METHODS article
Front. Blockchain
Sec. Blockchain Security and Privacy
Volume 8 - 2025 | doi: 10.3389/fbloc.2025.1699773
Securing E-Governance: A Blockchain-Based Framework for Tamper-Proof PDF Document Exchange
Provisionally accepted- Vellore Institute of Technology, Chennai, Chennai, India
Select one of your emails
You have multiple emails registered with Frontiers:
Notify me on publication
Please enter your email address:
If you already have an account, please login
You don't have a Frontiers account ? You can register here
E-Governance has revolutionized public administration by enabling efficient service delivery, improved workflows, and enhanced transparency. A cornerstone of e-governance is the secure exchange of digital documents, especially PDFs, which are commonly used for official communication. However, the growing reliance on digital documentation has exposed these systems to sophisticated cyber threats, such as shadow attacks and policy tampering. Shadow attacks exploit the flexibility of the PDF specification to bypass the integrity of digitally signed files, while policy tampering involves malicious manipulation of access controls to compromise document security. To address these challenges, this paper proposes a blockchain-based framework that ensures the validity, integrity, and security of PDFs in e-governance environments. By leveraging blockchain's immutable and tamper-resistant properties, the system securely stores access policies and document metadata, making policy tampering infeasible even in the face of Man-in-the-Middle (MITM) attacks. The framework employs Policy-based Governance infrastructure to enhance the confidentiality of digital signatures. The proposed solution is evaluated for efficiency and cost-effectiveness, showing a tamper proof method compared to traditional methods providing robust protection against cyber threats. This system offers a collaborative, secure environment for e-governance, ensuring the integrity of document exchanges and the trustworthiness of government operations.
Keywords: E-governance, Blockchain, PDF Security, Shadow Attacks, Policy-based governance
Received: 05 Sep 2025; Accepted: 23 Oct 2025.
Copyright: © 2025 R and Mishra. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
* Correspondence: Ganesan R, ganesan.r@vit.ac.in
Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.