Skip to main content

A Contract Based User-Centric Computational Trust Towards E-Governance

  • Conference paper
  • First Online:
  • 708 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 12406))

Abstract

E-Government services are persistent targets of the organized crime by hackers, which hinders the delivery of services. Computational trust is an important technique for the security work of service providers (SPs). However, it relies on data collection about users’ past behaviors conventionally from other SPs, which incurs the uncertainty of data and thus impacts the quality of data. Motivated by this issue, this paper proposes a novel smart contract based user-centric computational trust framework (UCCT) which collects the behavioral data of the user. It uses smart contract as a rational trustworthy agent to automatically monitor and manage the user’s behaviors on the user side, so as to provide deterministic data quality assurance services for the computational trust. Furthermore, a privacy-preserving way of the data sharing is provided for the user and a personalized security mechanism for the SP. A new ledger is also introduced to provide a user-centric and efficient search. The results of experiments conducted on a Hyperledger Fabric based blockchain platform demonstrate that the time cost of user-centric ledger in UCCT can be less than 1 s. Moreover, even if a more complicated contract is provided, the improvement of transaction per second (TPS), which is made by UCCT, is not less than 8%.

Supported by the National Natural Science Foundation of China-Joint Fund for Basic Research of General Technology under Grant U1836111 and U1736106.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Kumar, B.S., Sridhar, V., Sudhindra, K.R.: A case study: risk rating methodology for E-governance application security risks. i-Manager’s J. Softw. Eng. 13(3), 39–44 (2019)

    Article  Google Scholar 

  2. Grudzewski, W.M., Hejduk, I.K., Sankowska, A.: Trust management-the new way in the information society. J. Econ. Organ. Future Enterp. 2(2), 2–8 (2008)

    Google Scholar 

  3. Aberer, K., Despotovic, Z.: Managing trust in a peer-2-peer information system. In: Proceedings of the Tenth International Conference on Information and Knowledge Management, pp. 310–317. ACM, Atlanta (2001)

    Google Scholar 

  4. Alexopoulos, N., Vasilomanolakis, E., Ivánkó, N. R., Mühlhäuser, M.: Towards blockchain-based collaborative intrusion detection systems. In: D’Agostino G., Scala, A. (eds.) CRITIS 2017, LNCS, vol. 10707, pp. 107–118. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-99843-5_10

  5. Aguirre, I., Alonso, S.: Improving the automation of security information management: a collaborative approach. IEEE Secur. Priv. 10(1), 55–59 (2011)

    Article  Google Scholar 

  6. Vasilomanolakis, E., Karuppayah, S., Mühlhäuser, M., Fischer, M.: Taxonomy and survey of collaborative intrusion detection. ACM Comput. Surv. (CSUR) 47(4), 55 (2015)

    Article  Google Scholar 

  7. Yu, J., Fan, W., Hong-Wu, Z., Li, D.: Survey on trust mechanisms in the environment of cloud computing. J. Chin. Comput. Syst. (2016)

    Google Scholar 

  8. Teacy, W. T., Patel, J., Jennings, N. R., Luck, M.: Coping with inaccurate reputation sources: experimental analysis of a probabilistic trust model. In: 4th International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 997–1004. ACM, Utrecht (2005)

    Google Scholar 

  9. Huynh, T.D., Jennings, N.R., Shadbolt, N.R.: An integrated trust and reputation model for open multi-agent systems. Auton. Agent. Multi-Agent Syst. 13(2), 119–154 (2006). https://doi.org/10.1007/s10458-005-6825-4

    Article  Google Scholar 

  10. Atote, B. S., Zahoor, S., Dangra, B., Bedekar, M.: Personalization in user profiling: privacy and security issues. In: 2016 International Conference on Internet of Things and Applications (IOTA), pp. 415–417. IEEE, India (2016)

    Google Scholar 

  11. Liang, Z., Shi, W.: PET: a PErsonalized trust model with reputation and risk evaluation for P2P resource sharing. In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), pp. 201b–201b. IEEE, Big Island (2005)

    Google Scholar 

  12. Zhang, J., Cohen, R.: Evaluating the trustworthiness of advice about seller agents in e-marketplaces: a personalized approach. Electron. Commer. Res. Appl. 7(3), 330–340 (2008)

    Article  Google Scholar 

  13. Saeed, O., Shaikh, R.A.: A user-based trust model for cloud computing environment. Int. J. Adv. Comput. Sci. Appl. 9(3), 337–346 (2018)

    Google Scholar 

  14. Botelho, V., Kredens, K. V., Martins, J. V., Ávila, B. C., Scalabrin, E. E.: Dossier: decentralized trust model towards a decentralized demand. In: IEEE 22nd International Conference on Computer Supported Cooperative Work in Design, pp. 371–376. IEEE, Nanjing (2018)

    Google Scholar 

  15. Jøsang, A.: The right type of trust for computer networks. In: Proceedings of the ACM New Security Paradigms Workshop. ACM (1996)

    Google Scholar 

  16. Samlinson, E., Usha, M.: User-centric trust based identity as a service for federated cloud environment. In: Fourth International Conference on Computing, pp. 1–5. IEEE, Tiruchengode (2014)

    Google Scholar 

  17. Ruohomaa, S., Kutvonen, L.: Trust management survey. In: Herrmann, P., Issarny, V., Shiu, S. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 77–92. Springer, Heidelberg (2005). https://doi.org/10.1007/11429760_6

    Chapter  Google Scholar 

  18. Schnjakin, M., Alnemr, R., Meinel, C.: Contract-based cloud architecture. In: Proceedings of the Second International Workshop on Cloud Data Management, pp. 33–40. ACM, Toronto (2009)

    Google Scholar 

  19. Wood, G.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Pap. 151, 1–31 (2014)

    Google Scholar 

  20. Hammadi, A., Hussain, O.K., Dillon, T., Hussain, F.K.: A framework for SLA management in cloud computing for informed decision making. Cluster Comput. 16(4), 961–977 (2012). https://doi.org/10.1007/s10586-012-0232-9

    Article  Google Scholar 

  21. hyperledger fabric. https://www.hyperledger.org/projects/fabric. Accessed 20 Jan 2020

  22. Chen, P.W., Jiang, B.S., Wang, C.H.: Blockchain-based payment collection supervision system using pervasive Bitcoin digital wallet. In: 2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 139–146 IEEE (2017)

    Google Scholar 

  23. Tao, Q., Cui, X., Huang, X., Leigh, A.M., Gu, H.: Food safety supervision system based on hierarchical multi-domain blockchain network. IEEE Access 7, 51817–51826 (2019)

    Article  Google Scholar 

  24. Yong, B., Shen, J., Liu, X., Li, F., Chen, H., Zhou, Q.: An intelligent blockchain-based system for safe vaccine supply and supervision. Int. J. Inf. Manag. 51, 102024 (2019)

    Google Scholar 

  25. goahead. https://github.com/embedthis/goahead. Accessed 20 Jan 2020

  26. chaincodeexample02. https://github.com/hyperledger/fabric/tree/v0.6/examples. Accessed 20 Jan 2020

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bin Hu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hu, B., Zhao, X., Zhang, C., Jin, Y., Wei, B. (2020). A Contract Based User-Centric Computational Trust Towards E-Governance. In: Ku, WS., Kanemasa, Y., Serhani, M.A., Zhang, LJ. (eds) Web Services – ICWS 2020. ICWS 2020. Lecture Notes in Computer Science(), vol 12406. Springer, Cham. https://doi.org/10.1007/978-3-030-59618-7_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-59618-7_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-59617-0

  • Online ISBN: 978-3-030-59618-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics