ABSTRACT
Recent development in e-Governance would like to leverage digital signature capabilities, but facing challenges due to lack in user experience, technology and procedural challenges associated with it. Digital signature as part of Public Key Cryptography is a well-known mechanism to carry out digital authentication and verification of electronic transactions in the online world. This paper discusses a cloud based digital signature initiative taken for enabling e-Authentication and Security in the Transaction Phase of e-Government in India. This paper also describes a digital signature framework termed as Signature Service Middleware (SSM), to realize digital signing of transactions for e-Government and non e-Government applications. Suggested framework takes into consideration an integrated approach to offer web, mobile and cloud based digital signatures for e-Government and non e-Government applications. Currently, SSM is in prototype stage.
- A. Mana and S. Matamoros. Practical Mobile Digital Signatures. Proceedings of the Third International Conference on E-Commerce and Web Technologies(EC-WEB). Sep. 2002, pp. 224--233. Google ScholarDigital Library
- Antonio Ruiz-Martínez, Daniel Sánchez-Martínez, María Martínez-Montesinos and Antonio F. Gómez-Skarmeta. A survey of electronic signature solutions in mobile devices. Journal of Theoretical and Applied Electronic Commerce Research. 2-3 Dec 2007, 94--109. Google ScholarDigital Library
- Baum, C., & Maio, A.D. (2000). Gartner's four phases of e-government model. Gartner Group Inc., Stamford.Google Scholar
- Ganesan, S.P. An Authentication Protocol for Mobile Devices Using Hyperelliptic Curve Cryptography. International Journal on Network Security. Vol. 02, No. 01, Jan 2011Google Scholar
- Ganesan, S.P. An Asymmetric Authentication Protocol for Mobile Devices using Elliptic Curve Cryptography. 2nd International Conference on Advanced Computer Control (ICACC), 2010. Vol.4, pp. 107--109, 27-29 March 2010Google ScholarCross Ref
- G. J. Simmons. Symmetric and Asymmetric Encryption. ACM Computing Surveys, Vol. 11 Issue 4, pp. 305--330, 1979 Google ScholarDigital Library
- H. Kharche and D. S. Chouhan. Building Trust In Cloud Using Public Key Infrastructure -A step towards cloud trust. International Journal of Advanced Computer Science and Applications. Vol. 3, pp. 26--31, Mar. 2012Google ScholarCross Ref
- H. Rossnagel. Mobile Qualified Electronic Signatures and Certification on Demand. Proc. 1st European PKI Workshop Research and Applications. pp.274--286 Jun. 2004Google ScholarCross Ref
- Itani, W., Kayssi, A., Chenab. A. Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures. Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, 2009. pp.711--716, 12-14 Dec. 2009 Google ScholarDigital Library
- J. Anderson, F. Stajano. On Storing Private Keys in the Cloud. Extended Abstract. http://www.cl.cam.ac.uk/~jra40/publications/2010-SPW-key-storage.pdf {retrieved: Sep 2015}.Google Scholar
- J. Brown and P. Robinson. PKI Reborn in the Cloud. Conference slides, RSA Conference Europe. Oct. 2011, http://365.rsaconference.com/docs/DOC-3037 {retrieved: September 2015}.Google Scholar
- J. Heiser and M. Nicolett. Assessing the security risks of cloud computing. Gartner Report, 2009. {Online}. Available: http://www.gartner.com/DisplayDocument?id=685308Google Scholar
- Jensen, M., Schwenk, J., Gruschka, N., Iacono, L.L. On Technical Security Issues in Cloud Computing. IEEE International Conference on Cloud Computing, 2009. pp.109--116, 21-25 Sept. 2009 Google ScholarDigital Library
- M. Bellare and P. Rogaway. Introduction to Modern Cryptography. 2005.Google Scholar
- M. Bishop. What is Computer Security. IEEE Security Privacy. Vol. 1 Issue 1, pp. 67--69, 2003. Google ScholarDigital Library
- M. Centner, C. Orthacker and W. Bauer. Minimal-footprint Middleware for the Creation of Qualified Signatures. International Conference on Web Information Systems and Technologies(WEBIST 2010). pp. 64--69, Apr. 2010.Google Scholar
- Minqi Zhou; Rong Zhang; Wei Xie; Weining Qian; Aoying Zhou. Security and Privacy in Cloud Computing: A Survey. Sixth International Conference on Semantics Knowledge and Grid (SKG). 2010, pp. 105--112, 1-3 Nov. 2010 Google ScholarDigital Library
- N. Asokan, G.Tsudik, and M. Waidner. Server-Supported Signatures. Lecture Notes in Computer Science, Vol. 1146, pp. 131--143, 1997. Google ScholarDigital Library
- S. Tillich and J. Großschädl. A survey of public-key cryptography on j2me-enabled mobile devices. Lecture Notes in Computer Science, Vol. 3280, pp. 935--944, 2004.Google ScholarCross Ref
- Somani, U.; Lakhani, K.; Mundra, M. Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing. 1st International Conference on Parallel Distributed and Grid Computing (PDGC), 2010, pp. 211--216, 28-30 Oct. 2010Google ScholarCross Ref
- Sujithra, M., Padmavathi, G., Narayanan, Sathya. Mobile Device Data Security: A Cryptographic Approach by Outsourcing Mobile Data to Cloud, International Conference on Graph Algorithms, High Performance Implementations and Its Applications (ICGHIA), pp 480--485, 2015Google ScholarCross Ref
- Wojciech Kinastowski. Digital Signature as a Cloud-based Service. The Fourth International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING). Vol. 1, pp. 68--72, 2013Google Scholar
- Y. Lei, D. Chen, and Z. Jiang. Generating digital signatures on mobile devices. 18th International Conference on Advanced Information Networking and Applications. Vol. 2 Issue 1, pp. 532--535, 2004. Google ScholarDigital Library
- https://digitallocker.gov.in/Google Scholar
- http://www.cca.gov.in/cca/?q=eSign.htmlGoogle Scholar
- https://uidai.gov.in/Google Scholar
- https://uidai.gov.in/auth.htmlGoogle Scholar
- https://uidai.gov.in/fi-e-kyc.htmlGoogle Scholar
- https://en.wikipedia.org/wiki/Service-oriented_architectureGoogle Scholar
- http://www.cca.gov.in/cca/sites/default/files/files/eSign-API%20v1.0.pdfGoogle Scholar
- http://www.cca.gov.inGoogle Scholar
- Security requirements for cryptographic modules, FIPS PUB 140-2, NIST, Dec. 2002.Google Scholar
- http://www.cca.gov.in/cca/sites/default/files/files/eSign_gazette_notification.pdfGoogle Scholar
- https://en.wikipedia.org/wiki/Certificate_signing_requestGoogle Scholar
- https://authportal.uidai.gov.in/static/Authentication%200032%20-%20e-KYC%20API%20Document%20Version%201.0.pdfGoogle Scholar
- www.ejbca.org/Google Scholar
- https://nss-crypto.org/Google Scholar
- https://esign.cdac.inGoogle Scholar
- https://en.wikipedia.org/wiki/Representational_state_transferGoogle Scholar
Recommendations
Moving Beyond Digital Literacy and Towards e-Governance in Rural India
ICEGOV '17: Proceedings of the Special Collection on eGovernment Innovations in IndiaThe ongoing Digital India Programme envisions universal digital literacy. This reflexive piece considers the context of this bold declaration to universalize digital literacy in rural India. We present civil society perspective on social challenges of ...
Proxy Confirmation Signatures
The undeniable signature, introduced by Chaum et al. in 1989, provides a nice property that the signer has an additional control over who will benefit from being convinced by the signature. However, a conspicuous drawback of undeniable signature is that ...
Digital India, e-Governance and Common People: How Connected are These in Access Layer of Smart Village?
ICEGOV '17: Proceedings of the 10th International Conference on Theory and Practice of Electronic GovernancePolicy on "Digital India" (DI) envisages national level focus in rendering services to citizens in India. This focus plans for convergence of all possible services through a digital backbone. National e-Governance Plan (NeGP) has evolved since its ...
Comments