Blockchain Based Chameleon Hashing Technique for Privacy Preservation in E-Governance System

被引:15
作者
Ranjith Kumar, M. V. [1 ]
Bhalaji, N. [2 ]
机构
[1] Anna Univ, Chennai, Tamil Nadu, India
[2] SSN Coll Engn, Chennai, Tamil Nadu, India
关键词
E-governance; BlockChain networks; Cyber security; Authenticity; Regionalized organizations; IDENTITY MANAGEMENT;
D O I
10.1007/s11277-020-07907-w
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
For efficient delivery of public services to various entities and institutions in an effective and transparent manner, Information and Communication technologies has been increasingly used by Electronic government. Being one of the most sophisticated schemes that demands diversification, safeguarding and security, and any form of fiasco may turn out to be extremely expensive both prudently and collectively. The head supervision system might be subjected to failure, making it prone to cyber-attacks like distributed denial of service attacks, spywares, malwares and denial of service attacks. It enforces working and administration of extremely safe as well as authentic regionalized organizations where negotiations are not under the jurisdiction of any third party institutions. This technology enables storage of actual and contemporary data in a fixed cubicle of blocks scattered across the network in a unique manner. Data Authentication and Confidentiality are augmented by the manner in which data is encrypted and uniformly scattered throughout the unified network. Our proposal deals with the introduction of a unique scheme of a specially regionalized peer-to-peer framework with the aid of this technology, that has the ability to assure data authentication as well as confidentiality while also raises the faith of the public sectors. Apart from this, a model of the proposed structure is given, using an analytical and subjective investigation of the safety, authenticity coupled with confidentiality ramifications of such framework.
引用
收藏
页码:987 / 1006
页数:20
相关论文
共 43 条
[1]  
Ali O, 2014, COMM COM INF SC, V465, P272
[2]  
[Anonymous], 2008, PEER PEER ELECT CASH
[3]  
[Anonymous], 2010, IADIS INT C ICT SOC
[4]  
Antonopoulos A.M., 2014, MASTERING BITCOIN UN
[5]  
Biswas K, 2016, PROCEEDINGS OF 2016 IEEE 18TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS
[6]  
IEEE 14TH INTERNATIONAL CONFERENCE ON SMART CITY
[7]  
IEEE 2ND INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS), P1392, DOI [10.1109/HPCC-SmartCity-DSS.2016.178, 10.1109/HPCC-SmartCity-DSS.2016.0198]
[8]  
Cryptomathic, 2015, KEY COMP E GOV SEC
[9]  
Dorri Ali, 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), P618, DOI 10.1109/PERCOMW.2017.7917634
[10]  
Drogkaris P., 2008, 7 INT C ELECT GOVT, P189