skip to main content
10.1145/2846012.2846014acmotherconferencesArticle/Chapter ViewAbstractPublication PagesegoseConference Proceedingsconference-collections
research-article

An Approach towards Digital Signatures for e-Governance in India

Authors Info & Claims
Published:24 November 2015Publication History

ABSTRACT

Recent development in e-Governance would like to leverage digital signature capabilities, but facing challenges due to lack in user experience, technology and procedural challenges associated with it. Digital signature as part of Public Key Cryptography is a well-known mechanism to carry out digital authentication and verification of electronic transactions in the online world. This paper discusses a cloud based digital signature initiative taken for enabling e-Authentication and Security in the Transaction Phase of e-Government in India. This paper also describes a digital signature framework termed as Signature Service Middleware (SSM), to realize digital signing of transactions for e-Government and non e-Government applications. Suggested framework takes into consideration an integrated approach to offer web, mobile and cloud based digital signatures for e-Government and non e-Government applications. Currently, SSM is in prototype stage.

References

  1. A. Mana and S. Matamoros. Practical Mobile Digital Signatures. Proceedings of the Third International Conference on E-Commerce and Web Technologies(EC-WEB). Sep. 2002, pp. 224--233. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Antonio Ruiz-Martínez, Daniel Sánchez-Martínez, María Martínez-Montesinos and Antonio F. Gómez-Skarmeta. A survey of electronic signature solutions in mobile devices. Journal of Theoretical and Applied Electronic Commerce Research. 2-3 Dec 2007, 94--109. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Baum, C., & Maio, A.D. (2000). Gartner's four phases of e-government model. Gartner Group Inc., Stamford.Google ScholarGoogle Scholar
  4. Ganesan, S.P. An Authentication Protocol for Mobile Devices Using Hyperelliptic Curve Cryptography. International Journal on Network Security. Vol. 02, No. 01, Jan 2011Google ScholarGoogle Scholar
  5. Ganesan, S.P. An Asymmetric Authentication Protocol for Mobile Devices using Elliptic Curve Cryptography. 2nd International Conference on Advanced Computer Control (ICACC), 2010. Vol.4, pp. 107--109, 27-29 March 2010Google ScholarGoogle ScholarCross RefCross Ref
  6. G. J. Simmons. Symmetric and Asymmetric Encryption. ACM Computing Surveys, Vol. 11 Issue 4, pp. 305--330, 1979 Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. H. Kharche and D. S. Chouhan. Building Trust In Cloud Using Public Key Infrastructure -A step towards cloud trust. International Journal of Advanced Computer Science and Applications. Vol. 3, pp. 26--31, Mar. 2012Google ScholarGoogle ScholarCross RefCross Ref
  8. H. Rossnagel. Mobile Qualified Electronic Signatures and Certification on Demand. Proc. 1st European PKI Workshop Research and Applications. pp.274--286 Jun. 2004Google ScholarGoogle ScholarCross RefCross Ref
  9. Itani, W., Kayssi, A., Chenab. A. Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures. Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, 2009. pp.711--716, 12-14 Dec. 2009 Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Anderson, F. Stajano. On Storing Private Keys in the Cloud. Extended Abstract. http://www.cl.cam.ac.uk/~jra40/publications/2010-SPW-key-storage.pdf {retrieved: Sep 2015}.Google ScholarGoogle Scholar
  11. J. Brown and P. Robinson. PKI Reborn in the Cloud. Conference slides, RSA Conference Europe. Oct. 2011, http://365.rsaconference.com/docs/DOC-3037 {retrieved: September 2015}.Google ScholarGoogle Scholar
  12. J. Heiser and M. Nicolett. Assessing the security risks of cloud computing. Gartner Report, 2009. {Online}. Available: http://www.gartner.com/DisplayDocument?id=685308Google ScholarGoogle Scholar
  13. Jensen, M., Schwenk, J., Gruschka, N., Iacono, L.L. On Technical Security Issues in Cloud Computing. IEEE International Conference on Cloud Computing, 2009. pp.109--116, 21-25 Sept. 2009 Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. Bellare and P. Rogaway. Introduction to Modern Cryptography. 2005.Google ScholarGoogle Scholar
  15. M. Bishop. What is Computer Security. IEEE Security Privacy. Vol. 1 Issue 1, pp. 67--69, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. M. Centner, C. Orthacker and W. Bauer. Minimal-footprint Middleware for the Creation of Qualified Signatures. International Conference on Web Information Systems and Technologies(WEBIST 2010). pp. 64--69, Apr. 2010.Google ScholarGoogle Scholar
  17. Minqi Zhou; Rong Zhang; Wei Xie; Weining Qian; Aoying Zhou. Security and Privacy in Cloud Computing: A Survey. Sixth International Conference on Semantics Knowledge and Grid (SKG). 2010, pp. 105--112, 1-3 Nov. 2010 Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. N. Asokan, G.Tsudik, and M. Waidner. Server-Supported Signatures. Lecture Notes in Computer Science, Vol. 1146, pp. 131--143, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. S. Tillich and J. Großschädl. A survey of public-key cryptography on j2me-enabled mobile devices. Lecture Notes in Computer Science, Vol. 3280, pp. 935--944, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  20. Somani, U.; Lakhani, K.; Mundra, M. Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing. 1st International Conference on Parallel Distributed and Grid Computing (PDGC), 2010, pp. 211--216, 28-30 Oct. 2010Google ScholarGoogle ScholarCross RefCross Ref
  21. Sujithra, M., Padmavathi, G., Narayanan, Sathya. Mobile Device Data Security: A Cryptographic Approach by Outsourcing Mobile Data to Cloud, International Conference on Graph Algorithms, High Performance Implementations and Its Applications (ICGHIA), pp 480--485, 2015Google ScholarGoogle ScholarCross RefCross Ref
  22. Wojciech Kinastowski. Digital Signature as a Cloud-based Service. The Fourth International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING). Vol. 1, pp. 68--72, 2013Google ScholarGoogle Scholar
  23. Y. Lei, D. Chen, and Z. Jiang. Generating digital signatures on mobile devices. 18th International Conference on Advanced Information Networking and Applications. Vol. 2 Issue 1, pp. 532--535, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. https://digitallocker.gov.in/Google ScholarGoogle Scholar
  25. http://www.cca.gov.in/cca/?q=eSign.htmlGoogle ScholarGoogle Scholar
  26. https://uidai.gov.in/Google ScholarGoogle Scholar
  27. https://uidai.gov.in/auth.htmlGoogle ScholarGoogle Scholar
  28. https://uidai.gov.in/fi-e-kyc.htmlGoogle ScholarGoogle Scholar
  29. https://en.wikipedia.org/wiki/Service-oriented_architectureGoogle ScholarGoogle Scholar
  30. http://www.cca.gov.in/cca/sites/default/files/files/eSign-API%20v1.0.pdfGoogle ScholarGoogle Scholar
  31. http://www.cca.gov.inGoogle ScholarGoogle Scholar
  32. Security requirements for cryptographic modules, FIPS PUB 140-2, NIST, Dec. 2002.Google ScholarGoogle Scholar
  33. http://www.cca.gov.in/cca/sites/default/files/files/eSign_gazette_notification.pdfGoogle ScholarGoogle Scholar
  34. https://en.wikipedia.org/wiki/Certificate_signing_requestGoogle ScholarGoogle Scholar
  35. https://authportal.uidai.gov.in/static/Authentication%200032%20-%20e-KYC%20API%20Document%20Version%201.0.pdfGoogle ScholarGoogle Scholar
  36. www.ejbca.org/Google ScholarGoogle Scholar
  37. https://nss-crypto.org/Google ScholarGoogle Scholar
  38. https://esign.cdac.inGoogle ScholarGoogle Scholar
  39. https://en.wikipedia.org/wiki/Representational_state_transferGoogle ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    EGOSE '15: Proceedings of the 2015 2nd International Conference on Electronic Governance and Open Society: Challenges in Eurasia
    November 2015
    271 pages
    ISBN:9781450340700
    DOI:10.1145/2846012

    Copyright © 2015 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 24 November 2015

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    EGOSE '15 Paper Acceptance Rate43of63submissions,68%Overall Acceptance Rate146of237submissions,62%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader