Skip to main content

Advertisement

Log in

Blockchain Based Chameleon Hashing Technique for Privacy Preservation in E-Governance System

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

For efficient delivery of public services to various entities and institutions in an effective and transparent manner, Information and Communication technologies has been increasingly used by Electronic government. Being one of the most sophisticated schemes that demands diversification, safeguarding and security, and any form of fiasco may turn out to be extremely expensive both prudently and collectively. The head supervision system might be subjected to failure, making it prone to cyber-attacks like distributed denial of service attacks, spywares, malwares and denial of service attacks. It enforces working and administration of extremely safe as well as authentic regionalized organizations where negotiations are not under the jurisdiction of any third party institutions. This technology enables storage of actual and contemporary data in a fixed cubicle of blocks scattered across the network in a unique manner. Data Authentication and Confidentiality are augmented by the manner in which data is encrypted and uniformly scattered throughout the unified network. Our proposal deals with the introduction of a unique scheme of a specially regionalized peer-to-peer framework with the aid of this technology, that has the ability to assure data authentication as well as confidentiality while also raises the faith of the public sectors. Apart from this, a model of the proposed structure is given, using an analytical and subjective investigation of the safety, authenticity coupled with confidentiality ramifications of such framework.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Biswas, K., & Muthukkumarasamy, V. (2016). Securing smart cities using blockchain technology. In 2016 IEEE 18th international conference on high performance computing and communications; IEEE 14th international conference on smart city; IEEE 2nd international conference on data science and systems (HPCC/Smart City/DSS) (pp. 1392–1393). IEEE.

  2. Yang, L., Elisa, N., & Eliot, N. (2018). Privacy and security aspects of E-government in smart cities. New York: Elsevier Press.

    Google Scholar 

  3. UN. (2016). E-Government survey 2014. E-Government in sup- port of sustainable development/UN Department of Economic and Social Affairs.

  4. Lambrinoudakis, C., Gritzalis, S., Dridi, F., & Pernul, G. (2003). Security requirements for e-government services: a methodological approach for developing a common pki-based security policy. Computer Communications, 26(16), 1873–1883.

    Article  Google Scholar 

  5. Moen, V., Klingsheim, A. N., Simonsen, K. I. F., & Hole, K. J. (2007). Vulnerabilities in e-governments. International Journal of Electronic Security and Digital Forensics, 1(1), 89–100.

    Article  Google Scholar 

  6. Pau, L.-F. (2010). Business and social evaluation of denial of service attacks of communications networks in view of scaling economic counter-measures. In 2010 IEEE/IFIP network operations and management symposium workshops (NOMS Wksps) (pp. 126–133). IEEE.

  7. Cryptomathic. (2015). A key component for e-government security. Retrieved May 22, 2018, from https://www.cryptomathic.com/news-events/blog/key-for-e-government-security-central-signing-authentication/.

  8. IPPMEDIA. (2016). How Tanzania lost Tanzanian shillings 187 billions to cyber criminals in 2016. Retrieved May 22, 2018, from https://www.ippmedia.com/en/business/how-tanzania-lost-187bn-cyber-criminals-2016/.

  9. Seltsikas, P., & O’keefe, R. M. (2010). Expectations and out- comes in electronic identity management: The role of trust and public value. European Journal of Information Systems, 19(1), 93–103.

    Article  Google Scholar 

  10. Ali, O., Soar, J., & Yong, J. (2014). Impact of cloud computing technology on e-government. In International conference on information and software technologies (pp. 272–290). Berlin: Springer.

  11. Nakamoto, S., & Bitcoin, A. (2008). A peer-to-peer electronic cash system. Bitcoin. https://www.bitcoin.org/bitcoin.pdf.

  12. Mukhopadhyay, U., Skjellum, A., Hambolu, O., Oakley, J., Yu, L., & Brooks, R. (2016). A brief survey of cryptocurrency systems. In 2016 14th annual conference on privacy, security and trust (PST) (pp. 745–752). IEEE.

  13. Dorri, A., Kanhere, S. S., Jurdak, R., & Gauravaram, P. (2017). Blockchain for IOT security and privacy: The case study of a smart home. In 2017 IEEE international conference on pervasive computing and communications workshops (PerCom workshops) (pp. 618–623). IEEE.

  14. Huh, S., Cho, S., & Kim, S. (2017). Managing IOT devices using blockchain platform. In 2017 19th international conference on advanced communication technology (ICACT) (pp. 464–467). IEEE.

  15. Peterson, K., Deeduvanu, R., Kanjamala, P., & Boles, K. (2016). A blockchain-based approach to health information exchange networks. In Proceedings of NIST workshop blockchain health- care (vol. 1, pp. 1–10).

  16. Turkanović, M., Hölbl, M., Košič, K., Heričko, M., & Kamišalić, A. (2018). Eductx: A blockchain-based higher education credit platform. IEEE Access, 6, 5112–5127.

    Article  Google Scholar 

  17. Jun, M. (2018). Blockchain government-a next form of infras- tructure for the twenty-first century. Journal of Open Innovation: Technology, Market, and Complexity, 4(1), 7.

    Article  Google Scholar 

  18. Singh, S., Suguna, R., Satish, D., & Ranjith Kumar, M. V. (2018). Survey on surging technology: Cryptocurrency. International Journal of Engineering and Technology (UAE), 7(3.12), 296–299.

    Article  Google Scholar 

  19. Antonopoulos, A. M. (2014). Mastering bitcoin: Unlocking dig- ital cryptocurrencies. Newton: O’Reilly Media Inc.

    Google Scholar 

  20. Zheng, Z., Xie, S., Dai, H., Chen, X., & Wang, H. (2017). An overview of blockchain technology: Architecture, consensus, and future trends. In 2017 IEEE international congress on big data (BigData congress) (pp. 557–564). IEEE.

  21. Swan, M. (2015). Blockchain: Blueprint for a new economy. Newton: O’Reilly Media Inc.

    Google Scholar 

  22. Karokola, G. R. (2012). A framework for securing e-government services: The case of Tanzania. Ph.D. thesis, Department of Computer and Systems Sciences, Stockholm University.

  23. Alshehri, M., & Drew, S. (2010). E-government fundamentals. In IADIS international conference ICT, society and human beings.

  24. Singh, S., & Karaulia, D. S. (2011). E-governance: Information security issues. In Proceedings of the international conference on computer science and information technology (pp. 120–124).

  25. Noe, E. (2017). Usability, accessibility and web security assess- ment of e-government websites in tanzania. International Journal of Computer Applications, 164(5), 42–48.

    Article  Google Scholar 

  26. Yang, L., Li, J., Fehringer, G., Barraclough, P., Sexton, G., & Cao, Y. (2017). Intrusion detection system by fuzzy interpolation. In 2017 IEEE international conference on fuzzy systems (FUZZ- IEEE) (pp. 1–6). IEEE.

  27. Elisa, N., Li, J., Zuo, Z., & Yang, L. (2018). Dendritic cell algorithm with fuzzy inference system for input signal generation. In UK workshop on computational intelligence (pp. 203–214). Berlin: Springer.

  28. Elisa, N., Yang, L., Naik, N. (2018). Dendritic cell algorithm with optimized parameters using genetic algorithm. In IEEE world congress on computational intelligence (pp. 1–8). IEEE.

  29. Zuo, Z., Li, J., Yang, L., Anderson, P., & Naik, N. (2018). Grooming detection using fuzzy-rough feature selection and text classification. In IEEE world congress on computational intelligence (pp. 1–8). IEEE.

  30. Elisa, N., Yang, L., Qu, Y., & Chao, F. (2018). A revised dendritic cell algorithm using k-means clustering. In IEEE international conference on data science and systems (pp. 1–8).

  31. Li, J., Yang, L., Qu, Y., & Sexton, G. (2018). An extended Takagi–Sugeno–Kang inference system (tsk?) with fuzzy interpolation and its rule base generation. Soft Computing, 22(10), 3155–3170.

    Article  Google Scholar 

  32. Stefanova, K., Kabakchieva, D., & Borthwick, L. (2006). Innovative approach to identity management solution development for e-government at eu level. Journal of Telecommunications and Information Technology, 2, 24–31.

    Google Scholar 

  33. Fioravanti, F., & Nardelli, E. (2008). Identity management for e-government services. In H. Chen, L. Brandt, V. Gregg, R. Traunmueller, S. Dawes, E. Hovy, A. Macintosh, & C. A. Larson (Eds.), Digital government (pp. 331–352). Berlin: Springer.

    Chapter  Google Scholar 

  34. Drogkaris, P., Geneiatakis, D., Gritzalis, S., Lambrinoudakis, C., & Mitrou L. (2008). Towards an enhanced authentication framework for e-goverment services: The Greek case. In The 7th international conference on electronic government, Torino, Italy (pp. 189–196).

  35. Kumar, M. V. R., Bhalaji, N., & Singh, S. (2019). An augmented approach for pseudo-free groups in smart cyber-physical system. Cluster Computing, 22(1), 673–692.

    Article  Google Scholar 

  36. Wballiance. (2016). Wireless broadband alliance launches city Wi-Fi roaming project. Retrieved June 8, 2018, from https://www.wballiance.com/wireless-broadband-alliance-launches-city-wi-fi-roaming-project///.

  37. Vujicic, D., Jagodic, D., Randjic, S. (2018). Blockchain technology, bitcoin, and ethereum: A brief overview. In 2018 17th international symposium INFOTEH-JAHORINA (INFOTEH) (pp. 1–6). IEEE.

  38. Krawcczyk, H., & Rabin, T. (1997). Chameleon hashing and signatures. IACR Cryptol. ePrint Arch. 1998(1998), 10.

  39. Luiijf, E. (2012). Understanding cyber threats and vulnerabilities. In J. Lopez, R. Setola, & S. D. Wolthusen (Eds.), Critical infrastructure protection (pp. 52–67). Berlin: Springer.

    Chapter  Google Scholar 

  40. Evans, M., Maglaras, L. A., He, Y., & Janicke, H. (2016). Human behaviour as an aspect of cybersecurity assurance. Security and Communication Networks, 9(17), 4667–4679.

    Article  Google Scholar 

  41. Shamir, A., & Tauman, Y. (2001). Improved online/offline signature schemes. In J. Kilian (Ed.), CRYPTO 2001, volume 2139 of LNCS (pp. 355–367). Berlin: Springer.

    Google Scholar 

  42. Sec, S. (2000). 2: Recommended elliptic curve domain parameters. Mississauga: Standards for efficient cryptography group, Certicom Corp.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. V. Ranjith Kumar.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ranjith Kumar, M.V., Bhalaji, N. Blockchain Based Chameleon Hashing Technique for Privacy Preservation in E-Governance System. Wireless Pers Commun 117, 987–1006 (2021). https://doi.org/10.1007/s11277-020-07907-w

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07907-w

Keywords

Navigation