“…In order to prevent malicious users from subverting the system, permissionless networks adopt a consensus model by which users are to expend or maintain resources while to attempt to publish blocks. Permissioned networks, on the other hand, require users to have authorization before they can publish blocks(Yaga et al, 2018).In contrast with the centralized trust systems employed by multisided digital platforms, blockchains employ a decentralized, opensource system by which data management, transaction, verification, and monitoring happen across multiple nodes using a consensus mechanism(Bhushan, Sinha, Sagayam, & Onesimu, 2021;Mohanta, Jena, Panda, & Sobhanayak, 2019;Zutshi et al, 2021). Four key features of blockchain technology underpin this trust mechanism: (a) an append-only ledger to provide the entire transactional history in a process where transactions can be written into the blockchain but cannot be overridden; (b) the use of cryptography to ensure that the data contained within the ledger has not been tampered with, and the data can be attested; (c) the ledger is shared among multiple participants to provide transparency across multiple nodes in the network; and (d) scaling up the number of nodes in the network to make it moreF I G U R E 1 Principles undergirding the sharing economy value chains [Color figure can be viewed at wileyonlinelibrary.com]…”