Call for Paper - May 2019 Edition
IJCA solicits original research papers for the May 2019 Edition. Last date of manuscript submission is April 20, 2019. Read More

Improvised Four Level User Authentication Framework using Biometric Recognition for e-Governance Projects in India: A Security Perspective

Print
PDF
IJCA Proceedings on National Conference on Innovations and Recent Trends in Engineering and Technology
© 2014 by IJCA Journal
NCIRET - Number 1
Year of Publication: 2014
Authors:
Ajeet Singh Poonia
Govind Singh Tanwar

Ajeet Singh Poonia and Govind Singh Tanwar. Article: Improvised Four Level User Authentication Framework using Biometric Recognition for e-Governance Projects in India: A Security Perspective. IJCA Proceedings on National Conference on Innovations and Recent Trends in Engineering and Technology NCIRET(1):1-4, November 2014. Full text available. BibTeX

@article{key:article,
	author = {Ajeet Singh Poonia and Govind Singh Tanwar},
	title = {Article: Improvised Four Level User Authentication Framework using Biometric Recognition for e-Governance Projects in India: A Security Perspective},
	journal = {IJCA Proceedings on National Conference on Innovations and Recent Trends in Engineering and Technology},
	year = {2014},
	volume = {NCIRET},
	number = {1},
	pages = {1-4},
	month = {November},
	note = {Full text available}
}

Abstract

e-Governance is the use of internet technology as a platform for exchanging information, providing services and transacting with citizens, businesses, and other arms of government. e-Governance as an administration tool provides a sound strategy to strengthen overall governance. It not only improves accountability, transparency and efficiency of government processes, but also facilitates sustainable and inclusive growth. e-Governance as a societal tool provides a mechanism of direct delivery of public services to the marginal segments of the society in the remotest corners, without having to deal with intermediaries. e-Governance also deals with the sensitive data of governance, so it requires a sound protected, and impenetrable level of security. Along with securing the e-Governance web portal at higher and abstract level, it also requires maintaining the data confidentiality, integrity and availability at user level. Presently the e-Governance web portal in India has issues with the security aspects and is functional using two basic levels of authentication. This paper highlights the problems related with data confidentiality, integrity and availability which are potential reasons for the failure of e-Government Projects in India. Through this paper we intend to provide solution for the user level authentication related to various e-Governance Projects running in India. In the paper, we have also suggested a new security level framework with four layer authentication, synchronised with the unique identification card (Aadhar Card) system. In this context, we have also tried to evaluate the current status of authentication in e-Governance related initiatives in India and future prospects of e-Governance in India.

References

  • Government of India, Department of Administrative Reforms and Public Grievances, "National e-Governance Plan," accessed Apr. 26, 2012, http://arc. gov. in/11threp/ARC_11thReport_Ch7. pdf, 106.
  • Maheshwari B. , Uma Kumar V. K et al. E-Governance Portal Effectiveness: Managerial Considerations for Design and Development. Computer Society of India, 2007: p. 1-12.
  • Sharma S. K. , Gupta J. N. Building Blocks of an E-Government: A Framework. 2003, IGL Global. p. 34-48.
  • e-Governance Policy for Modernising government through digital democracy in India, Journal of Information Policy 2 (2012): 183-203. Online ISSN: 2158-3897
  • Aggarwal S. "UID - Challenges, Applicability and Opportunity". pp-1-8.
  • Sharma S. S. An E-Government Service Framework. 2006. p. 376-378.
  • Unique identification card project: http://www. UIDAI. gov. in
  • Ministry of Communication and Information Technology, e-Pramaan: Framework for e-Authentication, Information Technology Editor. 2012, Government Press. p. 18.
  • CIO, H. K. O. o. G. , 2008 Digital 21 Strategy – Continuing to build on our strength through technology across the community. 2004, Commerce and Economic Development Bureau: Hong Kong.