ABSTRACT
The emergence of big data and Artificial Intelligence (AI) technology is reshaping the world. While the technological revolution improves the quality of our life, new concerns are triggered. The superhuman capability enables AI to outperform human workers in many data-and/or computing-intensive tasks. Also, digital superpowers are showing arrogance towards individuals, which erodes the trust foundation of the society. In this position paper, we suggest to construct trustworthy and safe communities based on a BLockchain-Enabled Social credits System (BLESS) that rewards the residents who commit in socially beneficial activities. Human being's true value lies in serving other people. The BLESS system is considered as an efficient approach to promote the value and dignity in efforts focused on enhancing our communities and regulating business and private behaviors. The BLESS system leverages the decentralized architecture of the blockchain network, which not only allows grassroots individuals to participate rating process of a social credit system (SCS), but also provides tamper proof of transaction data in the trustless network environment. The anonymity in blockchain records also protects individuals from being targeted in the fight against powerful enterprises. Smart contract enabled authentication and authorization strategy prevents any unauthorized entity from accessing the credit system. The BLESS scheme is promising to offer a secure, transparent and decentralized SCS.
- {n. d.}. TimeBanks USA. http://timebanks.org/. accessed September 3, 2018.Google Scholar
- Victoria ME Bellotti, Sara Cambridge, Karen Hoy, Patrick C Shih, Lisa Renery Handalian, Kyungsik Han, and John M Carroll. 2014. Towards community-centered support for peer-to-peer service exchange: rethinking the timebanking metaphor. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2975--2984. Google ScholarDigital Library
- Edgar Cahn. 2011. Time banking: An idea whose time has come. Yes Magazine (2011).Google Scholar
- Edgar S Cahn. 2000. No more throw-away people: The co-production imperative. Edgar Cahn.Google Scholar
- John M Carroll. 2013. Co-production scenarios for mobile time banking. In International Symposium on End User Development. Springer, 137--152.Google ScholarCross Ref
- Martin Chorzempa, Paul Triolo, Samm Sacks, et al. 2018. ChinaâĂŹs Social Credit System: A Mark of Progress or a Threat to Privacy? Technical Report.Google Scholar
- Kevin Drum. 2017. You Will Lose Your Job to a RobotâĂŤand Sooner Than You Think. https://www.motherjones.com/politics/2017/10/you-will-lose-your-job-to-a-robot-and-sooner-than-you-think/ (2017).Google Scholar
- Mohamed Tahar Hammi, Badis Hammi, Patrick Bellot, and Ahmed Serhrouchni. 2018. Bubbles of Trust: A decentralized blockchain-based authentication system for IoT. Computers & Security 78 (2018), 126--142.Google ScholarCross Ref
- Mizzo Kwon, Chanam Lee, Yu Xiao, and William A McIntosh. 2017. Community currency activities, community attachment, and quality of life: A case study of the crooked river alliance of TimeBanks. Time & Society (2017), 0961463X17716737.Google Scholar
- Kai-Fu Lee. 2018. The Human Promise of the AI Revolution. The Wall Street Journal September 14 (2018).Google Scholar
- Fan Liang, Vishnupriya Das, Nadiya Kostyuk, and Muzammil M Hussain. 2018. Constructing a Data-Driven Society: China's Social Credit System as a State Surveillance Infrastructure. Policy & Internet (2018).Google Scholar
- Loretta J Mester et al. 1997. What's the point of credit scoring? Business review 3, Sep/Oct (1997), 3--16.Google Scholar
- Deeraj Nagothu, Ronghua Xu, Seyed Yahya Nikouei, and Yu Chen. 2018. A Microservice-enabled Architecture for Smart Surveillance using Blockchain Technology. arXiv preprint arXiv:1807.07487 (2018).Google Scholar
- Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008).Google Scholar
- Seyed Yahya Nikouei, Ronghua Xu, Deeraj Nagothu, Yu Chen, Alexander Aved, and Erik Blasch. 2018. Real-Time Index Authentication for Event-Oriented Surveillance Video Query using Blockchain. arXiv preprint arXiv:1807.06179 (2018).Google Scholar
- Sara Ashley O'Brien, Nelli Black, Curt Devine, and Drew Griffin. 2018. CNN investigation: 103 Uber drivers accused of sexual assault or abuse. https://money.cnn.com/2018/04/30/technology/uber-driver-sexual-assault/index.html (2018).Google Scholar
- Daniele Selby. 2018. How a Fake Vaccine Scandal in China Is Causing a Crisis of Confidence. https://www.globalcitizen.org/en/content/china-fake-vaccine-rabies-scandal-dpt/ (2018).Google Scholar
- Melanie Swan. 2015. Blockchain: Blueprint for a new economy. "O'Reilly Media, Inc.". Google ScholarDigital Library
- Nick Szabo. 1997. Formalizing and securing relationships on public networks. First Monday 2, 9 (1997).Google Scholar
- Yue Wang and Robert Olsen. 2018. China's Didi Chuxing Faces Intense Pressure Amid Public Anger Over Second Passenger Death. https://www.forbes.com/sites/ywang/2018/09/01/chinas-didi-chuxing-faces-intense-pressure-amid-public-anger-over-second-passenger-death/#6d4bf787a6d0 (2018).Google Scholar
- Ronghua Xu., Yu Chen, Erik Blasch, and Genshe Chen. 2018. BlendCAC: A BLockchain-ENabled Decentralized Capability-based Access Control for IoTs. In the IEEE International Conference on Blockchain, Selected Areas in IoT and Blockchain. IEEE.Google Scholar
- Ronghua Xu, Yu Chen, Erik Blasch, and Genshe Chen. 2018. BlendCAC: A Smart Contract Enabled Decentralized Capability-Based Access Control Mechanism for the IoT. Computers 2018, 7(3), 39; Access on: http://www.mdpi.com/2073-431X/7/3/39 (2018).Google Scholar
- Chien Wen Yuan, Benjamin V Hanrahan, and John M Carroll. 2018. Assessing timebanking use and coordination: implications for service exchange tools. Information Technology & People (2018).Google Scholar
Index Terms
- Constructing Trustworthy and Safe Communities on a Blockchain-Enabled Social Credits System
Recommendations
Poster: A Privacy-Preserving Smart Contract Vulnerability Detection Framework for Permissioned Blockchain
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityThe two main types of blockchains that are currently widely deployed are public blockchains and permissioned blockchains. The research that has been conducted for blockchain vulnerability detection is mainly oriented to public blockchains. Less ...
A Flexible Instant Payment System Based on Blockchain
Information Security and PrivacyAbstractImproving the throughput of blockchain systems such as Bitcoin and Ethereum has been an important research problem. Off-chain payments are one of the most promising technologies to tackle this challenge. Once a payment channel, however, is ...
DAppHunter: Identifying Inconsistent Behaviors of Blockchain-Based Decentralized Applications
ICSE-SEIP '23: Proceedings of the 45th International Conference on Software Engineering: Software Engineering in PracticeA blockchain-based decentralized application (DApp) refers to an application typically using web pages or mobile applications as the front-end and smart contracts as the back-end. The front-end of the DApp helps users generate transactions and send ...
Comments