=Paper=
{{Paper
|id=Vol-2803/paper21
|storemode=property
|title=Mutual recognition mechanism of e-documents and data
exchanging across borders: centralized and decentralized
approaches
|pdfUrl=https://ceur-ws.org/Vol-2803/paper21.pdf
|volume=Vol-2803
|authors=Vladimir N. Kustov,Ekaterina S. Silanteva
}}
==Mutual recognition mechanism of e-documents and data
exchanging across borders: centralized and decentralized
approaches==
Mutual recognition mechanism of e-documents and data
exchanging across borders: centralized and decentralized
approaches
Vladimir N. Kustova, Ekaterina S. Silantevab
a
Saint Petersburg Railway Transport University of Emperor Alexander I, 9 Moskovsky Ave., Saint-Petersburg,
190031, Russia
b
LLC New space of trade, 5 Orlikov lane, 2 Build. 9 Fl. 34 Room, Moscow, 107078, Russia
Abstract
An integral part of a company's business processes global digitalization and automation is
the transition to cross-border electronic legally significant document circulation. This
article is devoted to reviewing two different methods of mutual recognition mechanisms:
centralized and decentralized.
Keywords
Mutual recognition mechanism, e-documents, data exchanging, cross-border, centralized,
decentralized, approaches
1. Introduction The structure overgrew, rising ever higher toward
the sky, which made people extremely happy.
Do you remember the biblical legend [1] that tells Simultaneously, with the tower, the World Flood's
how and why people began to speak different things had to wash away - human pride and vanity-
languages, the Babel Tower legend? For the revived and strengthened.
respondent positively to this question, we will God learned about this tower, and he did not like
refresh the memories, but we will briefly describe people's ideas. However, God did not punish people
those who do not know such a tradition1. by death, but punished them differently: one day,
Once upon a time, all people, Noah's clan when they started to work, people suddenly stopped
descendants who escaped during the Flood in the ark understanding each other's speech. They could not
built by himself and found refuge near the Ararat continue tower building because they began to
Mountains, spoke the same language. Gradually, the quarrel, not understanding what the other wants.
human race grew, acquired new knowledge and Watching this, God decided to help people forcing
skills. Besides, having accumulated specific skills them to leave the city and leave. People left the
luggage, people decided to apply them in practice unfinished tower and settled in different earth parts.
and build a city and build a high tower, to the very Over time, they forgot about their relationship, they
heavens seen from everywhere. had their traditions, language, rites, customs, and the
unfinished city, where the tower was erected, was
called Babylon, which means "mixing."
Models and Methods for Researching Information Systems
in Transport, Dec. 11-12, St. Petersburg, Russia
Why did we remember that? The answer is an
EMAIL: kvnvika@mail.ru (A. 1); the_best_kat@mail.ru (A. 2); orientation toward the world (international, cross-
©️ 2020 Copyright for this paper by its authors. Use permitted under Creative
Commons License Attribution 4.0 International (CC BY 4.0). border) digitalization and automation of many
CEUR Workshop Proceedings (CEUR- business processes. However, despite this, do not
WS.org) forget about the individual states' desire to preserve
150
and develop their language, writing, traditions, straightforward architecture. Nevertheless, it can be
customs, and digital sovereignty. In keeping part of used in cases when several State Parties of the
this digital sovereignty in global digitalization and Framework Agreement on Facilitation of Cross-
automation conditions, the principal contradiction border Paperless Trade in Asia and Pacific
arises: different states' cryptographic standards (Framework Agreement, FA) agree to use the
incompatibility. From time immemorial, every general CA for paperless trade [9].
people have gone along his development line and do The model of this Architecture is presented in
not plan to retreat from it by the current day. Figure 1.
2. Methods of implementation of the
mutual recognition mechanism
based on the centralized
infrastructure
RFC 5217 «Memorandum for Multi-Domain Figure 1. Simple PKI Architecture
Public Key Infrastructure Interoperability» [8]
provides a terminology framework for operational A simple PKI consists of a single CA with a self-
requirements, which can be used by different Public signed certificate that issues End Entities (EEs)
Key Infrastructure (PKI) authorities for establishing certificates. End entity is the subject of a certificate
trust relationships with each other. that is using, or is permitted and able to use, the
RFC 5217 classifies mechanisms of mutual matching private key only for a purpose or purposes
recognition of Trust services based on an other than signing a certificate.
infrastructure of open keys.
2.2. Different Multiple CA Architectures
2.1. Single Certification Authority (CA)
Architecture Trust relations between Certification Authorities
could be classified on the following basis:
So, let's take a closer look the single CA 1) The common use of crypto algorithms;
architecture. 2) Common Policy of certificates.
In this model, the Mutual Recognition Different Multiple CA Architectures is presented
Mechanism (MRM) is provided with trust to the in Table 1.
common Certification Authority. It is the most
Table 1.
Models of the mutual recognition mechanism
The common use of crypto algorithms
Common
policy of Crypto algorithms are commonly Crypto algorithms of at least one party have
certificates used a limitation on the cross-border distribution
(not common use)
• Hierarchical PKI Architecture
• Mesh PKI Architectures Crypto algorithms of at least one party have a
Common • Hybrid PKI Architectures limitation on the cross-border distribution (not
certificate commonly use)
policy
Different Cross-certification with policy Trusted Third Party (TTP)
certificate mapping
policy
In case when the parties use different CA, but all cryptographic algorithms and certificate policy of
participants of interaction commonly use this CA, mutual recognition could be used:
• Hierarchical PKI Architecture;
151
• Mesh PKI Architectures; 5. A PKI member may choose to participate in
• Hybrid PKI Architectures. the PKI domain but restrict or deny trust in one or
In case the parties use different CA cryptographic more other members PKIs of that same PKI domain.
algorithms. Certificate policies in the created chains The establishment of trust relationships has a
of certification are various; cross-certification with direct impact on the trust model of relying parties.
policy mapping can be used for mutual recognition. As a result, consideration must be taken to create and
Two or more PKIs may choose to enter into trust maintain PKI domains to prevent building
relationships with each other. Each PKI retains its inadvertent trust relationships.
own set of Certificate Policy Object Identifier PKI Domain Models are:
(Policy OID) and its own Principal CA for these 1. Unifying Trust Point (Unifying Domain)
relationships. In addition to making a business Model.
decision to consider a trust relationship, each PKI 2. Independent Trust Point Models.
determines the level of trust of each external PKI by 3. Direct Cross-Certification Model.
reviewing external PKI Certificate Policy 4. Bridge Model.
Document(s) and any other PKI governance Trust Models External to PKI Relationships
documentation through a process known as policy remains to consider ways to implement the mutual
mapping. Trust relationships are technically recognition mechanism for cases where other
formalized through the issuance of cross-certificates. cryptography is used in PKI domains. Such methods
Such a collection of two or more PKIs is known as a include:
PKI domain. 1. Trust List Models.
PKI domain: A set of two or more PKIs that have 2. Trust Authority Model.
chosen to enter into trust relationships with each 3. Trusted Third Party Model.
other through the use of cross-certificates. Each PKI Here, the option to use a trusted third party as the
that has entered into the PKI domain is considered a most common and most universal one should be
member of that PKI domain. considered in more detail. The remaining models can
A domain Policy Object Identifier (OID) is a be considered in more fact later.
Policy OID that is shared across a PKI domain. Each The trusted security services provided by the
CA in the PKI domain must be operated under the specialized providers can be used to provide security
domain Policy OID. Each CA may also have its in information interaction. Trusted security services
Policy OID(s) in addition to the domain Policy OID. can perform functions similar to notaries, apostille,
In such a case, the CA must comply with both and trusted delivery in paper documents exchange
policies. The domain Policy OID is used to identify flow. The trusted security services operators must be
the PKI domain. the trusted third parties (TTP) of the information
Policy Mapping: A process by which members of exchange parties. The activities of TTP must be
a PKI domain evaluate the Certificate Policies (CPs) governed by the international law of the States-
and other governance documentation of other participants of the information interaction, or
potential PKI domain members to determine the bilateral agreements of the parties of informational
level of trust that each PKI in the PKI domain places interaction.
on certificates issued by each other PKI in the PKI Thus TTP is the electronic equivalent of notaries,
domain. apostille, and trusted delivery institutions. TTP is not
PKI Domain Properties: an entirely new institute; it continues the tradition of
1. A PKI domain may operate a Bridge CA or a confirming the document's integrity and authenticity.
Unifying CA that defines the domain members by From a legal point of view, the electronic document's
issuing cross-certificates to those members. function must pass from the document owner to a
2. A single PKI may simultaneously belong to third party - the operator of TTP. It is a key
two or more PKI domains. specificity of the informational interface.
3. A PKI domain may contain PKI domains The trust is supported by a warranty of
within its membership. authenticity of electronic documents, financial
4. Two or more PKI domains may enter into a liability for the electronic documents' actuality. It is
trust relationship with each other, creating a new the basic principle relevant for legally significant
PKI domain. They may choose to retain the existing transboundary electronic document circulation when
PKI domains and the new PKI domain or collapse the contractors are far apart and in different
the existing PKI domains into the new PKI domain. jurisdictions.
152
It is a classic solution for providing secure Validation of Digitally Signed (VDS) Document
transmission of information via a non-trusted service is used when a signed document's validity is
channel. asserted.
TTP description was provided in ITU-T The DVCS verifies [3]:
Recommendation X.842 «Information technology – 1. All signatures attached to the signed
Security techniques – Guidelines for the use and document using all appropriate status information
management of trusted third party services.» [4] and public key certificates;
Following this document, а TTP is an organization 2. The mathematical correctness of all
or its agent that provides one or more security signatures attached to the document and checks
services and is trusted by other entities concerning whether the signing entities can be trusted by
these security services' activities. The same validating the full certification path from the signing
document contains the most general description of entities to a trusted point (e.g., the DVCS's CA or the
the TTP services' architecture from different PKI root CA in a hierarchy).
domains. The DVCS may be able to rely on relevant CRLs
One of the most well-known implementations of or may need to supplement this with access to more
the trusted third-party model is Data Validation and current status information from the CAs, for
Certification Server (DVCS) by the example, by accessing an OCSP service, a trusted
recommendations RFC 3029 «Internet X.509 Public directory service, or other DVCS services.
Key Infrastructure. Data Validation and Certification The DVCS will perform verification of all
Server Protocols» [2]. It can be used as one signatures attached to the signed document. A failure
component in building reliable non-repudiation to verify one of the signatures does not necessarily
services. fail the entire validation, and vice versa. A global
One of the protocols realized by the DVCS failure may occur if the document has an insufficient
service is intended for verification of the electronic number of signatures.
documents signed with the digital signature. The
Validation
Validation Signed receipt Authority B
Authority A 5
4
Certificate 1
issuing
Validation
1 request Certificate
3 issuing
Signed receipt Certification
Certification Authority B
Authority A Validation
request
1
1
6 Certificate
Certificate issuing
issuing
2
Legal significant State B
State A document (Sender)
(recipient)
Figure 2. The Diagram of the functioning of MRM based on DVCS for supporting the trust in case of cross-
border exchange of electronic trade-related legal and significant documents
The Diagram of the functioning of MRM based Processing of a request of DVCS received from
on DVCS for supporting the trust in case of cross- user 1 includes the following stages (according to
border exchange of electronic trade-related legal and Figure 2):
significant documents (the sender and the receiver 1. Participants of information interaction are
residents of the different states) is shown in Figure 2. included in their public key infrastructure; that is,
153
they create their key pairs and receive certificates in 5. The various national and international
their Certification Authorities (CAs). requirements to the Certification Authorities may be
2. User B (the resident of the state B) signs the considered as an analogy.
ED of the EDS created according to the national To provide Mutual recognition of trade-related
legislation requirements and sends it to User A. electronic information when PKIs use different,
3. The user A (through a private office (web incompatible between each other Cryptography
interface) or using a special software sends a request measures or their domains have separate legal bases,
to the validation authority A. we should use DVCS functioning by RFC 3029
4. Validation Authority A executes «Internet X.509 Public Key Infrastructure. Data
determination of the cryptographic algorithm using Validation and Certification Server Protocols».
which the EDS is created (the certificate of a key of DVCS receipt allows providing trust between
verification of the EDS is issued) according to the different PKI domains in the case when their cross-
object identifier specified in the certificate of a key certification technically or legally is impossible.
of verification of the EDS and will readdress it to the For correlation of the certificates policy, the
Validation Authority B located in the state B. On it receipt of DVC service can map the Policy in the
using the execution of the sequence of cryptography same manner as it is mapped in cross-certification
conversions check of the received request is procedures.
executed. Following the completed checks, the DVC In the extension of policy mapping, the
receipt signed with the EDS of Validation Authority intermediate Certification Authority guarantees to
B is created. the user of the certificate that it will fulfill general
5. The DVC receipt signed with Validation guarantees and obligations, even although the other
Authority B with the check results is transferred to users of the certification chain work in the different
Validation Authority A. policy areas.
6. Validation Authority A checks the Certification Authority (CA) of the integration
correctness of the DVC receipt accepted from segment should include one or several mappings for
Validation Authority B. At the same time, there is an each set of the policies according to which it has
appeal to the server of service TSP for adding of a issued TTP certificates. This CA shouldn't include
stamp of time in the receipt created by results of mappings for other policies. Thus, the group of
verification of the DVC receipt created by Certification Authority of an integration segment and
Validation Authority B and also check of the status the TTP services using certificates of this CA fulfill
of the certificate of a key of the EDS of Validation the TTE role between domains with the various
Authority B using the appeal to service of check of levels of reliability.
the relevant status of the certificate (OCSP) or According to which Sender of Certification
certificate revocation lists of CAs which issued the authority acts, suppose one or several Certificate
certificate of a key of the EDS of Validation policies are identical to those, by which Certification
Authority B is executed. Validation Authority A Authority of TTP integration segment operates. In
creates the report signed with the certificate of a key that case, these identifiers should be excluded from
of check of Validation Authority A and transfers him the extension of policy mapping but included in the
to User A. extension of certificate policies. Policy mapping has
The requirements for TTP should be the the effect of transforming all policy identifiers in the
following: sender domain's certificates to the identifier of
1. TTP has absolute credibility among the equivalent Policy recognized by the user of the
information exchange participants. certificate (recipient). In this schema identifier of
2. TTP uses the mechanisms of evaluation and equivalent, Policy is described in the receipt of TTP
compensation of damages. service.
3. TTP uses the methods of conflict resolution;
4. TTP provides the necessary guarantees.
154
Figure 3. TTP for the domain with different levels of trust
A distributed network is a type of computer
3. Methods of the mutual recognition network that is spread over different networks. It
provides a single data communication network,
mechanism implementation based which can be managed jointly or separately. Besides
on the decentralized structure shared communication within the network, a
distributed network often also distributes processing.
3.1. Blockchain technology In a distributed network, the responsibilities for data
transactions and computations are not given to any
The required trust level may also be supported by specific node. On the contrary, they are spread
the trust infrastructure, built on a decentralized across the web, which is responsible as a whole for
model. One of the technologies allowing to the results of a given process, like in some biological
implement of a decentralized model is the ecosystems, such as an ant community, where the
blockchain. The idea of blockchain technology is construction of an ants' nest is the result of
simple. Its broader and more encompassing form, independent contributions by each ant. Blockchain
blockchain can be defined as a technology to technology guarantees that the distributed network's
develop trusted processes and data transactions on an overall behavior, programmed to execute a particular
open and distributed network via decentralized process, is trustworthy. In this context, blockchain
consensus among computer systems. tries to respond to contemporary real-world
In its more common, widely used form, «a scenarios' complexity by offering technology and a
blockchain is essentially a distributed database of methodology for designing distributed applications
records or public ledger of all transactions or digital that operate with private data in an openly verifiable
events that have been executed and shared among way.
participating parties.» Each transaction in the public A distributed transactions system based on
ledger is verified by the consensus of most of the blockchain technology by its nature implements a
participants in the system. And, once entered, ledger. This concept is at the core of the regulatory
information can never be erased. The blockchain activities carried out by a wide range of authorities,
contains a certain and verifiable record of every institutions, and businesses. A more transparent,
single transaction ever made. trusted, and globally recognized accounting
155
mechanism of this kind could dramatically facilitate using blockchain technology, creating clear and open
and harmonize processes in e-Business and cross- conditions for their use.
broader trade scenarios. Even if, at the current stage This platform contains various blocks that allow
of development, blockchain technology hasn't served to track-and-trace goods from farm to retailer.
the purpose of trade facilitation directly, it is already These parts are:
clear that, in the next decade, its contribution could • The source of the crop or the
be substantial. These positive expectations shouldn't agricultural process
prevent us from evaluating the limitations of an • Lab Testing information.
international trade approach enabled by blockchain • Organic and Halal Certificates.
technology, for example, in the context of legally • Dispatch Details and Logistics
binding agreements among traders. provider details starting to add value.
• Recording of receipt from the
3.2. Case study: Transparent e-documents and
agricultural source.
data exchange with the use of blockchain • Lab Testing and reports on receipt.
• Halal or Organic certifications or
Blockchain technology in the supply chain can be any other accreditations.
used to monitor costs, labor, losses, and emissions at • Lot or batch numbers and processing
each point in the supply chain. A distributed registry information.
can also be used for verification of authenticity or
• Any contamination reports and
compliance with fair trade rules by providing
holding actions.
information on the origin of the goods. The delivery
• Storage information (temperature
information can be a transaction every time you
and humidity control).
interact with a shipment.
A related technology called «Smart Contract» can • Batch release info and id codes.
be embedded in a block and triggered when a certain • Logistics release info and logistics
condition is met. For example, a payment transfer provider.
can occur automatically when a shipment reaches the • Crop yield, Dietary info for live
customer's location. animals, mortality rates.
• Tagging of live animals.
3.3 PKI and Blockchain: Key study for • Crop Harvesting information and
agriculture value chain (AVC) data tagging, with batch, date of release.
In this article, the authors would like to present • Suppose we are exporting any
the key study for agriculture value chain (AVC) shipping details. Bills of Lading / Airway
based on the combination of PKI and blockchain bills and destination Final Value add to
technologies. the Supply Chain and the most vulnerable to
First, we will start from the decentralized abuse.
approach based on the digital blockchain platform. • Goods in from source or primary
The most convenient way to implement processor.
blockchain technology is to create a digital platform • Recipe formulations and ingredients
that organizes interaction between different groups traceability.
of participants who need to know certain information • Production batch codes and
about each other's activities. The ability to organize production dates.
interaction is essential for forming long-term • Nutritional Information.
productive business relations between the • Storage Information
participants of the agricultural value chain. The idea • Certifications.
of this platform was provided by Evoteq Company. • Issued Barcodes or other identifiers.
The digital platform [5] (see Figure 4) is open to • Expiry date information.
interaction and integration through the cloud, • Logistics Information.
making it accessible to all agricultural value chain • Shipping details dispatch date and
participants. The digital platform architecture can destination.
significantly scale up without loss in quality and • Goods out info.
efficiency that will expand it to new product groups • Vehicle Temperature monitoring.
and new participants of the platform. The platform
provides a high level of trust between participants
156
Figure 4. Blockchain use in the value chain
• Delivery confirmation. 5. Protects the integrity of the products and
• Protecting the consumer. provides the possibility of recalling the
• Goods in and Temperature check. manufacturer's goods to correct defects.
• Expiry date check (remaining 6. Allows checking for compliance with
shelf life complies). special needs (diabetic, organic, Halal goods).
• Storage details. 7. Allows suppliers to track products on the
• EPOS Data. market.
Blockchain platform gives a possibility to 8. Allows users to check the supply chain.
provide supplier managed inventory service and 9. Allows inspectors to verify the validity
develop a complete dietary information database. and acceptability of goods.
The consumer can check the product through 10. Protects the supply chain from
barcoding information. counterfeiting.
Allows the consumer to know where a product The introduction of blockchain technology into
is sold. the track&trace system will enable manufacturers,
The digital platform of the agricultural value importers, and distributors to track their internal
chain can be connected and interact with the processes better.
digital platform of the EAEU. The introduction of a digital track&trace
The economic benefits offered by this cloud platform, according to experts estimates, will
solution can improve the efficiency of the entire achieve 99% accuracy of inventory data compared
value chain. It solves the following tasks: to 40-70% accuracy as it currently stands, which
1. Allows downloading product data at any will optimize production and imports and
stage of the value chain. significantly affect the reduction of the cost of
2. Provides continuous access to data. goods [6].
3. Ensures the integrity and security of the During a pilot program conducted with
supply chain. Walmart, the testing showed that by using
4. Ensures that only proven, legally blockchain to track food, you could reduce the
compliant products are available on store shelves. time it takes to track mango packaging from farm
to store in just two seconds instead of days and
157
weeks. During the pilot, more than 100,000 to build a business network, where the business
mangoes from a Queensland supplier in Northern entity can choose the partner, make deals, find
Australia were withdrawn by Biosecurity SA after investments, etc. These two systems are fully
fruit fly larvae were discovered in mangoes in compatible and provide mutual recognition of e-data
Adelaide's foothills. The responsiveness of the and e-documents via the whole AVC.
recall allowed the organization to maintain its
reputation [7].
So, within a supply chain, blockchain References
technology could be used to monitor costs, labor,
waste, and emissions at every point of the supply [1] Genesis Book. (11: 1-9). URL:
chain, verify the authenticity or fair trade status of http://bibliya-online.ru/chitat-bytie-glava-11/.
products by tracking them from their origin, [2] RFC 3029 "Internet X.509 Public Key
shipping details could constitute a transaction at Infrastructure Data Validation and
every interaction with a shipment – and Certification Server Protocols". URL:
customer(s) would know about it, trigger an action http://www.faqs.org/rfcs/rfc3029.html.
automatically. [3] Product description "TTPS "Litoria DVCS".
However, there is a question: how can we URL:
combine decentralized and centralized http://www.gaz-is.ru/produkty/dokumentoobo
approaches? The answer is - we will use business rot/gis-dvcs.html.
tools: a digital platform for track-and-trace AVC [4] Information technology - Security
and a social network for trusted e-documents techniques - Guidelines for the use and
exchange. management of trusted third party services
A business network is based on a social (X.842). URL:
network plus trusted cross-border e-document https://www.itu.int/rec/T-REC-X.842-200010
flow, based on PKI [8], that allows a customer to -I/en.
build a business network, choose the partner, and [5] Smarttrack. Global supply platform to ensure
make deals, find investments, etc. This network is global supply chain integrity. URL:
fully compatible with AVC based on the https://evoteq.com/en/our-projects/smarttrack.
blockchain system. [6] M. L. Simanovskaya, E. S. Silanteva, The use
Both these systems make AVC transparent and of digital technologies to increase the
business processes simpler. competitiveness of small and medium-sized
businesses in the food sector / / State
4 Conclusion Management: Russia in Global Politics,
Proceedings of the XVII International
The authors reviewed two potential approaches Conference (May 16-May 18, 2019),
to the mutual recognition mechanism: centralized University Book Faculty of Public
and distributed. Suppose Trust services engaged in Administration of Lomonosov Moscow State
document lifecycle (incl. the chain of inter-domain University, Moscow Russia, 2019, pp. 159-
gateways between the document's issuer and 165.
recipient) have different qualification levels. In that [7] Case Study: How Walmart brought
case, the overall level of qualification may be equal unprecedented transparency to the food
to the lowest of them. The level of trust could be supply chain with Hyperledger Fabric. URL:
provided in two different ways: transboundary trust https://www.hyperledger.org/learn/publication
environment and blockchain ecosystem.
s/walmart-case-study.
We discussed a case study on the agriculture
[8] RFC 5217 - Memorandum for Multi-Domain
value chain example. Within a supply chain,
blockchain technology could be used to monitor
Public Key Infrastructure Interoperability».
costs, labor, waste, and emissions at every point of URL: https://tools.ietf.org/html/rfc5217.
the supply chain, verify the authenticity or fair-trade [9] Framework Agreement on Facilitation of
status of products by tracking them from their origin, Cross-border Paperless Trade in Asia and
shipping details could constitute a transaction at Pacific (Framework Agreement, FA) agree to
every interaction with a shipment – and customer(s) use the general CA for paperless trade. URL:
would know about it, trigger an action automatically. https://www.unescap.org/resources/framewor
Social network plus trusted cross-border k-agreement
e-document flow, based on PKI, allows a customer
158
facilitation-cross-border-paperless-trade-asia-
and-pacific-0.
159