A Decentralised Digital Token Architecture for Public Transport

Read original: arXiv:2012.01382 - Published 7/23/2024 by Oscar King, Geoffrey Goodell
Total Score

0

🤔

Sign in to get full access

or

If you already have an account, we'll log you in

Overview

  • Digitization has made it easier for people to access various services, such as purchasing tickets or borrowing books, with just a click of a button.
  • However, this digital interaction also means that a user's actions are automatically recorded, which can be problematic as the information collected is outside of the user's control.
  • The centralization of authentication mechanisms exacerbates this issue, allowing for the aggregation and analysis of even more data.
  • This research aims to address the need for privacy-enhancing digital token management services, specifically for public transit.

Plain English Explanation

In the past, accessing services like public transportation or borrowing books often required physical interactions, such as showing identification or paying with cash. Digitization has made these tasks much more convenient, allowing people to complete them with just a few clicks. While this may seem functionally similar to the analog versions, the digital interactions are automatically recorded, meaning the user has less control over the information collected about them. This issue is further compounded by the centralization of the authentication systems that underpin these digital services, as it enables the aggregation and analysis of even more data about users.

The researchers in this study aim to address this privacy concern by exploring the feasibility of implementing a privacy-enhancing digital token management service for public transportation. They have developed a proof-of-concept system, building upon a previous design, and tested its performance in a local environment. The results suggest that the system can compete with current contactless payment solutions in terms of throughput and latency. However, further work is needed to evaluate its performance in a production-like setting.

Technical Explanation

The researchers developed a proof-of-concept implementation of a privacy-enhancing digital token management service for public transit. This system is based on a design proposed by Goodell and Aste, which was optimized for the public transport use case.

The researchers tested the performance of their proof-of-concept system in a local environment, focusing on metrics such as throughput and latency. They found that for loads between one and five requests per second, the system performed comparably to other contactless payment systems, with a maximum median response time of less than two seconds.

However, due to hardware bottlenecks, the reliable throughput in the test environment was limited to five requests per second. The researchers note that while the demonstrated performance characteristics indicate the feasibility of their system, further work is needed to evaluate its performance in a production-like environment.

Critical Analysis

The researchers acknowledge that their proof-of-concept implementation was tested in a local environment, and further work is needed to demonstrate its performance characteristics in a production setting. This is a valid concern, as the challenges and constraints of a real-world deployment may differ significantly from the controlled test environment.

Additionally, the researchers do not provide detailed information about the specific hardware and system configurations used in their tests. Without this context, it is difficult to fully understand the limitations they observed and how they might translate to different deployment scenarios.

While the researchers have demonstrated the technical feasibility of their privacy-enhancing digital token management service, they do not address potential adoption challenges or user acceptance factors. The success of such a system may depend on its ability to balance privacy concerns with the expectations and user experience of public transit riders.

Conclusion

This research presents a promising approach to addressing the privacy concerns associated with the digitization of public services, such as public transportation. The proof-of-concept implementation of a privacy-enhancing digital token management service has shown that it can compete with current contactless payment systems in terms of performance metrics like throughput and latency.

However, the researchers acknowledge the need for further testing and evaluation in a production-like environment to fully assess the system's viability. Additionally, the researchers should consider the broader adoption and user acceptance factors that may impact the successful implementation of such a privacy-focused solution in the public transit domain.

Overall, this work highlights the importance of considering privacy implications in the ongoing digitization of public services and the potential for innovative approaches to address these concerns.



This summary was produced with help from an AI and may contain inaccuracies - check out the links to read the original source documents!

Follow @aimodelsfyi on 𝕏 →

Related Papers

🤔

Total Score

0

A Decentralised Digital Token Architecture for Public Transport

Oscar King, Geoffrey Goodell

Digitisation is often viewed as beneficial to a user. Whereas traditionally, people would physically have to identify to a service, pay for a ticket in cash, or go into a library to access a book, people can now achieve all of this through a click of a button. Such actions may seem functionally identical to their analogue counterparts, but in the digital case, a user's actions are automatically recorded. The recording of user's interactions presents a problem because once the information is collected, it is outside of the control of the person whom it concerns. This issue is only exacerbated by the centralisation of the authentication mechanisms underpinning the aforementioned services, permitting the aggregation and analysis of even more data. This work aims to motivate the need and establish the feasibility of the application of a privacy-enhancing digital token management service to public transit. A proof-of-concept implementation is developed, building upon a design proposed by Goodell and Aste. This implementation was optimised for the public transport use case. Its performance is tested in a local environment to better understand the technical challenges and assess the technical feasibility of the system in a production setting. It was observed that for loads between one and five requests per second the proof-of-concept performs comparably to other contactless payment systems, with a maximum median response time less than two seconds. Due to hardware bottlenecks, reliable throughput in our test environment was limited to five requests per second. The demonstrated throughput and latency indicate that the system can feasibly compete with solutions currently in use. Yet, further work is needed to demonstrate their performance characteristics in an environment similar to that experienced in production.

Read more

7/23/2024

Benchmarking the performance of a self-custody, non-ledger-based, obliviously managed digital payment system
Total Score

0

Benchmarking the performance of a self-custody, non-ledger-based, obliviously managed digital payment system

William Macpherson, Geoffrey Goodell

As global governments intensify efforts to operationalize retail central bank digital currencies (CBDCs), the imperative for architectures that preserve user privacy has never been more pronounced. This paper advances an existing retail CBDC framework developed at University College London. Utilizing the capabilities of the Comet research framework, our proposed design allows users to retain direct custody of their assets without the need for intermediary service providers, all while preserving transactional anonymity. The study unveils a novel technique to expedite the retrieval of Proof of Provenance, significantly accelerating the verification of transaction legitimacy through the refinement of Merkle Trie structures. In parallel, we introduce a streamlined Digital Ledger designed to offer fast, immutable, and decentralized transaction validation within a permissioned ecosystem. The ultimate objective of this research is to benchmark the performance of the legacy system formulated by the original Comet research team against the newly devised system elucidated in this paper. Our endeavour is to establish a foundational design for a scalable national infrastructure proficient in seamlessly processing thousands of transactions in real-time, without compromising consumer privacy or data integrity.

Read more

4/22/2024

Conceptual Design and Implementation of FIDO2 compatible Smart Card for Decentralized Financial Transaction System
Total Score

0

Conceptual Design and Implementation of FIDO2 compatible Smart Card for Decentralized Financial Transaction System

Anisha Ghosh, Aditya Mitra, Sibi Chakkaravarthy Sethuraman, Aswani Kumar Cherukuri

With challenges and limitations associated with security in the fintech industry, the rise to the need for data protection increases. However, the current existing passwordless and password-based peer to peer transactions in online banking systems are vulnerable to advanced forms of digital attacks. The influx of modern data protection methods keeps better records of the transactions, but it still does not address the issue of authentication and account takeovers during transactions. To the address the mentioned issue, this paper proposes a novel and robust peer to peer transaction system which employs best cloud security practices, proper use of cryptography and trusted computing to mitigate common vulnerabilities. We will be implementing FIDO2 compatible Smart Card to securely authenticate the user using physical smart cards and store the records in the cloud which enables access control by allowing access only when an access is requested. The standard incorporates multiple layers of security on cloud computing models to ensure secrecy of the said data. Services of the standard adhere to regulations provides by the government and assures privacy to the information of the payee or the end-user. The whole system has been implemented in the Internet of Things scenario.

Read more

8/12/2024

Interactive Public Transport Infrastructure Analysis through Mobility Profiles: Making the Mobility Transition Transparent
Total Score

0

Interactive Public Transport Infrastructure Analysis through Mobility Profiles: Making the Mobility Transition Transparent

Yannick Metz, Dennis Ackermann, Daniel A. Keim, Maximilian T. Fischer

Efficient public transport systems are crucial for sustainable urban development as cities face increasing mobility demands. Yet, many public transport networks struggle to meet diverse user needs due to historical development, urban constraints, and financial limitations. Traditionally, planning of transport network structure is often based on limited surveys, expert opinions, or partial usage statistics. This provides an incomplete basis for decision-making. We introduce an data-driven approach to public transport planning and optimization, calculating detailed accessibility measures at the individual housing level. Our visual analytics workflow combines population-group-based simulations with dynamic infrastructure analysis, utilizing a scenario-based model to simulate daily travel patterns of varied demographic groups, including schoolchildren, students, workers, and pensioners. These population groups, each with unique mobility requirements and routines, interact with the transport system under different scenarios traveling to and from Points of Interest (POI), assessed through travel time calculations. Results are visualized through heatmaps, density maps, and network overlays, as well as detailed statistics. Our system allows us to analyze both the underlying data and simulation results on multiple levels of granularity, delivering both broad insights and granular details. Case studies with the city of Konstanz, Germany reveal key areas where public transport does not meet specific needs, confirmed through a formative user study. Due to the high cost of changing legacy networks, our analysis facilitates the identification of strategic enhancements, such as optimized schedules or rerouting, and few targeted stop relocations, highlighting consequential variations in accessibility to pinpointing critical service gaps.

Read more

8/27/2024