Next Article in Journal
Liquid to Fused Deposition Modeling (L-FDM)—A Revolution in Application Chemicals to 3D Printing Technology—Mechanical and Functional Properties
Next Article in Special Issue
FedNow: An Efficiency-Aware Incentive Mechanism Enables Privacy Protection and Efficient Resource Utilization in Federated Edge Learning
Previous Article in Journal
GIS-Based Multi-Objective Routing Approach for Street-Based Sporting-Event Routing
Previous Article in Special Issue
A Node Differential Privacy-Based Method to Preserve Directed Graphs in Wireless Mobile Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

The Use of Blockchain Technology and OCR in E-Government for Document Management: Inbound Invoice Management as an Example

Department of Computer Science, Birzeit University, Birzeit 71939, Palestine
*
Author to whom correspondence should be addressed.
Appl. Sci. 2023, 13(14), 8463; https://doi.org/10.3390/app13148463
Submission received: 25 April 2023 / Revised: 6 July 2023 / Accepted: 11 July 2023 / Published: 21 July 2023
(This article belongs to the Special Issue Privacy-Preserving Methods and Applications in Big Data Sharing)

Abstract

:
The field of electronic government (e-government) is gaining prominence in contemporary society, as it has a significant influence on the wider populace within the context of a technologically advanced world. E-government makes use of information and communication technologies (ICTs) at various levels and domains within government agencies and the public sector. ICT reduces manual labour, potential fraud points, errors, and process lapses. The Internet’s quick accessibility and the widespread adoption of modern technologies and disciplines, such as big data, the Internet of Things, machine learning, and artificial intelligence, have accelerated the need for e-government. However, these developments raise a number of data reliability and precision concerns. The adoption of blockchain technology by researchers demonstrates its efficacy in addressing such issues. The present study proposes the SECHash system model, which integrates blockchain and Optical Character Recognition (OCR) technologies for the purpose of regulating the processing of incoming documents by governmental agencies. As a case study to assess the proposed system paradigm, the study uses a document containing incoming invoices. The proposal seeks to maintain the integrity of document data by prohibiting its modification after acceptance. Additionally, SECHash guarantees that accepted documents will not be destroyed or lost. The analysis demonstrates that using the SECHash model system will decrease fraudulent transactions by eradicating manual labour and storing documents on a blockchain network.

1. Introduction

E-government is a method of delivering government services through the use of information and communication technology (ICT) applications [1,2]. The concept of e-government refers to the development of information technology infrastructure within governmental institutions. Thus, facilitating immediate access to public data and enhancing public services [3]. Moreover, it offers various platforms and channels of communication for companies, agencies of government, as well as individuals, enabling their individual and collective interactions [4]. As a result, it is possible for individuals to acquire all notifications and documentation related to administrative procedures, with the exception of data that may have an impact on national security and confidential state matters. Therefore, there is a need for increased transparency and credibility in governmental transactions, as well as a greater assurance of safeguarding individual rights [2].
Furthermore, the implementation of e-government has been shown to efficiently reduce the expenditure of both time and financial resources in the assigned tasks, thereby contributing to the effective management of civil services and the promotion of economic growth [2]. In other words, labour and manual effort are the primary sources of gaps in the traditional government system, as any typo or misplacement of important paperwork can put the owner at risk [5]. Hence, in conventional systems, it is imperative to put pressure on employees to concentrate on all aspects of their work. As per the given context, performing manual labour demands greater exertion and a larger physical area for managing records on paper [5].
Moreover, conventional systems provide an ideal environment for fraudulent activities and the act of forging. They permit duplicate data entry; there is no assurance of the integrity of the documents and the written data [5]. The implementation of an electronic system instead of the conventional paper-based system is expected to result in a reduction in the workforce, leading to a decrease in both mistakes in typing and security risks, as well as operating expenses [2].
Although e-government offers numerous benefits, there are still administrative challenges, such as fraud and bribery, that impede its widespread acceptance as an acceptable platform. For example, it is feasible to enter incorrect information into the database for a fee, despite the fact that this data is completely transparent. The authors of [6] indicate that a significant proportion, ranging from 35 to 40%, of applications submitted in the government sector are considered fraudulent. If corruption in government is not eradicated, it will undermine the rule of law and democratic values of nations. It will also have a negative impact on the economy of nations, impede the country’s development, and provide individuals with inferior services [7]. Consequently, this will result in a decline of trust towards the governing authorities [8].
The objective of this study is to utilise blockchain technology in the realm of e-government, with the aim of capitalising on its efficacy [9]. It helps establish the groundwork for a new framework called SECHash (Scanning, Extraction, Confirmation, and Hashing of Documents). The process of validation involves the use of blockchain and optical character recognition (OCR) technologies to ascertain the genuineness of any incoming document. This procedure entails applying OCR to extract data from the submitted files and inserting the extracted data on the blockchain. The system stores all documents with cryptographic signatures and hashes. Therefore, it is impossible to transmit fake documents after the fact or use them after they have been stored. As a result, all data are unchangeable; once a document has been saved to the system, it cannot be deleted or altered.
Therefore, SECHash performs the following actions for the submitted document:
  • After confirmation, protect the document’s data from any modification.
  • After acceptance, protect the document data from damage or loss.
The structure of this paper is as follows: Section 2 discusses related blockchain technology work and its contributions. Section 3 discusses the construction of the SECHash proposal system model. The concept demonstration and evaluation of the proposed system model are presented in Section 4. The concluding remarks, along with suggestions for future research, are presented in Section 5.

2. Related Work

This study relies on the utilisation of blockchain technology to augment the level of data security within the realm of e-government. Blockchain is a distributed digital ledger containing segments of cryptographically signed transactions in blocks. After undergoing confirmation and a consensus decision, each block is cryptographically connected to the preceding block (making it tamper-proof). As new blocks are inserted, it becomes increasingly difficult to modify older blocks, producing tamper resistance. New blocks are replicated across multiple instances of the distributed ledger within the structure of the network, and any disagreements are settled automatically using predetermined rules [10,11].
In the past few years, a substantial body of literature has developed around the idea of blockchain; its popularity is primarily attributable to the following features:
  • Decentralisation: Transactions in systems that operate on separate or clustered servers are centralised and require the participation of a third party. The third party is entrusted with sending requests to the system’s server(s) and waiting for a response. If a single server goes offline, the entire system will fail, creating a single point of failure [12]. Additionally, in centralised systems, all authorities are dependent on a single entity’s decisions. Consequently, decisions will take longer. Using the peer-to-peer network, blockchain was able to resolve these issues. The e-government system is a prime example of a centralised system that must be improved to provide better and quicker services [13].
  • Immutability: The blockchain employs cryptographic hashes that cannot be reverse-engineered. In other terms, the blockchain’s transaction history is immutable, permanent, and unalterable [14]. Immutability is one of the primary benefits of blockchain features that could aid in the reduction in corruption in government.
  • Transparency: Blockchain transactions are public, traceable, and available to anybody with access [15].
Blockchain technology has been effectively applied in a variety of settings [16]. Many governments throughout the world are launching blockchain-based projects and have altered, proposed, or revised legislation to accommodate this new technology in various situations. According to IBM, 70% of healthcare professionals believe the application of blockchain will have the greatest impact on the industry. As a result of this technology, clinical trial management will improve, regulatory compliance will be ensured, and a decentralised platform for sharing electronic health records will be created (EHR) [17]. Furthermore, the application of blockchain in the agri-food supply chain can assure comprehensive food traceability, support market prices, protect the rights of employees, reduce the influence of supply chain intermediaries, and provide incentive systems to stimulate the growth of environmentally friendly initiatives [18,19]. Additionally, numerous academic studies on the use of blockchain technology in energy commerce [20,21], demand response programmes for microgrids [22,23], as well as peer-to-peer networks have been published [24,25]. Therefore, blockchain can facilitate the development of renewable energy sources [26]. Moreover, one of the most prominent applications of blockchain technology is protecting data privacy in various Internet of Things (IoT) domains, such as [27,28].
By achieving high levels of traceability, accountability, security, and high-quality services, governments employ such initiatives in an effort to earn the public’s trust [29]. For instance, the U.S. Department of Homeland Security has adopted a number of Ethereum blockchain solutions in conjunction with distributed storage systems for data to avoid corruption and offer safe digital identity management [30]. OpenDChain is a blockchain-based application example developed in Spain [30]. This application intends to publish the datasets on the municipal website, which is accessible to the public. The Canadian government also hosts its blockchain explorer on the Interplanetary File System (IPFS) network, which enables users to seek for contribution and grant data [30].
Presently, various extant research papers demonstrate the significance of implementing blockchain technology. Fallucchi et al. [30] introduced an Ethereum blockchain-based framework for IPFS-based decentralised applications. This framework is employed for verification of documents without a requirement for a third party or a centralised organisation, with the assurance of its ownership and immutability. The implementation of this framework enables the organisation to disseminate its documentation, including financial reports, on the network with a high degree of transparency and at a low cost. Lacity and Van Hoek [31] demonstrate Walmart Canada’s blockchain-based invoice processing solution. In this solution, the percentage of disputed invoices is reduced from 70 to 2%, and the processing duration is shortened from days and weeks to 24 h. As a consequence of this reduction, the cost goes down and the connection and communication are strengthened.
Rasool et al. [32] introduced DocsChain, an OCR and blockchain-based solution that enables the issuance and validation of degrees. OCR can capture the data on the degree and convert it to a machine-readable format. The documents were subjected to a hashing algorithm and the Proof of Existence (PoE) protocol was employed for the purpose of document retrieval [33]. Conversely, making use of physical documents may result in a compromise of their integrity. The authors of [34] proposed a solution for document verification that employs an integration of blockchain, optical character recognition (OCR), digital signatures, and two-dimensional (2D) bar-code technologies. The experiment yielded a remarkable 100 percent accuracy. In the second stage of the trial, all methodologies were combined. To accomplish this, fresh pages were generated, the verification text was included, and the barcode at the bottom of the documents was appended. The integration of these technology combinations, along with the implementation of a validation process, facilitates the identification of any alterations made to documents.
Das et al. [35] proposed a framework for securing Architecture, Engineering, and Construction (AEC) projects. The first part of this framework is a smart contract utilising blockchain technology for the document certification process. The second part is a blockchain-based protected ledger data paradigm for auditing and controlling irrevocable documents (altered records). The third component is a modified Merkle–Patrick Trie (MPT)-based document version history data structure. In addition, Nizamuddin et al. [36] presented a solution for the online publication of digital content such as books. This framework’s primary objective was to address the challenge of authorship and originality for online consumers. IPFS was used to store content, and blockchain smart contracts were used to monitor and manage content versions.
Alketbi et al. [37] proposed a novel blockchain paradigm that governments could use to develop a blockchain ecosystem for the provision of public services. The authors of this study have developed the blockchain model by conducting an inquiry into permissioned blockchain platforms and examining a use case for blockchain-enabled home rentals that has been implemented by the Dubai government. The outcomes of the suggested blockchain framework encompass a blockchain governance framework, a delineation of participants and their corresponding duties, and a network architectural template that specifies the diverse installation alternatives and their component elements. Additionally, the authors analyse the security and performance of the model, along with its lifecycle and blockchain services. The article additionally examines various instances of government usage of blockchain technology through the implementation of evidence of concept or prototypes. The study was founded on the design of Hyperledger Fabric, and the findings indicate the platform’s pertinence to government services and use cases. The analysis of Hyperledger Fabric also entails the identification of the platform’s actors, services, procedures, and data structure.
Páez et al. [38] presented a proposed framework for an electronic identification document (e-ID) system that utilises Blockchain technology and biometric authentication. The Electronic Identification (E-ID) system is utilised to authenticate individuals in various transactions such as notarial services, registration, tax declaration and payment transactions, basic health services, and recording business activities. The proposed method for validating transactions was developed utilising a blockchain framework to monitor and verify all transactions executed by individuals registered in the electoral registry. This approach guarantees security, consistency, expandability, traceability, and clarity. Furthermore, the study presents a blockchain network structure that is distributed and decentralised, encompassing all network nodes, databases, and government entities such as national registries and notarial offices.
Yavuz et al. [39] employed Ethereum wallets and the Solidity programming language to develop and evaluate a sample e-voting system as a smart contract for the Ethereum network. The feasibility of enabling Android platform users who do not possess Ethereum wallets to participate in voting is currently under discussion. The electoral data pertaining to ballots and votes shall be stored on the Ethereum blockchain subsequent to the conduct of an election. The collective agreement among Ethereum nodes is responsible for processing voting requests, which can be initiated by users via an Android device or directly from their Ethereum wallets. This agreement provides an open platform for electronic voting and investigates the dependability and efficacy of blockchain-based electronic voting systems in depth. Their application is limited to small-scale voting systems, so new problems may arise in larger systems.
Zhang et al. [40] suggested the theoretical basis and benefits of blockchain technology for managing and distributing government information. They also went into more detail about the blockchain-based solution. In addition, they developed a blockchain-based architecture for sharing government information and providing technical and administrative implementation techniques. The outcome was a framework for analysing government and user interaction with information. Moreover, this model of government information-sharing facilitates the provision of transparency in the distribution of government information. In addition, this initiative facilitates the development and enhancement of information sharing capabilities within the government, providing a standardised information-sharing framework for e-government across various departments and regions. The Table 1 below contrasts the above papers based on the maturity of their solutions and consensus algorithms.
Despite the numerous benefits demonstrated by previous studies and research, all of them can fail or lose their advantages if implemented to a different field. This paper works on a radical and general solution to manage and store any incoming document in a blockchain network regardless of domain or business context. The amount of human intervention required to save the uploaded transaction document is minimised. Everything else is administered exclusively by the SECHash model. As a consequence of utilising the model, both human error and voluntary document modification are complicated processes. Moreover, because the documents are hashed, any modification requires new fragmentation calculations. Thus, our system architecture automates the data entry process with OCR technology and implements data integration with blockchain technology.

3. Proposed SECHash System Model

The proposed SECHash system model is based on blockchain and OCR technologies. This model will promote data correctness and integrity to governmental agencies for incoming documents. Furthermore, the model applies to any document management use case where the document is non-fungible, and its embedded data are helpful to digitise, as shown in Figure 1. As a case study, we implemented a proof-of-concept of this model specific to inbound/incoming invoice (or bill) management. This was performed due to the regular or semi-regular nature of invoices [41], as they have similar structures and are easier to perform OCR operations. Section 3.1 and Section 3.2 define the SECHash model and show the system model workflow, respectively.

3.1. SECHash System Model Methodology

1.
SECHash System Design Process: The SECHash model is proposed to solve the problem of the lack of individuals’ confidence in government due to corruption and fraud. In this paper, a case study in this area has been carried out. However, it will examine a specific use case related to external invoices/bills municipalities must pay. For example, suppose there is a maintenance bill from non-governmental organisations (NGOs) that the municipality must pay. The accountant or municipal employee will manually enter the bill data into the municipality’s financial system. At this stage, the billing record is drafted. After auditing, the same employee or maybe another one confirms the draft bill, a journal entry is created on the financial system, and all financial statements are reflected in the accounts. One of the problems that may arrive from the manual entry of bills is that we cannot guarantee the correctness of the bill data. Additionally, there is no way to verify the integrity of the entered information in the case of malicious actors.
The two main issues the SECHash model will look at are integrity and correctness. The suggested solution is to address these issues in a manner that is automated, transparent, and easy to understand in layperson’s terms. Thus, promoting trust in municipalities and other similar governmental entities.
2.
SECHash System Design Components: The proposal is based on three main components as follows:
(a)
OCR component: to capture the scanned bill’s content, extract its data, and transform them into digital data that the municipal financial system can read.
(b)
Blockchain component: to hash the scanned bills documents and store the hashes in the network—this is a write-private network with an open-read permission model.
(c)
Bills explorer component: to allow the user to request and view the hash for any document.
3.
Technology Selection: As a result of the recent literature review shown in Section 2, blockchain with OCR can be an excellent combination to address integrity and correctness issues. Therefore, the proposed SECHash system proposal is based on blockchain and OCR technologies in its solution.
4.
Proof-of-Concept Implementation: this work builds the proposed SECHash to defend the idea. And to prove that blockchain technology in the governmental sector will preserve data integrity.

3.2. SECHash System Model Workflow

According to the SECHash model (see Figure 1), the document in our case study is the invoice that must be scanned at the beginning. Depending on the nature of the documents, there will be multiple restrictions on the scanned documents. For example, if the scanned copy is an invoice, the limits will be invoice ID and customer ID. In contrast, the output of the scanned function will be digital output (transaction records, checked date, etc.) and digitised documents, which will be sent to the OCR engine. Accordingly, the invoice/bill data are captured and extracted from the digital invoice document. In the confirmation and validation stage, the employee/user should confirm these data and the new status for the records will be reflected and stored in the database. Finally, the document and the good records will be hashed using the blockchain-based file-sharing and payment protocol (LBRY). As a result, these documents are stored in the network. Figure 2 shows the invoice/bill document workflow life cycle.
Figure 3 shows the state diagram of the invoice/bill document. In simple words, the state of the document is scanned at the beginning. Next, OCR captures the second state. Then, the state will be confirmed by the employee. Finally, the last state is hashed, meaning the bill document data are reflected in the accounting system and stored in the blockchain database.

4. SECHash Proof-of-Concept

This section shows the technologies used to prove the concept of the SECHash proposal. It also explains the steps of how the proposal works and, finally, provides an evaluation.

4.1. Technology Selection

To implement the SECHash system model, the following technologies and components were selected considering several factors: the learning curve of the chosen technologies, local market, hardware, cost, performance, maintainability, stability, and security.
  • Django Web framework [42]. It is an open-source web application framework written in Python. Because of its rapid development capabilities, Django is very sophisticated in today’s market; it takes less time to build any application. It uses the Model View Template (MVT) design structure. Its name comes from the framework based on the model as the database, the view as the control function, and the templates as the user pages for communication interactions. A Django model acts as a database manager and uses two main commands:
    • Django picks up the changes in the models.py file after python manage.py performs the migrations and sends the data to the PostgreSQL database, then migrate python manage.py. The Django system then saves all changes to the database system.
    • Python manage.py runs the server at the end. This will start the project and give the user the local host address of the project running locally. The views.py file also handles project requests into template management API calls within demands. The user can describe her/his views using Python functions [42].
  • PostgreSQL database technology [43]. It supports most SQL transactions and provides concurrency control. In addition, it offers modern features such as complex queries, triggers, views, transnational integrity, and allows adding data type extensions. It also provides functions, operators, and procedural languages. As a result, it is one of the world’s most advanced open-source Database Management Systems (DBMS) [43].
  • LBRY (https://spec.lbry.com/, accessed on 14 April 2023). A protocol enables a decentralised online content marketplace. Specifically, it uses blockchain to build a community controlled decentralised content platform. That lets users quickly publish, host, search, access, download, and pay for content. LBRY introduces a new naming scheme that gives users complete control over the name of their content and uses blockchain to create a digital currency (LBC), a transparent distributed ledger, and a sync for all users. A global index of content metadata that also supports access to a unique namespace and supports new paradigms in digital content delivery [44]. The LBRY credits specifications are as follows:
    Max Supply: 1,083,202,000 LBC.
    Coin Type: PoW.
    PoW Algorithm: lbry.
    PoW Period: 20 years.
    Block Time: 2.5 min.
    Current Block Reward: 345 LBC.
    Premine: 400,000,000 LBC.
  • Hash function. An algorithm takes user data as input and produces a fixed-length output (called a hash digest) for the input data. Federal Information Processing Standard (FIPS) 180–44 (Dworkin, 2015) [45] provided distinct requirements for hash functions algorithms certified by the National Institute of Standards and Technology (NIST). As a result, the Secure Hash Algorithms (SHA) family are the most commonly implemented hash function in different applications [46]. LBRY is a PoW algorithm that combines SHA-256, SHA-512, and RIPEMD hash functions. This algorithm enables fast and secure transactions on the LBRY network.
    • SHA-256 has an output of 32 bytes and is displayed as a 64-character hexadecimal string. Therefore, it is considered secure and fast. The most common uses of SHA-256 are website authentication, digital signature, blockchain security, and file and fingerprint comparison in antivirus programs [47].
    • SHA-512 is an algorithm based on non-linear functions that output 64 bytes. It is designed to prevent any cracking method and is unbreakable. At the same time, the user data are encrypted by hashing it to 128-bit hexadecimal characters. The SHA-512 algorithm is useful in many areas, such as internet security, digital certificates, and blockchain for secure password hashing [48].
  • Asprise (https://asprise.com/royalty-free-library/python-ocr-api-overview.html, accessed on 5 March 2023). Since 1997, Asprise has provided customers worldwide with a wide range of Software Development Kits (SDKs) and APIs for programming libraries. Asprise OCR SDK is in high demand thanks to its high performance and royalty-free distribution model [49].

4.2. SECHash Implementation

The steps to implement a SECHash system model are as follows:
  • A Django project is created in the first step. Inside the model.py file, the following models are created:
    • The invoice model contains the following fields: invoice number, issued data, customer name, hash ID, total amount, currency, the image of the invoice document, address, email, phone number, notes, and foreign Key that has many records and data from other models for the invoice items.
    • The Invoice item model contains the following fields: product name, product description, quantity, the unit price for the product, and the amount.
  • The second step is migration, in which the SECHash system uses the makemigrations command. This command prepares all the SQL queries for the table creations, and the migration command executes the prepared queries to translate Python objects into tables in the PostgreSQL database. This is the role of the Object Relational Mapper (ORM).
  • Preparing the URLs as follows:
    • Add new invoice document, invoice provided in Figure 4.
    • Send invoice document to the blockchain as shown in Figure 5, which lists all the transactions that are sent to LBRY
    • View the bill document from the blockchain database using the hash ID as shown in Figure 4. Figure 6 shows the claim ID of each document. Figure 5 and Figure 7 show the transactions on the LBRY platform.
  • Implementing the logic for all the functionalities, which includes adding a new document, extracting invoice data from the uploaded document, creating a new record in the invoice table, and sending the document to the blockchain network.

4.3. SECHach Evaluation and Discussion

This subsection evaluates the proposed SECHash model system and summarises the differences in results between the presented papers and the SECHash model.

4.3.1. Storage Analysis

SECHash solves a significant problem in e-governance; central data storage capacity requirements and the resulting recourse to third parties may need to be more trustworthy. Utilising blockchain technology saves central storage space and ensures non-duplicate document copies for each transaction [50]. SECHash’s data storage system is explicitly based on the LBRY blockchain. Thus, the government will trade in the LBRY blockchain network and create transactions that include copies of accepted documents, as mentioned in Section 4.2. The cost of storing data on the LBRY blockchain can vary depending on several factors, including the amount of data and current market conditions. The prevailing market price of LBC determines the cost of data storage, which today is estimated to be USD 0.010057 (as of 3 July 2023, https://coinmarketfees.com/lbry-credit, accessed on 20 May 2023). In addition, the fees charged for processing transactions and including them in the network will be added to the cost of trading. The price of fees varies according to network conditions. During times of heavy network traffic, fees may be higher. SECHash does not focus on the speed of embedding the transaction into the network. Therefore, Shang et al. [51] recommended waiting for network conditions to improve, as fees are lower when the network is less congested.
In contrast, all papers offered in document data filing rely on centralised storage capacity or contracting with a third party. This process can be efficient. However, central storage would be a significant financial burden on government documents, estimated at USD 7–12 (https://dgtlinfra.com/how-much-does-it-cost-to-build-a-data-center/, accessed on 24 May 2023) million per megawatt of IT load. Moreover, data storage consumption is between 20–50 megawatts per year based on a 2023 study (https://www.aflhyperscale.com/articles/what-makes-hyperscale-hyperscale/, accessed on 26 May 2023). A government relying on centralised data storage would cost at least USD 140 million annually. As for the proposals outsourced to a third party, the third party must have an excellent reputation to secure sensitive government documents. Yet, it is possible to penetrate this third party either internally or from an external party without the knowledge of the government [52].

4.3.2. Data Security Analysis

SECHash achieves data integrity and authority based on the security of blockchain technology. The security of the SECHash system is based on the LBRY blockchain [53]. Data integrity is achieved by leveraging the technologies and concepts used in the LBRY. When documents are recorded in the blockchain network, changing or modifying them is difficult. This is due to the consensus mechanism in approving and confirming each transaction within each new block. Thus, any tiny change in the approved documents needs massive power of calculations. At the same time, it is easy to validate every document saved on the network using hashing algorithms. SECHash also achieves data authority. Since all the documents are hashed, and the data are encrypted, only authorised users can access these documents. In addition, using OCR technology will reduce the potential risk of human errors and data entry. Furthermore, the security features of SECHash are unaffected in the application domain.
In comparison, systems were proposed in previous studies and attempted to be applied to be effective in a specific field. At the same time, these systems lose their effectiveness and ability to save documents as required if used in other areas.

5. Conclusions

This paper proposes a new system model called SECHash for using blockchain technology in electronic government (e-government). Firstly, the paper reviews the most recent industry documents and the latest literature on blockchain technology and e-government and their uses together. Then, a new model of the system was introduced to deal with public information extraction in governments. This system model was implemented as a proof-of-concept using LBRY as the supporting blockchain, Django as the web framework, PostgreSQL as the metadata and application data database, and Aspire for OCR. In addition, it has been applied explicitly to manage incoming bills/invoices in municipalities. SECHash system model proves its efficiency in helping governments with digital transformation projects. It also demonstrates that it is a good solution for saving storage space. The SECHash system model will, therefore, result in significant cost reductions. SECHach is easy to confirm the validity of a document, while it requires a lot of computation power to modify a copy once registered in the blockchain network. Moreover, adopting OCR technology will reduce the chance of human error and incorrect data entry.
On the other hand, our approach has some limitations, including the lack of complex data or context on inbound invoice management accuracy and general budget reconciliation issues in government.
In the future, we aim to apply this system in a local context on the ground. We also seek to measure the impact of this system on individuals’ confidence in the specific use case, including budget reconciliation (corruption/theft) and overall accuracy in handling incoming invoices (bills) to municipal organisations. Moreover, we intend to improve the system model and implementation to use a private blockchain network instead of a public LBRY. We will also strive to fully automate the process by enhancing invoice data detection and extraction. Finally, we seek to implement a general purpose OCR extraction model to apply our generalised model across multiple domains.

Author Contributions

Conceptualization, T.K.; Methodology, F.A., M.J., R.A. and A.K.; Software, F.A.; Validation, T.K.; Formal analysis, F.A., A.S. and H.B.; Investigation, A.K. and S.A.; Resources, A.S., T.K. and R.A.; Data curation, M.J., A.S. and H.B.; Writing—original draft, F.A., M.J. and A.S.; Writing—review & editing, R.A., A.K. and S.A.; Visualization, M.J.; Supervision, R.A. and A.K.; Project administration, R.A.; Funding acquisition, R.A., A.K., H.B. and S.A. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Birzeit University.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data sharing not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Malodia, S.; Dhir, A.; Mishra, M.; Bhatti, Z.A. Future of e-Government: An integrated conceptual framework. Technol. Forecast. Soc. Chang. 2021, 173, 121102. [Google Scholar] [CrossRef]
  2. Ndou, D. E-Government for Developing Countries: Opportunities and Challenges. EJISDC Electron. J. Inf. Syst. Dev. Ctries. 2004, 18, 1–24. [Google Scholar] [CrossRef]
  3. Farida, I.; Setiawan, R.; Maryatmi, A.; Juwita, N. The Implementation of E-Government in the Industrial Revolution Era 4.0 in Indonesia. Int. J. Progress. Sci. Technol. 2020, 22, 340–346. [Google Scholar]
  4. Carter, L.; Yoon, V.; Liu, D. Analyzing e-government design science artifacts: A systematic literature review. Int. J. Inf. Manag. 2022, 62, 102430. [Google Scholar] [CrossRef]
  5. Vasconez, J.P.; Kantor, G.A.; Auat Cheein, F.A. Human–robot interaction in agriculture: A survey and current challenges. Biosyst. Eng. 2019, 179, 35–48. [Google Scholar] [CrossRef]
  6. Maulidi, A. Philosophical understanding of the dynamics and control of occupational fraud in the public sector: Contingency analysis. Int. J. Ethics Syst. 2023, 39, 432–463. [Google Scholar] [CrossRef]
  7. Dikmen, S.; Çiçek, H.G. Fighting Against Corruption and Bribery in Public Procurements during the COVID-19 Pandemic. The Ethics of Bribery: Theoretical and Empirical Studies; Springer: Cham, Switzerland, 2022; Volume 10. [Google Scholar]
  8. Tacconi, L.; Williams, D.A. Corruption and anti-corruption in environmental and resource management. Annu. Rev. Environ. Resour. 2020, 45, 305–329. [Google Scholar] [CrossRef]
  9. Awadallah, R.; Samsudin, A.; Teh, J.S.; Almazrooie, M. An Integrated Architecture for Maintaining Security in Cloud Computing Based on Blockchain. IEEE Access 2021, 9, 69513–69526. [Google Scholar] [CrossRef]
  10. Ammous, S. Blockchain Technology: What is it Good for? SSRN Electron. J. 2016, 2832751. [Google Scholar] [CrossRef] [Green Version]
  11. Ali Laghari, A.; Wu, K.; Ali Laghari, R.; Ali, M.; Ayub Khan, A. A Review and State of Art of Internet of Things (IoT). Arch. Comput. Methods Eng. 2021, 29, 1395–1413. [Google Scholar] [CrossRef]
  12. Fareed, R.; Kamal, Z.A. E-government based on the blockchain technology, and the evaluation of its transaction through the number of transactions completed per second. Period. Eng. Nat. Sci. 2022, 10, 620–631. [Google Scholar] [CrossRef]
  13. Hoang, V.H.; Lehtihet, E.; Ghamri-Doudane, Y. Privacy-preserving blockchain-based data sharing platform for decentralized storage systems. In Proceedings of the 2020 IFIP Networking Conference (Networking), Paris, France, 22–25 June 2020; pp. 280–288. [Google Scholar]
  14. Feng, W. Blockchain Bills of Lading and Their Future Regulation; NUS: Singapore, 2021. [Google Scholar]
  15. Balan, A.; Alboaie, S.; Kourtit, K.; Nijkamp, P. Transparency and Accountability in Urban Public Procurement: Design of a Self-Sovereign Blockchain APP. Int. Arch. Photogramm. Remote. Sens. Spat. Inf. Sci. 2020, 44, 9–16. [Google Scholar] [CrossRef]
  16. Abou Jaoude, J.; Saade, R.G. Blockchain applications–usage in different domains. IEEE Access 2019, 7, 45360–45381. [Google Scholar] [CrossRef]
  17. Hasselgren, A.; Kralevska, K.; Gligoroski, D.; Pedersen, S.A.; Faxvaag, A. Blockchain in healthcare and health sciences—A scoping review. Int. J. Med. Inform. 2020, 134, 104040. [Google Scholar] [CrossRef]
  18. Mirabelli, G.; Solina, V. Blockchain-based solutions for agri-food supply chains: A survey. Int. J. Simul. Process. Model. 2021, 17, 1–15. [Google Scholar] [CrossRef]
  19. Bisht, D.; Singh, R.; Gehlot, A.; Akram, S.V.; Singh, A.; Montero, E.C.; Priyadarshi, N.; Twala, B. Imperative Role of Integrating Digitalization in the Firms Finance: A Technological Perspective. Electronics 2022, 11, 3252. [Google Scholar] [CrossRef]
  20. Jiang, A.; Yuan, H.; Li, D. A two-stage optimization approach on the decisions for prosumers and consumers within a community in the Peer-to-peer energy sharing trading. Int. J. Electr. Power Energy Syst. 2021, 125, 106527. [Google Scholar] [CrossRef]
  21. Tushar, W.; Saha, T.K.; Yuen, C.; Azim, M.I.; Morstyn, T.; Poor, H.V.; Niyato, D.; Bean, R. A coalition formation game framework for peer-to-peer energy trading. Appl. Energy 2020, 261, 114436. [Google Scholar] [CrossRef] [Green Version]
  22. Borowski, P.F. Zonal and Nodal Models of energy market in European Union. Energies 2020, 13, 4182. [Google Scholar] [CrossRef]
  23. Lan, T.; Jermsittiparsert, K.; Alrashood, S.T.; Rezaei, M.; Al-Ghussain, L.; Mohamed, M.A. An advanced machine learning based energy management of renewable microgrids considering hybrid electric vehicles’ charging demand. Energies 2021, 14, 569. [Google Scholar] [CrossRef]
  24. Wang, S.; Taha, A.F.; Wang, J.; Kvaternik, K.; Hahn, A. Energy crowdsourcing and peer-to-peer energy trading in blockchain-enabled smart grids. IEEE Trans. Syst. Man Cybern. Syst. 2019, 49, 1612–1623. [Google Scholar] [CrossRef] [Green Version]
  25. Tushar, W.; Yuen, C.; Saha, T.K.; Morstyn, T.; Chapman, A.C.; Alam, M.J.E.; Hanif, S.; Poor, H.V. Peer-to-peer energy systems for connected communities: A review of recent advances and emerging challenges. Appl. Energy 2021, 282, 116131. [Google Scholar] [CrossRef]
  26. Wang, Q.; Su, M. Integrating blockchain technology into the energy sector—from theory of blockchain to research and application of energy blockchain. Comput. Sci. Rev. 2020, 37, 100275. [Google Scholar] [CrossRef]
  27. Nicolazzo, S.; Nocera, A.; Ursinoc, D.; Virgilic, L. A privacy-preserving approach to prevent feature disclosure in an IoT scenario. Future Gener. Comput. Syst. 2020, 105, 502–519. [Google Scholar] [CrossRef]
  28. Corradini, E.; Nicolazzo, S.; Nocera, A.; Domenico, U.; Luca, V. A two-tier Blockchain framework to increase protection and autonomy of smart objects in the IoT. Future Gener. Comput. Syst. 2022, 181, 338–356. [Google Scholar] [CrossRef]
  29. D’Hauwers, R.; Van Der Bank, J.; Montakhabi, M. Trust, transparency and security in the sharing economy: What is the Government’s role? Technol. Innov. Manag. Rev. 2020, 10, 5–17. [Google Scholar] [CrossRef]
  30. Fallucchi, F.; Gerardi, M.; Petito, M.; De Luca, E.W. Blockchain Framework in Digital Government for the Certification of Authenticity, Timestamping and Data Property; University of Hawaii Manoa Library: Honolulu, HI, USA, 2021. [Google Scholar]
  31. Lacity, M.C.; Van Hoek, R. How Walmart Canada used blockchain technology to reimagine freight invoice processing. MIS Q. Exec. 2021, 20, 5. [Google Scholar] [CrossRef]
  32. Rasool, S.; Saleem, A.; Iqbal, M.; Dagiuklas, T.; Mumtaz, S. Docschain: Blockchain-based IoT solution for verification of degree documents. IEEE Trans. Comput. Soc. Syst. 2020, 7, 827–837. [Google Scholar] [CrossRef]
  33. Perera, T.; Hettige, S.P.T.; Jayatilake, S.A.; Abeygunawardhana, W.; Bandara, H.D. Blockchain-based product traceability beyond proof of existence. In Proceedings of the 2020 Moratuwa Engineering Research Conference (MERCon), Moratuwa, Sri Lanka, 28–30 July 2020; pp. 1–6. [Google Scholar]
  34. Mthethwa, S.; Dlamini, N.; Barbour, G. Proposing a blockchain-based solution to verify the integrity of hardcopy documents. In Proceedings of the 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC), Plaine Magnien, Mauritius, 6–7 December 2018; pp. 1–5. [Google Scholar]
  35. Das, M.; Tao, X.; Liu, Y.; Cheng, J.C. A blockchain-based integrated document management framework for construction applications. Autom. Constr. 2022, 133, 104001. [Google Scholar] [CrossRef]
  36. Nizamuddin, N.; Hasan, H.R.; Salah, K. IPFS-Blockchain-Based Authenticity of Online Publications. In Blockchain—ICBC 2018; Chen, S., Wang, H., Zhang, L.J., Eds.; Springer: Cham, Switzerland, 2018; pp. 199–212. [Google Scholar]
  37. Alketbi, A.; Nasir, Q.; Abu Talib, M. Novel blockchain reference model for government services: Dubai government case study. Int. J. Syst. Assur. Eng. Manag. 2020, 11, 1170–1191. [Google Scholar] [CrossRef]
  38. Páez, R.V.; Pérez Cerquera, M.; Ramírez, G.; Montes, J.; Bouvarel, L. An Architecture for Biometric Electronic Identification Document System Based on Blockchain. Future Internet 2020, 12, 10. [Google Scholar] [CrossRef] [Green Version]
  39. Yavuz, E.; Koç, A.K.; Çabuk, U.C.; Dalkılıç, G. Towards secure e-voting using ethereum blockchain. In Proceedings of the 2018 6th International Symposium on Digital Forensic and Security (ISDFS), Antalya, Turkey, 22–25 March 2018; pp. 1–7. [Google Scholar] [CrossRef]
  40. Zhang, Y.; Deng, S.; Zhang, Y.; Kong, J. Research on Government Information Sharing Model Using Blockchain Technology. In Proceedings of the 2019 10th International Conference on Information Technology in Medicine and Education (ITME), Qingdao, China, 23–25 August 2019; pp. 726–729. [Google Scholar] [CrossRef]
  41. Huang, Y.; Lv, T.; Cui, L.; Lu, Y.; Wei, F. LayoutLMv3: Pre-Training for Document AI with Unified Text and Image Masking. arXiv 2022, arXiv:2204.08387. [Google Scholar] [CrossRef]
  42. Gore, H.; Singh, R.K.; Singh, A.; Singh, A.P.; Shabaz, M. Django: Web Development Simple and Fast. Ann. Rom. Soc. Cell Biol. 2021, 25, 4576–4585. [Google Scholar]
  43. Viloria, A.; Acuña, G.C.; Alcázar Franco, D.J.; Hernández-Palma, H.; Fuentes, J.P. Integration of Data Mining Techniques to PostgreSQL Database Manager System. Procedia Comput. Sci. 2019, 155, 575–580. [Google Scholar] [CrossRef]
  44. Li, J.; Grintsvayg, A.; Kauffman, J.; Fleming, C. LBRY: A Blockchain-Based Decentralized Digital Content Marketplace. In Proceedings of the 2020 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), Oxford, UK, 17–20 July 2020; pp. 42–51. [Google Scholar] [CrossRef]
  45. FIPS PUB 180-4; Secure Hash Standard (SHS). National Institute of Standards and Technology. Federal Information Processing Standards Publication: Gaithersburg, MD, USA, 20 August 2015. [CrossRef]
  46. Awadallah, R.; Samsudin, A. Using Blockchain in Cloud Computing to Enhance Relational Database Security. IEEE Access 2021, 9, 137353–137366. [Google Scholar] [CrossRef]
  47. Zhang, X.; WU, R.; Wang, M.; Wang, L. A High-Performance Parallel Computation Hardware Architecture in ASIC of SHA-256 Hash. In Proceedings of the 2019 21st International Conference on Advanced Communication Technology (ICACT), Pyeong Chang, South Korea, 17–20 February 2019; pp. 52–55. [Google Scholar] [CrossRef]
  48. Verma, J.; Shahrukh, M.; Krishna, M. A Critical Review on Cryptography and Hashing Algorithm SHA-512. Int. Res. J. Mod. Eng. 2021, 3, 1760. [Google Scholar]
  49. Petrescu, R.; Manolache, S.; Boiangiu, C.A.; Avatavului, C.; Prodan, M. Combining tesseract and asprise results to improve ocr text detection accuracy. J. Inf. Syst. Manag. 2019, 13, 57. [Google Scholar]
  50. Awadallah, R.; Samsudin, A. Homomorphic Encryption for Cloud Computing and Its Challenges. In Proceedings of the 2020 IEEE 7th International Conference on Engineering Technologies and Applied Sciences (ICETAS), 18–20 December 2020; pp. 1–6. [Google Scholar] [CrossRef]
  51. Shang, G.; Ilk, N.; Fan, S. Need for speed, but how much does it cost? Unpacking the fee-speed relationship in Bitcoin transactions. J. Oper. Manag. 2023, 69, 102–126. [Google Scholar] [CrossRef]
  52. Awadallah, R.; Samsudin, A.; Almazrooie, M. Verifiable homomorphic encrypted computations for cloud computing. Int. J. Adv. Comput. Sci. Appl. 2021, 12, 797–808. [Google Scholar] [CrossRef]
  53. Breydo, L. Stocks, Memes or Miles? A New Crypto Taxonomy & Regulatory Paradigm. In A New Crypto Taxonomy & Regulatory Paradigm (April 23, 2023); SSRN: Rochester, NY, USA, 2023. [Google Scholar]
Figure 1. SECHash system model.
Figure 1. SECHash system model.
Applsci 13 08463 g001
Figure 2. Sequence diagram for the system model.
Figure 2. Sequence diagram for the system model.
Applsci 13 08463 g002
Figure 3. State diagram for bill document.
Figure 3. State diagram for bill document.
Applsci 13 08463 g003
Figure 4. View invoice image on the web using its claim ID.
Figure 4. View invoice image on the web using its claim ID.
Applsci 13 08463 g004
Figure 5. Transaction list.
Figure 5. Transaction list.
Applsci 13 08463 g005
Figure 6. LBRY claim ID.
Figure 6. LBRY claim ID.
Applsci 13 08463 g006
Figure 7. LBRY transaction. ID.
Figure 7. LBRY transaction. ID.
Applsci 13 08463 g007
Table 1. Comparing papers dedicated to blockchain.
Table 1. Comparing papers dedicated to blockchain.
Maturity of SolutionConsensus Algorithm
Paper ScopeExperimentalConceptualPrototypeProposalKafka ConsensusProof-of-StakeProof-of-LuckTournament ConsensusProof-of-ExistenceProof-of-WorkProof-of-Integrity
(Fallucchi et al., 2020 [30])Security and Data Integrity
(Fallucchi et al., 2020 [30])Documents Traceability
(Fallucchi et al., 2020 [30])Documents Verification
(Lacity et al., 2020 [31])Invoice Processing
(Rasool et al., 2019 [32])Education (Degree Verification)
(Mthethwa et al., 2020 [34])Document Verification
(Das et al., 2022 [35])Document Version Management
(Nizamuddin et al., 2018 [36])Online Publication
(Alketbi et al., 2020 [37])Land Property Services
(Páez et al., 2020 [38])Authenticat-ion
(Yavuz et al., 2018 [39])e-Voting
(Zhang et al., 2019 [40])Data Sharing
SECHashe-Government
○ = Not supported; ● = Fully supported.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Azzam, F.; Jaber, M.; Saies, A.; Kirresh, T.; Awadallah, R.; Karakra, A.; Barghouthi, H.; Amarneh, S. The Use of Blockchain Technology and OCR in E-Government for Document Management: Inbound Invoice Management as an Example. Appl. Sci. 2023, 13, 8463. https://doi.org/10.3390/app13148463

AMA Style

Azzam F, Jaber M, Saies A, Kirresh T, Awadallah R, Karakra A, Barghouthi H, Amarneh S. The Use of Blockchain Technology and OCR in E-Government for Document Management: Inbound Invoice Management as an Example. Applied Sciences. 2023; 13(14):8463. https://doi.org/10.3390/app13148463

Chicago/Turabian Style

Azzam, Fatima, Mariam Jaber, Amany Saies, Tareq Kirresh, Ruba Awadallah, Abdallah Karakra, Hafez Barghouthi, and Saleh Amarneh. 2023. "The Use of Blockchain Technology and OCR in E-Government for Document Management: Inbound Invoice Management as an Example" Applied Sciences 13, no. 14: 8463. https://doi.org/10.3390/app13148463

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop