Abstract
For efficient delivery of public services to various entities and institutions in an effective and transparent manner, Information and Communication technologies has been increasingly used by Electronic government. Being one of the most sophisticated schemes that demands diversification, safeguarding and security, and any form of fiasco may turn out to be extremely expensive both prudently and collectively. The head supervision system might be subjected to failure, making it prone to cyber-attacks like distributed denial of service attacks, spywares, malwares and denial of service attacks. It enforces working and administration of extremely safe as well as authentic regionalized organizations where negotiations are not under the jurisdiction of any third party institutions. This technology enables storage of actual and contemporary data in a fixed cubicle of blocks scattered across the network in a unique manner. Data Authentication and Confidentiality are augmented by the manner in which data is encrypted and uniformly scattered throughout the unified network. Our proposal deals with the introduction of a unique scheme of a specially regionalized peer-to-peer framework with the aid of this technology, that has the ability to assure data authentication as well as confidentiality while also raises the faith of the public sectors. Apart from this, a model of the proposed structure is given, using an analytical and subjective investigation of the safety, authenticity coupled with confidentiality ramifications of such framework.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-020-07907-w/MediaObjects/11277_2020_7907_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-020-07907-w/MediaObjects/11277_2020_7907_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-020-07907-w/MediaObjects/11277_2020_7907_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-020-07907-w/MediaObjects/11277_2020_7907_Fig4_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-020-07907-w/MediaObjects/11277_2020_7907_Fig5_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-020-07907-w/MediaObjects/11277_2020_7907_Fig6_HTML.png)
Similar content being viewed by others
References
Biswas, K., & Muthukkumarasamy, V. (2016). Securing smart cities using blockchain technology. In 2016 IEEE 18th international conference on high performance computing and communications; IEEE 14th international conference on smart city; IEEE 2nd international conference on data science and systems (HPCC/Smart City/DSS) (pp. 1392–1393). IEEE.
Yang, L., Elisa, N., & Eliot, N. (2018). Privacy and security aspects of E-government in smart cities. New York: Elsevier Press.
UN. (2016). E-Government survey 2014. E-Government in sup- port of sustainable development/UN Department of Economic and Social Affairs.
Lambrinoudakis, C., Gritzalis, S., Dridi, F., & Pernul, G. (2003). Security requirements for e-government services: a methodological approach for developing a common pki-based security policy. Computer Communications, 26(16), 1873–1883.
Moen, V., Klingsheim, A. N., Simonsen, K. I. F., & Hole, K. J. (2007). Vulnerabilities in e-governments. International Journal of Electronic Security and Digital Forensics, 1(1), 89–100.
Pau, L.-F. (2010). Business and social evaluation of denial of service attacks of communications networks in view of scaling economic counter-measures. In 2010 IEEE/IFIP network operations and management symposium workshops (NOMS Wksps) (pp. 126–133). IEEE.
Cryptomathic. (2015). A key component for e-government security. Retrieved May 22, 2018, from https://www.cryptomathic.com/news-events/blog/key-for-e-government-security-central-signing-authentication/.
IPPMEDIA. (2016). How Tanzania lost Tanzanian shillings 187 billions to cyber criminals in 2016. Retrieved May 22, 2018, from https://www.ippmedia.com/en/business/how-tanzania-lost-187bn-cyber-criminals-2016/.
Seltsikas, P., & O’keefe, R. M. (2010). Expectations and out- comes in electronic identity management: The role of trust and public value. European Journal of Information Systems, 19(1), 93–103.
Ali, O., Soar, J., & Yong, J. (2014). Impact of cloud computing technology on e-government. In International conference on information and software technologies (pp. 272–290). Berlin: Springer.
Nakamoto, S., & Bitcoin, A. (2008). A peer-to-peer electronic cash system. Bitcoin. https://www.bitcoin.org/bitcoin.pdf.
Mukhopadhyay, U., Skjellum, A., Hambolu, O., Oakley, J., Yu, L., & Brooks, R. (2016). A brief survey of cryptocurrency systems. In 2016 14th annual conference on privacy, security and trust (PST) (pp. 745–752). IEEE.
Dorri, A., Kanhere, S. S., Jurdak, R., & Gauravaram, P. (2017). Blockchain for IOT security and privacy: The case study of a smart home. In 2017 IEEE international conference on pervasive computing and communications workshops (PerCom workshops) (pp. 618–623). IEEE.
Huh, S., Cho, S., & Kim, S. (2017). Managing IOT devices using blockchain platform. In 2017 19th international conference on advanced communication technology (ICACT) (pp. 464–467). IEEE.
Peterson, K., Deeduvanu, R., Kanjamala, P., & Boles, K. (2016). A blockchain-based approach to health information exchange networks. In Proceedings of NIST workshop blockchain health- care (vol. 1, pp. 1–10).
Turkanović, M., Hölbl, M., Košič, K., Heričko, M., & Kamišalić, A. (2018). Eductx: A blockchain-based higher education credit platform. IEEE Access, 6, 5112–5127.
Jun, M. (2018). Blockchain government-a next form of infras- tructure for the twenty-first century. Journal of Open Innovation: Technology, Market, and Complexity, 4(1), 7.
Singh, S., Suguna, R., Satish, D., & Ranjith Kumar, M. V. (2018). Survey on surging technology: Cryptocurrency. International Journal of Engineering and Technology (UAE), 7(3.12), 296–299.
Antonopoulos, A. M. (2014). Mastering bitcoin: Unlocking dig- ital cryptocurrencies. Newton: O’Reilly Media Inc.
Zheng, Z., Xie, S., Dai, H., Chen, X., & Wang, H. (2017). An overview of blockchain technology: Architecture, consensus, and future trends. In 2017 IEEE international congress on big data (BigData congress) (pp. 557–564). IEEE.
Swan, M. (2015). Blockchain: Blueprint for a new economy. Newton: O’Reilly Media Inc.
Karokola, G. R. (2012). A framework for securing e-government services: The case of Tanzania. Ph.D. thesis, Department of Computer and Systems Sciences, Stockholm University.
Alshehri, M., & Drew, S. (2010). E-government fundamentals. In IADIS international conference ICT, society and human beings.
Singh, S., & Karaulia, D. S. (2011). E-governance: Information security issues. In Proceedings of the international conference on computer science and information technology (pp. 120–124).
Noe, E. (2017). Usability, accessibility and web security assess- ment of e-government websites in tanzania. International Journal of Computer Applications, 164(5), 42–48.
Yang, L., Li, J., Fehringer, G., Barraclough, P., Sexton, G., & Cao, Y. (2017). Intrusion detection system by fuzzy interpolation. In 2017 IEEE international conference on fuzzy systems (FUZZ- IEEE) (pp. 1–6). IEEE.
Elisa, N., Li, J., Zuo, Z., & Yang, L. (2018). Dendritic cell algorithm with fuzzy inference system for input signal generation. In UK workshop on computational intelligence (pp. 203–214). Berlin: Springer.
Elisa, N., Yang, L., Naik, N. (2018). Dendritic cell algorithm with optimized parameters using genetic algorithm. In IEEE world congress on computational intelligence (pp. 1–8). IEEE.
Zuo, Z., Li, J., Yang, L., Anderson, P., & Naik, N. (2018). Grooming detection using fuzzy-rough feature selection and text classification. In IEEE world congress on computational intelligence (pp. 1–8). IEEE.
Elisa, N., Yang, L., Qu, Y., & Chao, F. (2018). A revised dendritic cell algorithm using k-means clustering. In IEEE international conference on data science and systems (pp. 1–8).
Li, J., Yang, L., Qu, Y., & Sexton, G. (2018). An extended Takagi–Sugeno–Kang inference system (tsk?) with fuzzy interpolation and its rule base generation. Soft Computing, 22(10), 3155–3170.
Stefanova, K., Kabakchieva, D., & Borthwick, L. (2006). Innovative approach to identity management solution development for e-government at eu level. Journal of Telecommunications and Information Technology, 2, 24–31.
Fioravanti, F., & Nardelli, E. (2008). Identity management for e-government services. In H. Chen, L. Brandt, V. Gregg, R. Traunmueller, S. Dawes, E. Hovy, A. Macintosh, & C. A. Larson (Eds.), Digital government (pp. 331–352). Berlin: Springer.
Drogkaris, P., Geneiatakis, D., Gritzalis, S., Lambrinoudakis, C., & Mitrou L. (2008). Towards an enhanced authentication framework for e-goverment services: The Greek case. In The 7th international conference on electronic government, Torino, Italy (pp. 189–196).
Kumar, M. V. R., Bhalaji, N., & Singh, S. (2019). An augmented approach for pseudo-free groups in smart cyber-physical system. Cluster Computing, 22(1), 673–692.
Wballiance. (2016). Wireless broadband alliance launches city Wi-Fi roaming project. Retrieved June 8, 2018, from https://www.wballiance.com/wireless-broadband-alliance-launches-city-wi-fi-roaming-project///.
Vujicic, D., Jagodic, D., Randjic, S. (2018). Blockchain technology, bitcoin, and ethereum: A brief overview. In 2018 17th international symposium INFOTEH-JAHORINA (INFOTEH) (pp. 1–6). IEEE.
Krawcczyk, H., & Rabin, T. (1997). Chameleon hashing and signatures. IACR Cryptol. ePrint Arch. 1998(1998), 10.
Luiijf, E. (2012). Understanding cyber threats and vulnerabilities. In J. Lopez, R. Setola, & S. D. Wolthusen (Eds.), Critical infrastructure protection (pp. 52–67). Berlin: Springer.
Evans, M., Maglaras, L. A., He, Y., & Janicke, H. (2016). Human behaviour as an aspect of cybersecurity assurance. Security and Communication Networks, 9(17), 4667–4679.
Shamir, A., & Tauman, Y. (2001). Improved online/offline signature schemes. In J. Kilian (Ed.), CRYPTO 2001, volume 2139 of LNCS (pp. 355–367). Berlin: Springer.
Sec, S. (2000). 2: Recommended elliptic curve domain parameters. Mississauga: Standards for efficient cryptography group, Certicom Corp.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Ranjith Kumar, M.V., Bhalaji, N. Blockchain Based Chameleon Hashing Technique for Privacy Preservation in E-Governance System. Wireless Pers Commun 117, 987–1006 (2021). https://doi.org/10.1007/s11277-020-07907-w
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-020-07907-w