Weitere Artikel dieser Ausgabe durch Wischen aufrufen
Electronic government (e-government) uses information and communication technologies to deliver public services to individuals and organisations effectively, efficiently and transparently. E-government is one of the most complex systems which needs to be distributed, secured and privacy-preserved, and the failure of these can be very costly both economically and socially. Most of the existing e-government systems such as websites and electronic identity management systems (eIDs) are centralized at duplicated servers and databases. A centralized management and validation system may suffer from a single point of failure and make the system a target to cyber attacks such as malware, denial of service attacks (DoS), and distributed denial of service attacks (DDoS). The blockchain technology enables the implementation of highly secure and privacy-preserving decentralized systems where transactions are not under the control of any third party organizations. Using the blockchain technology, exiting data and new data are stored in a sealed compartment of blocks (i.e., ledger) distributed across the network in a verifiable and immutable way. Information security and privacy are enhanced by the blockchain technology in which data are encrypted and distributed across the entire network. This paper proposes a framework of a decentralized e-government peer-to-peer (p2p) system using the blockchain technology, which can ensure both information security and privacy while simultaneously increasing the trust of the public sectors. In addition, a prototype of the proposed system is presented, with the support of a theoretical and qualitative analysis of the security and privacy implications of such system.
Biswas, K., & Muthukkumarasamy, V. (2016). Securing smart cities using blockchain technology. In 2016 IEEE 18th international conference on high performance computing and communications; IEEE 14th international conference on smart city; IEEE 2nd international conference on data science and systems (HPCC/SmartCity/DSS) (pp. 1392–1393). IEEE.
Yang, L., Elisa, N., & Eliot, N. (2018). Privacy and security aspects of E-government in smart cities. New York: Elsevier Press.
UN. (2016). E-Government survey 2014. E-Government in support of sustainable development/UN Department of Economic and Social Affairs.
Lambrinoudakis, C., Gritzalis, S., Dridi, F., & Pernul, G. (2003). Security requirements for e-government services: a methodological approach for developing a common pki-based security policy. Computer Communications, 26(16), 1873–1883. CrossRef
Moen, V., Klingsheim, A. N., Simonsen, K. I. F., & Hole, K. J. (2007). Vulnerabilities in e-governments. International Journal of Electronic Security and Digital Forensics, 1(1), 89–100. CrossRef
Pau, L.-F. (2010). Business and social evaluation of denial of service attacks of communications networks in view of scaling economic counter-measures. In 2010 IEEE/IFIP network operations and management symposium workshops (NOMS Wksps) (pp. 126–133). IEEE.
Cryptomathic. (2015). A key component for e-government security. https://www.cryptomathic.com/news-events/blog/key-for-egovernment-security-central-signing-authentication/. Accessed 22 May 2018.
IPPMEDIA. (2016). How Tanzania lost Tanzanian shillings 187billions to cyber criminals in 2016. https://www.ippmedia.com/en/business/how-tanzania-lost-187bn-cyber-criminals-2016/. Accessed 22 May 2018.
Seltsikas, P., & O’keefe, R. M. (2010). Expectations and outcomes in electronic identity management: The role of trust and public value. European Journal of Information Systems, 19(1), 93–103. CrossRef
Ali, O., Soar, J., & Yong, J. (2014). Impact of cloud computing technology on e-government. In International conference on information and software technologies (pp. 272–290). Springer.
Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. https://www.bitcoin.org/bitcoin.pdf
Mukhopadhyay, U., Skjellum, A., Hambolu, O., Oakley, J., Yu, L., & Brooks, R. (2016). A brief survey of cryptocurrency systems. In 2016 14th annual conference on privacy, security and trust (PST) (pp. 745–752). IEEE.
Huh, S., Cho, S., & Kim, S. (2017). Managing iot devices using blockchain platform. In 2017 19th international conference on advanced communication technology (ICACT) (pp. 464–467). IEEE.
Dorri, A., Kanhere, S. S., Jurdak, R., & Gauravaram, P. (2017). Blockchain for iot security and privacy: The case study of a smart home. In 2017 IEEE international conference on pervasive computing and communications workshops (PerCom workshops) (pp. 618–623). IEEE.
Turkanović, M., Hölbl, M., Košič, K., Heričko, M., & Kamišalić, A. (2018). Eductx: A blockchain-based higher education credit platform. IEEE Access, 6, 5112–5127. CrossRef
Peterson, K., Deeduvanu, R., Kanjamala, P., & Boles, K. (2016). A blockchain-based approach to health information exchange networks. In Proceedings of NIST workshop blockchain healthcare (Vol. 1, pp. 1–10).
Jun, M. (2018). Blockchain government-a next form of infrastructure for the twenty-first century. Journal of Open Innovation: Technology, Market, and Complexity, 4(1), 7. CrossRef
Antonopoulos, A. M. (2014). Mastering bitcoin: Unlocking digital cryptocurrencies. Newton: O’Reilly Media, Inc.
Zheng, Z., Xie, S., Dai, H., Chen, X., & Wang, H. (2017). An overview of blockchain technology: Architecture, consensus, and future trends. In 2017 IEEE international congress on big data (BigData congress) (pp. 557–564). IEEE.
Swan, M. (2015). Blockchain: Blueprint for a new economy. Newton: O’Reilly Media, Inc.
Karokola, G. R. (2012). A framework for securing e-government services: The case of tanzania. Ph.D. thesis, Department of Computer and Systems Sciences, Stockholm University.
Alshehri, M., & Drew, S. (2010). E-government fundamentals. In IADIS international conference ICT, society and human beings.
Singh, S., & Karaulia, D. S. (2011). E-governance: Information security issues. In Proceedings of the international conference on computer science and information technology (pp. 120–124).
Noe, E. (2017). Usability, accessibility and web security assessment of e-government websites in tanzania. International Journal of Computer Applications, 164(5), 42–48. CrossRef
Yang, L., Li, J., Fehringer, G., Barraclough, P., Sexton, G., & Cao, Y. (2017). Intrusion detection system by fuzzy interpolation. In 2017 IEEE international conference on fuzzy systems (FUZZ-IEEE) (pp. 1–6). IEEE.
Elisa, N., Li, J., Zuo, Z., & Yang, L. (2018). Dendritic cell algorithm with fuzzy inference system for input signal generation. In UK workshop on computational intelligence (pp. 203–214). Springer.
Elisa, N., Yang, L., Naik, N. (2018). Dendritic cell algorithm with optimised parameters using genetic algorithm. In IEEE world congress on computational intelligence (pp. 1–8). IEEE.
Zuo, Z., Li, J., Yang, L., Anderson, P., & Naik, N. (2018). Grooming detection using fuzzy-rough feature selection and text classification. In IEEE world congress on computational intelligence (pp. 1–8). IEEE.
Elisa, N., Yang, L., Qu, Y., & Chao, F. (2018). A revised dendritic cell algorithm using k-means clustering. In IEEE international conference on data science and systems (pp. 1–8).
Li, J., Yang, L., Qu, Y., & Sexton, G. (2018). An extended Takagi–Sugeno–Kang inference system (tsk+) with fuzzy interpolation and its rule base generation. Soft Computing, 22(10), 3155–3170. CrossRef
Stefanova, K., Kabakchieva, D., & Borthwick, L. (2006). Innovative approach to identity management solution development for e-government at eu level. Journal of Telecommunications and Information Technology, 2, 24–31.
Fioravanti, F., & Nardelli, E. (2008). Identity management for e-government services. In H. Chen, L. Brandt, V. Gregg, R. Traunmueller, S. Dawes, E. Hovy, A. Macintosh, & C. A. Larson (Eds.), Digital government (pp. 331–352). Berlin: Springer. CrossRef
Drogkaris, P., Geneiatakis, D., Gritzalis, S., Lambrinoudakis, C., & Mitrou, L. (2008). Towards an enhanced authentication framework for e-goverment services: The Greek case. In The 7th International Conference on Electronic Government, Torino, Italy (pp. 189–196).
Wballiance. (2016). Wireless broadband alliance launches city Wi-Fi roaming project. https://www.wballiance.com/wireless-broadband-alliance-launches-city-wi-fi-roaming-project///. Accessed 08 Jun 2018.
Vujicic, D., Jagodic, D., Randjic, S. (2018). Blockchain technology, bitcoin, and ethereum: A brief overview. In 2018 17th international symposium INFOTEH-JAHORINA (INFOTEH) (pp. 1–6). IEEE.
Luiijf, E. (2012). Understanding cyber threats and vulnerabilities. In J. Lopez, R. Setola, & S. D. Wolthusen (Eds.), Critical infrastructure protection (pp. 52–67). Berlin: Springer. CrossRef
Evans, M., Maglaras, L. A., He, Y., & Janicke, H. (2016). Human behaviour as an aspect of cybersecurity assurance. Security and Communication Networks, 9(17), 4667–4679. CrossRef
SEC S. (2000). 2: Recommended elliptic curve domain parameters. Mississauga: Standards for efficient cryptography group, Certicom Corp.
- A framework of blockchain-based secure and privacy-preserving E-government system
- Springer US
The Journal of Mobile Communication, Computation and Information
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
Neuer Inhalt/© Filograph | Getty Images | iStock