A Blockchain-based Value Added Tax (VAT) System: Saudi Arabia as a Use-Case
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 5
Abstract
Businesses need trust to confidently perform trade among each other. Centralized business models are the only mature solutions available to perform trades over the Internet. However, they have many problems which includes but are not limited to the fact that these create bottleneck on the server as well as requires trusted third parties. Recently, decentralized solutions have gained significant popularity and acceptance for future businesses. The wide acceptance of such systems is indeed due to the trust management among various untrusted business stakeholders. Many solutions have been proposed in this regard to provide de-centralized infrastructure for various business models. A standard solution that is acceptable to the industry is still in demand. Hyperledger umbrella Blockchain projects, that are supported by IBM and many other industry big players are gaining popularity due to its efficient and pluggable design. In this study, the author present the idea of utilizing Blockchain to design a Value-Added Tax (VAT) system for Saudi Arabia’s newly introduced tax system. The reason to select this business model for VAT is twofold. First, it provides an untampered distributed ledger, which cannot be deceived by any party. Each transaction in the system cannot go unnoticed by the smart contract. Sec-ondly, it provides a transparent record, and updates all involved parties regarding each activity performed by stakeholders. The newly proposed system will provide a transparent database of VAT transactions according to our smart contract design and at each stage of supply chain, tax will be deducted and stored on peer-to-peer network via consensus process. The author believes that the proposed solution will have significant impact on VAT collection in the Kingdom of Saudi Arabia.
Authors and Affiliations
Ahmad Alkhodre, Toqeer Ali, Salman Jan, Yazed Alsaawy, Shah Khusro, Muhammad Yasar
Towards Understanding Internet of Things Security and its Empirical Vulnerabilities: A Survey
The Internet of things is no longer a concept; it is a reality already changing our lives. It aims to interconnect almost all daily used devices to help them exchange contextualized data in order to offer services adequa...
Robust R Peak and QRS detection in Electrocardiogram using Wavelet Transform
In this paper a robust R Peak and QRS detection using Wavelet Transform has been developed. Wavelet Transform provides efficient localization in both time and frequency. Discrete Wavelet Transform (DWT) has been used to...
Evaluation of Navigational Aspects of Moodle
Learning Management System (LMS) is an effective platform for communication and collaboration among teachers and students to enhance learning. These LMSs are now widely used in both conventional and virtual and distance...
WE-MQS-VoIP Priority: An enhanced LTE Downlink Scheduler for voice services with the integration of VoIP priority mode
The Long Term Evolution (LTE) is a high data rates and fully All-IP network. It is developed to support well to multimedia services such as Video, VoIP, Gaming, etc. So that, the real-time services such as VoIP, video, e...
Computer Science Approach to Information-Like Artifacts as Exemplified by Memes
Providing information can be expanded to include systems that deliver information-like artifacts. They provide such “things” as advertisements, propaganda pieces, and meme artifacts. Memes are the subject of extensive in...