 Literature Survey System analysis is a thorough assessment of the system's many systems, as well as their interactions both inside and outside the system. Why are there so many faults in the present system is the crucial query here. What actions need to be performed to fix the issue? The analysis starts when a user or administrator launches a software survey on the live system. The information is gatheredthroughavarietyoffiles, decision-making processes, and analysis-related activities carried out by the present system. Example Data Stream The method makes extensive use of drawings and other media. Training, expertise, and common sense are needed to obtain the crucial data needed to create a system. The way in which the problem is discovered, thoroughly read, and properly executed by choosing a solution, is essentially what determinestheeffectivenessofthesystem.A good analytical model should provide a framework for solving the problem in addition to methods for understanding it. As a consequence, further information should be looked into throughgatheringsystem-relateddata. The needs of the proposed system should then be carefully assessed. There are four sections in the system analysis. 1. Initial analysis and system layout. 2. Performing systematic analysis with the use of analytical tools. 3. A study of the possibilities. 4. Examine the expenses and advantages. 2. PROPOSED SYSTEM The proposed protocol will protect users from man-in-the- middle,replay,offlinepasswordguessing,impersonation,and stolen mobile device threats. By doing a loose security analysis, the suggested protocol offers reciprocal authentication, anonymity, and secrecy. Comparisons were made between the proposed protocol's performance and similar systems. The suggested protocol may be used in the blockchain-based car-sharing system and is effective. The
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 64 protocol will eventually be tested and applied to a genuine car-sharing system using a simulation. The suggested car- sharing system authentication technique was built on the blockchain and consists of five entities: the trust authority, stations, owners, vehicles, and users. Chart -1: Flowchart Advantages: Blockchain provides a high degree of security due to independent verification procedures that occur across all participating computers on a blockchain network. In situations involving digital currencies, this verification is used to validate transaction blocks prior to theirinclusionin the chain. 1. Fast, Secure, and Efficient Transactions 2. Transparent and Accurate Pricing Model. 3. Less work is required thanks to online reservation tools. 4. Traveling is simplified. 5. Strengthened Security and Privacy Standards. 3. Future Work Although blockchainmaybe usedindependently,its effectiveness is expected to be better when combined with other technologies like the Internet of Things, artificial intelligence, and big data. Better answers for location-based automobile services might result from this. Future extensions of the study include I an analysis of the application's performance and cost. Since blockchain technology is a trust-free system that enables consumers to trust data, it is also important to examine the technology from the standpoint of data processing. Althoughblockchain technology generally improves data quality, it is crucial to understandthedata processingcapabilities whenconnecting the blockchain with a larger software system. iii) Examine the data processing workloads across various blockchain architectures. 4. CONCLUSIONS As a solution to the mobility issues in metropolitan areas, car-sharing programmes have garnered a lot of interest. However, the centralised system structure and communication over a public channel of the conventional car-sharing system expose it to various security issues. In order to provide a decentralised sharing service for authorised users, this article presented a safe decentralised model of a car-sharing system as well as a secure authentication technique. Blockchain was utilised to offer a decentralised car-sharing service and guarantee the accuracy of service information.Inorderto ensuretheuser's privacy, a pseudonym was also used in the car-sharing system. As a result, even if the adversary accesses the stored data, they are unable to determine the user's true identity. The suggested protocol may enable safe mutual authentication between the user, station, and owner, according to BAN logic analysis, which was used to demonstrate this. Additionally, the suggested protocol's security against replay and man-in-the-middle attacks was shown using the AVISPA simulation. ACKNOWLEDGEMENT Up until now, we have put forth a tremendous amount of work to support this endeavour. Whatever thecase,itwould not have been possible without the thoughtful support and cooperation of several people and organisations. We could want to let them know how appreciative we are to each of them. We are excited to provide this research on "Peer to Peer Car Sharing System Using Blockchain." We would like to thank Mrs. K.S. Hangargi, who served as our guide, for her invaluable advice in helping us analyse our project. We also like to express our gratitudetothe Prof.S.R.Bhujbal HOD of Computer Engineering for providing the required resources. REFERENCES [1] A. Dorri, M. Steger, S. S. Kanhere, and R. Jurdak,, “BlockChain: A distributed solution to automotive security and privacy,’’ IEEE Commun. Mag., vol. 55, no. 12, pp. 119–125, Dec. 2017. [2] D.Puthal, “The blockchain as a decentralized security framework,” IEEE Consum. Electron. Mag., vol. 7. [3] P.W. Wadhwani and P. Saha, “Car sharing marketsizeby model”.
Download now