Your new experience awaits. Try the new design now and help us make it even better

METHODS article

Front. Blockchain

Sec. Blockchain Security and Privacy

Volume 8 - 2025 | doi: 10.3389/fbloc.2025.1699773

Securing E-Governance: A Blockchain-Based Framework for Tamper-Proof PDF Document Exchange

Provisionally accepted
Ganesan  RGanesan R*Priyanka  MishraPriyanka Mishra
  • Vellore Institute of Technology, Chennai, Chennai, India

The final, formatted version of the article will be published soon.

E-Governance has revolutionized public administration by enabling efficient service delivery, improved workflows, and enhanced transparency. A cornerstone of e-governance is the secure exchange of digital documents, especially PDFs, which are commonly used for official communication. However, the growing reliance on digital documentation has exposed these systems to sophisticated cyber threats, such as shadow attacks and policy tampering. Shadow attacks exploit the flexibility of the PDF specification to bypass the integrity of digitally signed files, while policy tampering involves malicious manipulation of access controls to compromise document security. To address these challenges, this paper proposes a blockchain-based framework that ensures the validity, integrity, and security of PDFs in e-governance environments. By leveraging blockchain's immutable and tamper-resistant properties, the system securely stores access policies and document metadata, making policy tampering infeasible even in the face of Man-in-the-Middle (MITM) attacks. The framework employs Policy-based Governance infrastructure to enhance the confidentiality of digital signatures. The proposed solution is evaluated for efficiency and cost-effectiveness, showing a tamper proof method compared to traditional methods providing robust protection against cyber threats. This system offers a collaborative, secure environment for e-governance, ensuring the integrity of document exchanges and the trustworthiness of government operations.

Keywords: E-governance, Blockchain, PDF Security, Shadow Attacks, Policy-based governance

Received: 05 Sep 2025; Accepted: 23 Oct 2025.

Copyright: © 2025 R and Mishra. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

* Correspondence: Ganesan R, ganesan.r@vit.ac.in

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.