Abstract
E-Government services are persistent targets of the organized crime by hackers, which hinders the delivery of services. Computational trust is an important technique for the security work of service providers (SPs). However, it relies on data collection about users’ past behaviors conventionally from other SPs, which incurs the uncertainty of data and thus impacts the quality of data. Motivated by this issue, this paper proposes a novel smart contract based user-centric computational trust framework (UCCT) which collects the behavioral data of the user. It uses smart contract as a rational trustworthy agent to automatically monitor and manage the user’s behaviors on the user side, so as to provide deterministic data quality assurance services for the computational trust. Furthermore, a privacy-preserving way of the data sharing is provided for the user and a personalized security mechanism for the SP. A new ledger is also introduced to provide a user-centric and efficient search. The results of experiments conducted on a Hyperledger Fabric based blockchain platform demonstrate that the time cost of user-centric ledger in UCCT can be less than 1 s. Moreover, even if a more complicated contract is provided, the improvement of transaction per second (TPS), which is made by UCCT, is not less than 8%.
Supported by the National Natural Science Foundation of China-Joint Fund for Basic Research of General Technology under Grant U1836111 and U1736106.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Kumar, B.S., Sridhar, V., Sudhindra, K.R.: A case study: risk rating methodology for E-governance application security risks. i-Manager’s J. Softw. Eng. 13(3), 39–44 (2019)
Grudzewski, W.M., Hejduk, I.K., Sankowska, A.: Trust management-the new way in the information society. J. Econ. Organ. Future Enterp. 2(2), 2–8 (2008)
Aberer, K., Despotovic, Z.: Managing trust in a peer-2-peer information system. In: Proceedings of the Tenth International Conference on Information and Knowledge Management, pp. 310–317. ACM, Atlanta (2001)
Alexopoulos, N., Vasilomanolakis, E., Ivánkó, N. R., Mühlhäuser, M.: Towards blockchain-based collaborative intrusion detection systems. In: D’Agostino G., Scala, A. (eds.) CRITIS 2017, LNCS, vol. 10707, pp. 107–118. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-99843-5_10
Aguirre, I., Alonso, S.: Improving the automation of security information management: a collaborative approach. IEEE Secur. Priv. 10(1), 55–59 (2011)
Vasilomanolakis, E., Karuppayah, S., Mühlhäuser, M., Fischer, M.: Taxonomy and survey of collaborative intrusion detection. ACM Comput. Surv. (CSUR) 47(4), 55 (2015)
Yu, J., Fan, W., Hong-Wu, Z., Li, D.: Survey on trust mechanisms in the environment of cloud computing. J. Chin. Comput. Syst. (2016)
Teacy, W. T., Patel, J., Jennings, N. R., Luck, M.: Coping with inaccurate reputation sources: experimental analysis of a probabilistic trust model. In: 4th International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 997–1004. ACM, Utrecht (2005)
Huynh, T.D., Jennings, N.R., Shadbolt, N.R.: An integrated trust and reputation model for open multi-agent systems. Auton. Agent. Multi-Agent Syst. 13(2), 119–154 (2006). https://doi.org/10.1007/s10458-005-6825-4
Atote, B. S., Zahoor, S., Dangra, B., Bedekar, M.: Personalization in user profiling: privacy and security issues. In: 2016 International Conference on Internet of Things and Applications (IOTA), pp. 415–417. IEEE, India (2016)
Liang, Z., Shi, W.: PET: a PErsonalized trust model with reputation and risk evaluation for P2P resource sharing. In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), pp. 201b–201b. IEEE, Big Island (2005)
Zhang, J., Cohen, R.: Evaluating the trustworthiness of advice about seller agents in e-marketplaces: a personalized approach. Electron. Commer. Res. Appl. 7(3), 330–340 (2008)
Saeed, O., Shaikh, R.A.: A user-based trust model for cloud computing environment. Int. J. Adv. Comput. Sci. Appl. 9(3), 337–346 (2018)
Botelho, V., Kredens, K. V., Martins, J. V., Ávila, B. C., Scalabrin, E. E.: Dossier: decentralized trust model towards a decentralized demand. In: IEEE 22nd International Conference on Computer Supported Cooperative Work in Design, pp. 371–376. IEEE, Nanjing (2018)
Jøsang, A.: The right type of trust for computer networks. In: Proceedings of the ACM New Security Paradigms Workshop. ACM (1996)
Samlinson, E., Usha, M.: User-centric trust based identity as a service for federated cloud environment. In: Fourth International Conference on Computing, pp. 1–5. IEEE, Tiruchengode (2014)
Ruohomaa, S., Kutvonen, L.: Trust management survey. In: Herrmann, P., Issarny, V., Shiu, S. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 77–92. Springer, Heidelberg (2005). https://doi.org/10.1007/11429760_6
Schnjakin, M., Alnemr, R., Meinel, C.: Contract-based cloud architecture. In: Proceedings of the Second International Workshop on Cloud Data Management, pp. 33–40. ACM, Toronto (2009)
Wood, G.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Pap. 151, 1–31 (2014)
Hammadi, A., Hussain, O.K., Dillon, T., Hussain, F.K.: A framework for SLA management in cloud computing for informed decision making. Cluster Comput. 16(4), 961–977 (2012). https://doi.org/10.1007/s10586-012-0232-9
hyperledger fabric. https://www.hyperledger.org/projects/fabric. Accessed 20 Jan 2020
Chen, P.W., Jiang, B.S., Wang, C.H.: Blockchain-based payment collection supervision system using pervasive Bitcoin digital wallet. In: 2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 139–146 IEEE (2017)
Tao, Q., Cui, X., Huang, X., Leigh, A.M., Gu, H.: Food safety supervision system based on hierarchical multi-domain blockchain network. IEEE Access 7, 51817–51826 (2019)
Yong, B., Shen, J., Liu, X., Li, F., Chen, H., Zhou, Q.: An intelligent blockchain-based system for safe vaccine supply and supervision. Int. J. Inf. Manag. 51, 102024 (2019)
goahead. https://github.com/embedthis/goahead. Accessed 20 Jan 2020
chaincodeexample02. https://github.com/hyperledger/fabric/tree/v0.6/examples. Accessed 20 Jan 2020
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Hu, B., Zhao, X., Zhang, C., Jin, Y., Wei, B. (2020). A Contract Based User-Centric Computational Trust Towards E-Governance. In: Ku, WS., Kanemasa, Y., Serhani, M.A., Zhang, LJ. (eds) Web Services – ICWS 2020. ICWS 2020. Lecture Notes in Computer Science(), vol 12406. Springer, Cham. https://doi.org/10.1007/978-3-030-59618-7_9
Download citation
DOI: https://doi.org/10.1007/978-3-030-59618-7_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-59617-0
Online ISBN: 978-3-030-59618-7
eBook Packages: Computer ScienceComputer Science (R0)