skip to main content
10.1145/3286978.3287022acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmobiquitousConference Proceedingsconference-collections
research-article

Constructing Trustworthy and Safe Communities on a Blockchain-Enabled Social Credits System

Authors Info & Claims
Published:05 November 2018Publication History

ABSTRACT

The emergence of big data and Artificial Intelligence (AI) technology is reshaping the world. While the technological revolution improves the quality of our life, new concerns are triggered. The superhuman capability enables AI to outperform human workers in many data-and/or computing-intensive tasks. Also, digital superpowers are showing arrogance towards individuals, which erodes the trust foundation of the society. In this position paper, we suggest to construct trustworthy and safe communities based on a BLockchain-Enabled Social credits System (BLESS) that rewards the residents who commit in socially beneficial activities. Human being's true value lies in serving other people. The BLESS system is considered as an efficient approach to promote the value and dignity in efforts focused on enhancing our communities and regulating business and private behaviors. The BLESS system leverages the decentralized architecture of the blockchain network, which not only allows grassroots individuals to participate rating process of a social credit system (SCS), but also provides tamper proof of transaction data in the trustless network environment. The anonymity in blockchain records also protects individuals from being targeted in the fight against powerful enterprises. Smart contract enabled authentication and authorization strategy prevents any unauthorized entity from accessing the credit system. The BLESS scheme is promising to offer a secure, transparent and decentralized SCS.

References

  1. {n. d.}. TimeBanks USA. http://timebanks.org/. accessed September 3, 2018.Google ScholarGoogle Scholar
  2. Victoria ME Bellotti, Sara Cambridge, Karen Hoy, Patrick C Shih, Lisa Renery Handalian, Kyungsik Han, and John M Carroll. 2014. Towards community-centered support for peer-to-peer service exchange: rethinking the timebanking metaphor. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2975--2984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Edgar Cahn. 2011. Time banking: An idea whose time has come. Yes Magazine (2011).Google ScholarGoogle Scholar
  4. Edgar S Cahn. 2000. No more throw-away people: The co-production imperative. Edgar Cahn.Google ScholarGoogle Scholar
  5. John M Carroll. 2013. Co-production scenarios for mobile time banking. In International Symposium on End User Development. Springer, 137--152.Google ScholarGoogle ScholarCross RefCross Ref
  6. Martin Chorzempa, Paul Triolo, Samm Sacks, et al. 2018. ChinaâĂŹs Social Credit System: A Mark of Progress or a Threat to Privacy? Technical Report.Google ScholarGoogle Scholar
  7. Kevin Drum. 2017. You Will Lose Your Job to a RobotâĂŤand Sooner Than You Think. https://www.motherjones.com/politics/2017/10/you-will-lose-your-job-to-a-robot-and-sooner-than-you-think/ (2017).Google ScholarGoogle Scholar
  8. Mohamed Tahar Hammi, Badis Hammi, Patrick Bellot, and Ahmed Serhrouchni. 2018. Bubbles of Trust: A decentralized blockchain-based authentication system for IoT. Computers & Security 78 (2018), 126--142.Google ScholarGoogle ScholarCross RefCross Ref
  9. Mizzo Kwon, Chanam Lee, Yu Xiao, and William A McIntosh. 2017. Community currency activities, community attachment, and quality of life: A case study of the crooked river alliance of TimeBanks. Time & Society (2017), 0961463X17716737.Google ScholarGoogle Scholar
  10. Kai-Fu Lee. 2018. The Human Promise of the AI Revolution. The Wall Street Journal September 14 (2018).Google ScholarGoogle Scholar
  11. Fan Liang, Vishnupriya Das, Nadiya Kostyuk, and Muzammil M Hussain. 2018. Constructing a Data-Driven Society: China's Social Credit System as a State Surveillance Infrastructure. Policy & Internet (2018).Google ScholarGoogle Scholar
  12. Loretta J Mester et al. 1997. What's the point of credit scoring? Business review 3, Sep/Oct (1997), 3--16.Google ScholarGoogle Scholar
  13. Deeraj Nagothu, Ronghua Xu, Seyed Yahya Nikouei, and Yu Chen. 2018. A Microservice-enabled Architecture for Smart Surveillance using Blockchain Technology. arXiv preprint arXiv:1807.07487 (2018).Google ScholarGoogle Scholar
  14. Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008).Google ScholarGoogle Scholar
  15. Seyed Yahya Nikouei, Ronghua Xu, Deeraj Nagothu, Yu Chen, Alexander Aved, and Erik Blasch. 2018. Real-Time Index Authentication for Event-Oriented Surveillance Video Query using Blockchain. arXiv preprint arXiv:1807.06179 (2018).Google ScholarGoogle Scholar
  16. Sara Ashley O'Brien, Nelli Black, Curt Devine, and Drew Griffin. 2018. CNN investigation: 103 Uber drivers accused of sexual assault or abuse. https://money.cnn.com/2018/04/30/technology/uber-driver-sexual-assault/index.html (2018).Google ScholarGoogle Scholar
  17. Daniele Selby. 2018. How a Fake Vaccine Scandal in China Is Causing a Crisis of Confidence. https://www.globalcitizen.org/en/content/china-fake-vaccine-rabies-scandal-dpt/ (2018).Google ScholarGoogle Scholar
  18. Melanie Swan. 2015. Blockchain: Blueprint for a new economy. "O'Reilly Media, Inc.". Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Nick Szabo. 1997. Formalizing and securing relationships on public networks. First Monday 2, 9 (1997).Google ScholarGoogle Scholar
  20. Yue Wang and Robert Olsen. 2018. China's Didi Chuxing Faces Intense Pressure Amid Public Anger Over Second Passenger Death. https://www.forbes.com/sites/ywang/2018/09/01/chinas-didi-chuxing-faces-intense-pressure-amid-public-anger-over-second-passenger-death/#6d4bf787a6d0 (2018).Google ScholarGoogle Scholar
  21. Ronghua Xu., Yu Chen, Erik Blasch, and Genshe Chen. 2018. BlendCAC: A BLockchain-ENabled Decentralized Capability-based Access Control for IoTs. In the IEEE International Conference on Blockchain, Selected Areas in IoT and Blockchain. IEEE.Google ScholarGoogle Scholar
  22. Ronghua Xu, Yu Chen, Erik Blasch, and Genshe Chen. 2018. BlendCAC: A Smart Contract Enabled Decentralized Capability-Based Access Control Mechanism for the IoT. Computers 2018, 7(3), 39; Access on: http://www.mdpi.com/2073-431X/7/3/39 (2018).Google ScholarGoogle Scholar
  23. Chien Wen Yuan, Benjamin V Hanrahan, and John M Carroll. 2018. Assessing timebanking use and coordination: implications for service exchange tools. Information Technology & People (2018).Google ScholarGoogle Scholar

Index Terms

  1. Constructing Trustworthy and Safe Communities on a Blockchain-Enabled Social Credits System

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        MobiQuitous '18: Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services
        November 2018
        490 pages
        ISBN:9781450360937
        DOI:10.1145/3286978

        Copyright © 2018 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 5 November 2018

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

        Acceptance Rates

        Overall Acceptance Rate26of87submissions,30%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader