A framework of blockchain-based secure and privacy-preserving E-government system
- 140 Downloads
Electronic government (e-government) uses information and communication technologies to deliver public services to individuals and organisations effectively, efficiently and transparently. E-government is one of the most complex systems which needs to be distributed, secured and privacy-preserved, and the failure of these can be very costly both economically and socially. Most of the existing e-government systems such as websites and electronic identity management systems (eIDs) are centralized at duplicated servers and databases. A centralized management and validation system may suffer from a single point of failure and make the system a target to cyber attacks such as malware, denial of service attacks (DoS), and distributed denial of service attacks (DDoS). The blockchain technology enables the implementation of highly secure and privacy-preserving decentralized systems where transactions are not under the control of any third party organizations. Using the blockchain technology, exiting data and new data are stored in a sealed compartment of blocks (i.e., ledger) distributed across the network in a verifiable and immutable way. Information security and privacy are enhanced by the blockchain technology in which data are encrypted and distributed across the entire network. This paper proposes a framework of a decentralized e-government peer-to-peer (p2p) system using the blockchain technology, which can ensure both information security and privacy while simultaneously increasing the trust of the public sectors. In addition, a prototype of the proposed system is presented, with the support of a theoretical and qualitative analysis of the security and privacy implications of such system.
KeywordsE-government systems Blockchain technology Cybersecurity Privacy Decentralized systems
The wide availability of internet has motivated different countries around the world to exploit technologies as a means of communication and services exchange between citizens and other affiliates. E-government users enjoy the online services without leaving their comfortable homes, evading long queues in public offices whilst saving time and transportation costs, and at the same time the service providers can deliver services more effectively and efficiently. Generally speaking, government networks can communicate to each other better than business networks, because most of them are connected for transferring information to the public without competition. In the future, the number of devices using e-government services will increase dramatically due to the fast evolution of smart homes, internet of things (IOT), smart cities, and other interconnected networks [1, 2]. According to the United Nation e-government survey, 2014 , almost every government around the world is currently providing its citizens and other stakeholders e-services via websites and mobile applications.
E-government systems collect, store and process a significant amount of confidential information about citizens, employees, customers, products, researches, financial status amongst others, using electronic computers. The compromise of such information usually leads to the loss of users’ trust and confidence, opportunities, and financial advantages, etc . It has been found that more than 80% of e-government web sites around the globe were vulnerable to cross-site scripting (XSS) and structured query (SQL) injection due to the lack of proper authentication mechanism applied to input data from users . Recently, many nations around the world have experienced a great threat from denial of service attacks (DoS) and malware targeting their networks . For instance, the U.S. government suffered one of the largest e-government attacks in 2015, causing the leak of over 4 million government employees’ confidential information, including security clearance information, social security numbers, identities and passwords . According to the report in , in 2016, the Tanzania government was hit by cyber-terrorists, technology spies, hackers and digital fraudsters leading a loss around 85 millions US dollars. In addition, more than 1500 user accounts in Singapore were hacked in the government platform in 2014, where hackers gained access to creating new businesses and apply for work permits .
It is therefore of significant importance to ensure the security, privacy, confidentiality, integrity and availability of e-government systems. The existing e-government systems, such as e-government websites and eIDs management systems [9, 10], are centralized where one or duplicated central servers and databases store and provide information to users. The centralized management and validation system is likely to suffer from a single point of failure and makes the system a target to cyber attacks such as DDoS, DoS and malware. Any e-government system will remain vulnerable to privacy and security breaches if better security technology and countermeasures are not developed and available to combat these threats in the future.
The blockchain technology has appeared to be one good solution to provide a secure decentralized environment for information exchange [11, 12]. Although it was originally introduced for exchanging digital currency as its underlying technology, it has found security and privacy applications in many other areas, such as Internet of Things (IoTs) , smart home , smart city , educational systems , and healthcare . While governments around the world have not fully adopted the blockchain technology in the public sectors, many countries have initiated blockchain projects to explore the potential of blockchain technology in offering public services to individuals . Each of these projects usually focuses on a particular service, for example e-residency, e-health, land registry etc; they are still in their early stages and no common framework has been proposed for blockchain technology integration within the e-government systems . In addtion, each of these countries is developing their own blockchain framework. Different blockchain systems from different countries lead to difficulties to communicate out of their network for international information exchange.
This paper presents a framework and prototype of blockchain-based secure and privacy-preserving e-government system, which can be adopted by any government for the purpose of ensuring both security and privacy while simultaneously increasing trust in the public sector. The system is made of a peer to peer network of e-government devices (nodes) and user’s devices. Briefly, any new e-government device or individual device joining the system will be reviewed by the existing peers of the network and one of the peer is elected to set up a network node and blockchain address of a new device. When a new user attempts to register with the system through a device or one of the government departments, the user is assigned with a user ID and a blockchain wallet for collecting and storing his/her transaction. By doing so, e-government users can submit and access their records from anywhere and everywhere, using their IDs and blockchain addresses. This paper has also analysed and evaluated the security and privacy implications of the proposed system in public sectors using theoretical and qualitative analysis.
The reminder of the paper is structured as follows. Section 2 briefs the background technologies on the blockchain and e-government systems. Section 3 introduces the proposed e-government framework and prototype. Section 4 discusses the security and privacy implications of the proposed system, and Sect. 5 concludes the paper and outlines the future research directions.
The background technologies on the blockchain and e-government systems are reviewed in this section.
2.1 Blockchain technology
As shown in Fig. 1, a block is composed of a header containing the meta data, and a long list of transactions performed in that block. The block header typically contains the timestamp, nonce, version and proof of difficulty. The timestamp indicates the time that the block was created; the nonce is a random number generated by the consensus algorithm to compute the hash value of a block; the version indicates the version number of the blockchain; and the proof of difficulty is a generated hash value which must be less than the current target hash value.
Nodes in the blockchain network run a consensus algorithm to validate transactions. There are several consensus algorithms (protocols) available for the blockchain technology, such as proof of work (PoW), proof of stake (PoS), delegated proof of stake (DPoS), and proof of difficulty (PoD) [18, 19]. For instance, Bitcoin employs the PoW while Ethereum and Bitshare implement PoS and DPoS, respectively . In PoW, miner nodes which want to add (mine) a new block to the blockchain network must first solve a difficult mathematical puzzle which requires great computational power. The miner who solves the puzzle adds a new block and gets rewards in bitcoins .
Unlike the PoW, with the PoS, a node which creates a new block is chosen deterministically depending on its stake (wealth) . PoS saves energy that is required in PoW to solve the mathematical puzzle, and only the wealth of a node (validator) is required to validate the new transactions and blocks. The DPoS attempts to solve the consensus problem using delegates . DPoS uses a real time voting and reputation system to create a panel of limited trusted delegates who will witness and validate the blocks. The witnesses have the rights to create blocks and add them to the blockchain network, in addition to prohibit malicious nodes from participating in adding blocks. Principally, in PoS and DPoS, stakeholders of the network shares are not expected to deliberately make bad decisions for the network.
Blockchain network can be permissioned or permissionless . A permissionless network or public blockchain allows any user to create a personal address, join the network, and participate in consensus, whilst a permissioned or private network only allows a number of restricted nodes to join.
2.2 E-government systems
E-government services can typically be categorized into 3 groups: government to government (G2G), government to citizen (G2C), and government to business (G2B) . G2G offers an online interaction between government departments, authorities, organisations and other governments to disseminate information among themselves using the internet. G2C and G2B allow citizens and businesses to interact with the government to get online services such as filing property tax, filing income tax, extending/renewal of visa, passport and licenses, online voting, e-procurement application, etc.
Every e-government department ensures that only authorized users can get access to individual’s confidential information. In additional to security and privacy, another important factor to consider during e-government implementation is to build a trustable system that users can rely on . Security and privacy assurance in e-government systems plays a critical role in increasing trustness between different departments within the government as it guarantees confidentiality, integrity, and privileged access of sensitive information. Typical attacks that e-government system faces include packet sniffers, probes, malware, DDoS, phishing etc [23, 24]. Due to cyber warfare, there are other new motivations for attacks such as political differences, extortion, cyber terrorism, and even contests for the supremacy which can occur within a nation or between different nations .
Different non-technical e-government security maturity models have been proposed for guiding and benchmarking the security implementation of the e-government system. For instance, a comprehensive e-government information security maturity model for guiding the inclusion of security in e-government systems was reported in the work of . This model focuses only on the organisation’s security mechanisms setting, security evaluation, security policy setting and information security awareness to users, but it lacks guidance for built-in security that can ensure e-service security and privacy.
Commonly, the security and privacy of e-government systems are provided using firewalls, intrusion detections systems (IDSs), public key infrastructure (PKI) and anti-virus mechanisms . Various artificial intelligence techniques have been employed in the implementation of IDSs that can also be used by e-government systems [25, 26, 27, 28, 29, 30]. In addition to these common solutions, one hardware solution to e-government security issues is the use of eID system  for identification, authentication, confidentiality and integrity of users’ information. An eID system uses a smart card which includes a chip to store cardholder’s personal data including date of birth, civil status, parenthood, current and past addresses, etc, in additional to certificate for authentication and digital signature . An eID system provides a means for distinguishing between different citizens and businesses uniquely in order to access electronic services. eID cards are offered by migration boards and national identity register in most countries. The same eID can be used in multiple sectors (e.g. taxation, social security, education, telephony services, banking services) while fulfilling different roles (e.g. a civil servant or a businessman) depending on the context. The existing eID management systems are not interoperable and lacks security as a result of having single centralized system for keeping records .
Another technical solution for security and privacy issues in e-government is an authentication framework proposed in . This framework utilises different registration and authentication procedures based on a single central citizen portal interfaced with ministerial departments. The framework consists of two parts namely Identity Provider (IdP) and the Service Provider (SP). Users have to register with IdP at a central portal of an e-government system to obtain unique identities that will be used to access services from the service providers. Whenever a user wants to access a service, SP must authenticate his/her identity with the IdP at the central portal to obtain a Single Sign On (SSO) password that can be used to access different SPs.
3 Blockchain-based E-government system
The joining of any new e-government (G) node or user node (C or B) to the blockchain network is reviewed by peers in the network, and e-government tokens are assigned for setting up its network node, leading to a permissioned (private) blockchain. The number of e-government tokens is equivalent to the total number of records stored by a node in the blockchain network. Each user has a dedicated e-government blockchain wallet to collect his/her tokens. Once a record is submitted, the record will be transferred in terms of stake to his/her blockchain address. Using a DPoS protocol, any node will be able to register with the network as a delegate as described in Sect. 3.2. In order to add a new block to the blockchain, the departments that jointly make up the e-government system vote for a delegate who will validate the transactions and seal the block. This approach is appropriate for security requirement, since random nodes cannot join the network, generate new tokens and set up a network node unless the rest e-government nodes approve it. The permissioned blockchain system ensures that the stored records are trustworthy, auditable and transparent.
3.1 Network nodes
There are two types of nodes in blockchain terminology, which are full nodes and lightweight nodes . A full node downloads a full copy of the blockchain when it joins the blockchain network, which allows it to fully validate transactions and blocks. A lightweight node does not download a complete copy of the blockchain when it joins the network, but it downloads only the block headers to validate the authenticity of transactions. To be able to transfer their transactions to the network and receive notifications when transactions affect their blockchain wallets, lightweight nodes usually refer to a copy of a trusted full node of the blockchain.
In the proposed system, e-government department nodes serve as full nodes while user’s devices (C and B) serve as lightweight nodes, although any business node is allowed to download a complete copy of the blockchain. The p2p network connectivity in the proposed network can be provided by using wireless broadband, thanks to the fact that many countries across the world are trying to incorporate a city-wide wireless broadband network across the city using the Wi-Fi technology .
3.2 Delegates and witnesses voting
Peers need to agree on a state of the block’s transactions and the process of sealing the blocks into the blockchain, in order for the network to remain functional. The DPoS is adopted here as the consensus algorithm due to its computational efficiency in adding transactions and sealing a block . Briefly, the DPoS can be viewed as a representative democracy where the e-government nodes utilize their stake (records) in order to elect delegates (other nodes) to join the network. Delegates are responsible for securing the network and voting for witnesses among them who will validate transactions and seal the blocks.
To elect the witnesses, votes are weighed according to the size of the tokens of each delegate or voting node. A delegate does not need to have a large token to get selected as a witness, but votes from delegates with large tokens can result in delegates with relatively small tokens being elected as witnesses. E-government nodes will store its individual’s records, allowing them to have higher tokens to participate and vote for witnesses which increases the security of the proposed system. In DPoS, nodes are allowed to delegate their voting power to other nodes, whom they trust to vote for witnesses on their behalf. Any delegate which appears to misbehave will be removed from the set of participating delegates and its votes is assigned to a new node joining the network or any existing node in order to ensure security and trust within the network.
The choice of the underlying blockchain technology for the prototype implementation mainly relies on the availability and efficiency of the DPoS implementation. In the meantime, the computational energy required for validating transactions must be affordable while the security of the established network must be guaranteed. For instance, Ethereum platform implements DPoS and smart contract protocol to simulate real contracts such as tax and insurance contracts, employment contracts, and land registry . It provides an important alternative in e-government to store citizens’ sensitive records, due to its ability to facilitate contract negotiation, simplify contract terms, implement contract execution, and verify contract fulfillment state.
3.3 New node creation
The process of registering a new node to the proposed e-government network is summarised in “Algorithm 1”. Any e-government department can join the blockchain network by setting up a full network node while other users can only set up lightweight nodes. Once a new node join the network, a functional node will generate its blockchain wallet and address containing public and private keys as shown in lines 7 and 8 in “Algorithm 1”. The private key is used by each node to sign and validate transactions therefore it must be kept safely (line 9). After generating the address, a node will contact delegates in the blockchain network to send its registration request, and one of the delegates will verify its registration and transfer some e-government tokens (registration record) in its blockchain address.
Thereafter, a new node is added to the network, and its registration is broadcasted to the network peers by the assigned delegate (line 12–14), allowing other network peers to receive its wallet information for sending transactions in the next cycle. Additionally, a new node receives instructions for a network node setup so that it can be elected as a delegate to validate transactions in the next cycle. Subsequently, the new node sets up the network node according to the instruction provided. In particular, the instruction consists of the size of initial token, the blockchain address of a node, and the public and private keys for signing and validating transactions before adding a block.
3.4 User registration
When a user submits a record to a delegate, the transaction is authenticated and initialized. From this, the block is updated to a new version which is broadcasted across the network for validation and then transferred to his/her blockchain address in all network peers. The transferred record is stored in the blockchain address of the user with the following data content: (1) the ID of the user, (2) the record value such as property registration, and (3) the record identification such as tax registration number. Each data instance in a blockchain represents an asset.
When a third party organization (e.g., business) requests to access a user’s information for any official issues, the user needs to provide his/her blockchain address for verification. The organisation can then use the blockchain web API to access the blockchain data stored in the user’s address. All e-government users are required to backup their private keys and keep them safe. If any user lost his/her private key, (s)he will be required to create a new blockchain address and request one of the e-government department node to transfer his/her information from the old blockchain address to a newly created blockchain address.
The user’s device and identity will be validated and authenticated, when a registered user wants to access the network. This helps to minimise human errors which have always been considered as a main contribution of failure and a weak link to access information stored in information systems . As a result, government information will flow securely and seemingly to the right individuals at the right time and right place. Typical human errors in cyber security include sending sensitive data to the wrong recipient and unintentionally exposing login credentials such as username and passwords. According to , human error remain as one of the main causes for cyber security breach in the public and private organisations.
3.5 New block generation
Security services and common measures
Blockchain address and digital signature
Digital Signature and encryption
Encryption and digital signature
Encryption and digital signature
Decentralized, encryption and digital signature
Comparison between RSA and ECC key lengths in bits
RSA key length
ECC key length
Approx. ratio (RSA:ECC)
4 Security and privacy analysis
Every e-government system must guarantee the confidentiality, integrity and availability of the services. Confidentiality is achieved when information is not disclosed to unauthorised users; integrity is achieved by protecting information from any form of modification, whilst availability means information is available when needed and is free from DoS or DDoS or other similar service disruption. This section provides a theoretical qualitative analysis on the security and privacy performance of the blockchain-based e-government system.
Features of blockchain-based e-government system
Reduced human errors
User devices and identities are authenticated in advance before gaining access to the network
Increased public trust
Individuals have direct control of their information and all network participants are authenticated
The system can easily scale up as it allows new devices and users to be added to the network automatically following the consensus mechanism
Data are stored in multiple servers/locations. The consensus protocol ensures that data can only be altered when all participants agree so
Single point of failures are avoided and the system hence resilient to malware, DoS and DDoS attacks
It is easy to trace back the history of all transactions since they remain unchanged in the network
All new transactions are validated by all participating peers in the network before being added to the blockchain
Individuals are responsible to authorise who will access their information
Improved access to information
Information is stored at multiple locations which enhances easy and speed access
Increased data quality
All transactions and records stored in the system are validated in advance making the stored information authentic with the required quality
All nodes in the network share the same copy of the blockchain and new transactions are added based on the consensus mechanism
Reduced operational costs
There is no third party organisation needed to process transactions
Improved efficiency and speed
Anyone in the network are able to access to all records subject to the accessibility privilege and new records are distributed to all participating nodes
The proposed system is a decentralized p2p system where the user’s data are stored in different nodes which guarantees the availability of the system by avoiding any single point of failure. Using DPoS, it is difficult for any adversary to launch DDoS or DoS attacks against the system as registration is required for a node to start sharing information with the rest of the network peers. Any transactions received from the network node are validated by the witnesses making it difficult for malicious nodes to initiate malicious connections.
The security services and corresponding common measures provided by the proposed framework is summarised in Table 1, which ensure adequate privacy and security of the transactions. For computational efficiency, user’s devices will run lightweight client to store the transactions rather than the complete copy of the blockchain which is expensive in terms of storage. E-government devices are expected to be computationally powerful with enough storage capacity to store and process user’s records efficiently. The network is able to offer the performances provided by the blockchain technology and DPoS consensus protocol such as scalability, speed, interoperability, and transparency, and it can handle a large number of transactions.
The elliptic curve cryptography (ECC) approach is adopted for implementing encryption and digital signature in the proposed framework, which is a common practice for most of the existing blockchain technologies such as Bitcoin and Ethereum. Note that the ECC and the RSA (Rivest-Shamir-Adleman) offers a similar level of security but ECC consumes far less number of bits . For instance, a 256-bit key in ECC offers the same level of security as that provided by the RSA using a 3072-bit key. Shorter key usually means low CPU consumption, low memory usage and fast key generation. These advantages are also beneficial to the proposed framework in facilitating fast creation of the transactions and sealing the blocks. A summary of key length study between the RSA and ECC is provided in Table 2 . 256-bit ECC keys are widely in blockchain technology as they can provide the required level of security for the majority of applications.
Apart from security and privacy preserving, the blockchain-based e-government system also provides a number of other benefits as summarised in Table 3. These features make blockchain technology as a perspective trend in the implementation of an e-government system, which is able to provide a convenient, safe and fault tolerant communication channel between the public sectors and citizens. The indirect benefits brought by the blockchain technologies, such as bureaucracy reduction, paper usage exclusion, transaction costs reduction, and corruption control, can change the governace ecosystem with higher degree of trust from citizens.
5 Conclusion and future work
This paper proposed an e-government framework that can enforce security and privacy in the public sectors by employing the blockchain technology. The theoretical and qualitative analysis on security and privacy of the framework shows that, cryptography, immutability and the decentralized management and control offered by the blockchain technology can provide the required security and privacy in e-government systems. The proposed system also has the potential of solving the interoperability issues between governance departments which is one of the limitations of existing e-government systems. As this work is limited at the framework and theoretical discussion level, the active future work is to implement such framework and then further explore its full potential in a real-world environment. Note that, the blockchain technology such as Ethereum is still at its early stages of development and therefore another piece of future work would be the application of the appropriate version of blockchain technology in public sectors to meet and increase the security and privacy of individual’s data.
This work has been supported by the Commonwealth Scholarship Commission (CSC-TZCS-2017-717) and University of Northumbria at Newcastle, UK.
- 1.Biswas, K., & Muthukkumarasamy, V. (2016). Securing smart cities using blockchain technology. In 2016 IEEE 18th international conference on high performance computing and communications; IEEE 14th international conference on smart city; IEEE 2nd international conference on data science and systems (HPCC/SmartCity/DSS) (pp. 1392–1393). IEEE.Google Scholar
- 2.Yang, L., Elisa, N., & Eliot, N. (2018). Privacy and security aspects of E-government in smart cities. New York: Elsevier Press.Google Scholar
- 3.UN. (2016). E-Government survey 2014. E-Government in support of sustainable development/UN Department of Economic and Social Affairs.Google Scholar
- 6.Pau, L.-F. (2010). Business and social evaluation of denial of service attacks of communications networks in view of scaling economic counter-measures. In 2010 IEEE/IFIP network operations and management symposium workshops (NOMS Wksps) (pp. 126–133). IEEE.Google Scholar
- 7.Cryptomathic. (2015). A key component for e-government security. https://www.cryptomathic.com/news-events/blog/key-for-egovernment-security-central-signing-authentication/. Accessed 22 May 2018.
- 8.IPPMEDIA. (2016). How Tanzania lost Tanzanian shillings 187billions to cyber criminals in 2016. https://www.ippmedia.com/en/business/how-tanzania-lost-187bn-cyber-criminals-2016/. Accessed 22 May 2018.
- 10.Ali, O., Soar, J., & Yong, J. (2014). Impact of cloud computing technology on e-government. In International conference on information and software technologies (pp. 272–290). Springer.Google Scholar
- 11.Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. https://www.bitcoin.org/bitcoin.pdf
- 12.Mukhopadhyay, U., Skjellum, A., Hambolu, O., Oakley, J., Yu, L., & Brooks, R. (2016). A brief survey of cryptocurrency systems. In 2016 14th annual conference on privacy, security and trust (PST) (pp. 745–752). IEEE.Google Scholar
- 13.Huh, S., Cho, S., & Kim, S. (2017). Managing iot devices using blockchain platform. In 2017 19th international conference on advanced communication technology (ICACT) (pp. 464–467). IEEE.Google Scholar
- 14.Dorri, A., Kanhere, S. S., Jurdak, R., & Gauravaram, P. (2017). Blockchain for iot security and privacy: The case study of a smart home. In 2017 IEEE international conference on pervasive computing and communications workshops (PerCom workshops) (pp. 618–623). IEEE.Google Scholar
- 16.Peterson, K., Deeduvanu, R., Kanjamala, P., & Boles, K. (2016). A blockchain-based approach to health information exchange networks. In Proceedings of NIST workshop blockchain healthcare (Vol. 1, pp. 1–10).Google Scholar
- 18.Antonopoulos, A. M. (2014). Mastering bitcoin: Unlocking digital cryptocurrencies. Newton: O’Reilly Media, Inc.Google Scholar
- 19.Zheng, Z., Xie, S., Dai, H., Chen, X., & Wang, H. (2017). An overview of blockchain technology: Architecture, consensus, and future trends. In 2017 IEEE international congress on big data (BigData congress) (pp. 557–564). IEEE.Google Scholar
- 20.Swan, M. (2015). Blockchain: Blueprint for a new economy. Newton: O’Reilly Media, Inc.Google Scholar
- 21.Karokola, G. R. (2012). A framework for securing e-government services: The case of tanzania. Ph.D. thesis, Department of Computer and Systems Sciences, Stockholm University.Google Scholar
- 22.Alshehri, M., & Drew, S. (2010). E-government fundamentals. In IADIS international conference ICT, society and human beings. Google Scholar
- 23.Singh, S., & Karaulia, D. S. (2011). E-governance: Information security issues. In Proceedings of the international conference on computer science and information technology (pp. 120–124).Google Scholar
- 25.Yang, L., Li, J., Fehringer, G., Barraclough, P., Sexton, G., & Cao, Y. (2017). Intrusion detection system by fuzzy interpolation. In 2017 IEEE international conference on fuzzy systems (FUZZ-IEEE) (pp. 1–6). IEEE.Google Scholar
- 26.Elisa, N., Li, J., Zuo, Z., & Yang, L. (2018). Dendritic cell algorithm with fuzzy inference system for input signal generation. In UK workshop on computational intelligence (pp. 203–214). Springer.Google Scholar
- 27.Elisa, N., Yang, L., Naik, N. (2018). Dendritic cell algorithm with optimised parameters using genetic algorithm. In IEEE world congress on computational intelligence (pp. 1–8). IEEE.Google Scholar
- 28.Zuo, Z., Li, J., Yang, L., Anderson, P., & Naik, N. (2018). Grooming detection using fuzzy-rough feature selection and text classification. In IEEE world congress on computational intelligence (pp. 1–8). IEEE.Google Scholar
- 29.Elisa, N., Yang, L., Qu, Y., & Chao, F. (2018). A revised dendritic cell algorithm using k-means clustering. In IEEE international conference on data science and systems (pp. 1–8).Google Scholar
- 31.Stefanova, K., Kabakchieva, D., & Borthwick, L. (2006). Innovative approach to identity management solution development for e-government at eu level. Journal of Telecommunications and Information Technology, 2, 24–31.Google Scholar
- 33.Drogkaris, P., Geneiatakis, D., Gritzalis, S., Lambrinoudakis, C., & Mitrou, L. (2008). Towards an enhanced authentication framework for e-goverment services: The Greek case. In The 7th International Conference on Electronic Government, Torino, Italy (pp. 189–196).Google Scholar
- 34.Wballiance. (2016). Wireless broadband alliance launches city Wi-Fi roaming project. https://www.wballiance.com/wireless-broadband-alliance-launches-city-wi-fi-roaming-project///. Accessed 08 Jun 2018.
- 35.Vujicic, D., Jagodic, D., Randjic, S. (2018). Blockchain technology, bitcoin, and ethereum: A brief overview. In 2018 17th international symposium INFOTEH-JAHORINA (INFOTEH) (pp. 1–6). IEEE.Google Scholar
- 38.SEC S. (2000). 2: Recommended elliptic curve domain parameters. Mississauga: Standards for efficient cryptography group, Certicom Corp.Google Scholar
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.