[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3443467.3443764acmotherconferencesArticle/Chapter ViewAbstractPublication PageseitceConference Proceedingsconference-collections
research-article

BlockChain/ABE-based Fusion Solution for E-government Data Sharing and Privacy protection

Published: 01 February 2021 Publication History

Abstract

the instinct characteristics of blockchain technology to write transactions on distributed ledgers offers new opportunities for government to improve transparency, prevent fraud, and establish trust in the public sector. However, there still exits the challenge to protect data confidentiality, authenticity and ownership when sharing and exchanging e-document in decentralized blockchain network. In order to address this concern, we propose a fusion scheme of CP-ABE and Blockchain called GovChain. In GovChain, a blockchain framework is used to implement trusted identity authentication environment and improve scalability of CP-ABE policy. Moreover, encrypted e-government documents are stored on off-chain InterPlanetary File System(IPFS) and the data users can be authorized to obtain the index of documents on the chain. Finally, the security analysis is given in GovChain to prove the security of proposed fusion scheme. Meanwhile, experimental results also show that our system is feasible and effective.

References

[1]
Choi, J. J. U., Ae Chun, S., Kim, D. H., and Keromytis, A. "SecureGov: secure data sharing for government services". In Proceedings of the 14th Annual International Conference on Digital Government Research, ACM. 2013, pp. 127--135.
[2]
"EU General Data Protection Regulation," Apr. 2016. [Online]. Available: https://www.eugdpr.org/eugdpr.org.html
[3]
Alexandros B. Sideridi, Elias Pimenidis, Konstantina Costopoulou, etc. "Cross-Border e-Government Authentication Services", Proc. ICT in Agriculture, Food and Environment(HAICTA17), Chania Greece, 2017.
[4]
Emmanuelle Ganne. Can Blockchain revolutionize international trade? WTO, 2018.
[5]
Engelenburg, S.V.S. van et al. 2017. Design of a software architecture supporting business-to-government information sharing to improve public safety and security. Journal of Intelligent Information Systems. (Jul. 2017), 1-- 24.
[6]
Carter, L., & Ubacht, J. (2018). Panel: Blockchain applications in government. In C. C. Hinnant, & A. Zuiderwijk (Eds.), Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age, DG.O 2018 [a126] Association for Computing Machinery (ACM). https://doi.org/10.1145/3209281.3209329.
[7]
Yoganand Aiyadurai. Hippocratic data sharing in e-government space with contract myanagement, Durban University of Technology, Durban, South Africa, 2015.
[8]
Lacity M C. Addressing key challenges to making enterprise blockchain applications a reality[J]. MIS Quarterly Executive, 2018, 17(3): 201--222.
[9]
Halpin H, Piekarska M. Introduction to Security and Privacy on the Blockchain[C]// 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, 2017: 1--3.
[10]
M. Shahriar Rahman, A. Al Omar, M. Z. A. Bhuiyan, A. Basu, S. Kiyomoto and G. Wang, "Accountable Cross-Border Data Sharing Using Blockchain Under Relaxed Trust Assumption," in IEEE Transactions on Engineering Management.
[11]
L. Liu, C. Piao, X. Jiang and L. Zheng, "Research on Governmental Data Sharing Based on Local Differential Privacy Approach," 2018 IEEE 15th International Conference on e-Business Engineering (ICEBE), Xi'an, 2018, pp. 39--45.
[12]
Bethencourt J, Sahai A, Waters B. "Ciphertext-policy attribute-based encryption". Paper presented at: IEEE Symposium on Security and Privacy (SP'07); 2007; Berkeley, CA.
[13]
Su JS, Cao D, Wang XF, Sun YP, Hu QL. "Attribute-Based encryption schemes". Journal of Software, 2011, 22(6): 1299--1315. http://www.jos.org.cn/1000-9825/3993.htm
[14]
Yunru Zhang, Debiao He, Kim-Kwang Raymond Choo, BaDS: blockchain-based architecture for data sharing with ABS and CP-ABE in IoT, Wireless Communications and Mobile Computing, vol. 2018, Article ID 2783658, 9 pages, 2018.
[15]
Bramm, G., Gall, M. and Schütte, J. BDABE - Blockchain-based Distributed Attribute based Encryption. In Proceedings of the 15th International Joint Conference on e-Business and Telecommunications (ICETE 2018) - Volume 2: SECRYPT, pages 99--110.
[16]
Fan Y, Lin X, Liang W, et al. TraceChain: A blockchain-based scheme to protect data confidentiality and traceability. Softw: Pract Exper. 2019;1--15. https://doi.org/10.1002/spe.2753
[17]
S. Hidano, S. Kiyomoto, Y. Murakami, P. Vlacheas, and K. Moessner, "Design of a security gateway for ikaas platform," in Proc. Int. Conf. Cloud Comput., 2015, pp. 323--333.
[18]
Waters B. Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. Paper presented at: International Workshop on Public Key Cryptography; 2008; Taormina, Italy.
[19]
Beimel A. Secure Schemes for Secret Sharing and Key Distribution [PhD thesis]. Haifa, Israel: Technion-Israel Institute of Technology, Faculty of Computer Science; 1996.
[20]
Q.M. Malluhi, A. Shikfa, V.D. Tran, V.C. Trinh. Decentralized ciphertext-policy attribute-based encryption schemes for lightweight devices Computer Communications, Volume 145, 2019, pp. 113--125
[21]
Lewko A., Waters B. (2011) Decentralizing Attribute-Based Encryption. In: Paterson K.G. (eds) Advances in Cryptology -- EUROCRYPT 2011. EUROCRYPT 2011. Lecture Notes in Computer Science, vol 6632. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20465-4_31.
[22]
Zeutro, LLC. The OpenABE Design Document Version 1.0. 2018. https://github.com/zeutro/openabe/releases/download/v1.0/libopenabe-v1.0.0-design-doc.pdf
[23]
Rouselakis Yannis, Waters Brent. (2015). Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption. IACR Cryptology ePrint Archive. 2015. 315--332. 10.1007978-3-662-47854- 7 19.
[24]
Charm. https://jhuisi.github.io/charm/index.html.
[25]
Liu Z, Cao Z, Wong DS. Traceable CP-ABE: how to trace decryption devices found in the wild. IEEE Trans Inf Forensics Secur. 2017;10(1): 55--68.
[26]
Li J, Huang Q, Chen X, Chow SSM, Wong DS, Xie D. Multi-authority ciphertext-policy attribute-based encryption with accountability. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security; 2011; Hong Kong.
[27]
CITA. https://www.citahub.com/#/.
[28]
OpenZeppelin. https://openzeppelin.com.

Cited By

View all
  • (2024)Blockchain integration in public sector: A comprehensive review of economic and legal challengesEkonomika preduzeca10.5937/EKOPRE2406305R72:5-6(305-321)Online publication date: 2024
  • (2024)Information technology security assessment (ITSA) methodology for web-based E-governmentPROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON ENGINEERING, TECHNOLOGY, AND INDUSTRIAL APPLICATIONS 2021 (8th ICETIA 2021): Engineering, Environment, and Health: Exploring the Opportunities for the Future10.1063/5.0179775(070002)Online publication date: 2024
  • (2023)Data Rights Confirmation Scheme Based on Auditable Ciphertext CP-ABE in the Cloud Storage EnvironmentApplied Sciences10.3390/app1307435513:7(4355)Online publication date: 29-Mar-2023
  • Show More Cited By

Index Terms

  1. BlockChain/ABE-based Fusion Solution for E-government Data Sharing and Privacy protection

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      EITCE '20: Proceedings of the 2020 4th International Conference on Electronic Information Technology and Computer Engineering
      November 2020
      1202 pages
      ISBN:9781450387811
      DOI:10.1145/3443467
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 01 February 2021

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Blockchain
      2. CP-ABE
      3. IPFS
      4. data sharing
      5. e-government

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      EITCE 2020

      Acceptance Rates

      EITCE '20 Paper Acceptance Rate 214 of 441 submissions, 49%;
      Overall Acceptance Rate 508 of 972 submissions, 52%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)40
      • Downloads (Last 6 weeks)9
      Reflects downloads up to 10 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Blockchain integration in public sector: A comprehensive review of economic and legal challengesEkonomika preduzeca10.5937/EKOPRE2406305R72:5-6(305-321)Online publication date: 2024
      • (2024)Information technology security assessment (ITSA) methodology for web-based E-governmentPROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON ENGINEERING, TECHNOLOGY, AND INDUSTRIAL APPLICATIONS 2021 (8th ICETIA 2021): Engineering, Environment, and Health: Exploring the Opportunities for the Future10.1063/5.0179775(070002)Online publication date: 2024
      • (2023)Data Rights Confirmation Scheme Based on Auditable Ciphertext CP-ABE in the Cloud Storage EnvironmentApplied Sciences10.3390/app1307435513:7(4355)Online publication date: 29-Mar-2023
      • (2023)Study and Analysis of various Privacy Preserved Data Sharing Framework in E-Government System based on Consortium Blockchain: A Challenging Overview2023 2nd International Conference on Automation, Computing and Renewable Systems (ICACRS)10.1109/ICACRS58579.2023.10404516(1812-1818)Online publication date: 11-Dec-2023
      • (2023)A Systematic Literature Mapping on Using Blockchain Technology in Identity ManagementIEEE Access10.1109/ACCESS.2023.325651911(26004-26032)Online publication date: 2023
      • (2023)Will Data Sharing Scheme Based on Blockchain and Weighted Attribute-Based EncryptionWeb Information Systems and Applications10.1007/978-981-99-6222-8_33(391-402)Online publication date: 15-Sep-2023
      • (2022)The Secure Data Sharing and Interchange Model Based on Blockchain for Single Window in Trade Facilitation2022 International Conference on Blockchain Technology and Information Security (ICBCTIS)10.1109/ICBCTIS55569.2022.00041(138-146)Online publication date: Jul-2022
      • (2021)A Scheme for Electronic Evidence Sharing Based on Blockchain and Proxy Re-encryptionProceedings of the 2021 4th International Conference on Blockchain Technology and Applications10.1145/3510487.3510490(11-16)Online publication date: 17-Dec-2021

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media