CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Implementation Strategies for Multifactor Authentication for E-Governance Applications through Restful Webservices

Published on February 2013 by V. Nirmalrani, P. Sakthivel
International Conference on Communication, Computing and Information Technology
Foundation of Computer Science USA
ICCCMIT - Number 3
February 2013
Authors: V. Nirmalrani, P. Sakthivel
40f6a8a8-ffd8-4c81-a196-c0970feb303d

V. Nirmalrani, P. Sakthivel . Implementation Strategies for Multifactor Authentication for E-Governance Applications through Restful Webservices. International Conference on Communication, Computing and Information Technology. ICCCMIT, 3 (February 2013), 41-49.

@article{
author = { V. Nirmalrani, P. Sakthivel },
title = { Implementation Strategies for Multifactor Authentication for E-Governance Applications through Restful Webservices },
journal = { International Conference on Communication, Computing and Information Technology },
issue_date = { February 2013 },
volume = { ICCCMIT },
number = { 3 },
month = { February },
year = { 2013 },
issn = 0975-8887,
pages = { 41-49 },
numpages = 9,
url = { /specialissues/icccmit/number3/10784-1013/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 International Conference on Communication, Computing and Information Technology
%A V. Nirmalrani
%A P. Sakthivel
%T Implementation Strategies for Multifactor Authentication for E-Governance Applications through Restful Webservices
%J International Conference on Communication, Computing and Information Technology
%@ 0975-8887
%V ICCCMIT
%N 3
%P 41-49
%D 2013
%I International Journal of Computer Applications
Abstract

Governance means the exercise of political, economic and administrative authority in the management of a country’s affairs, including citizen’s interests and exercise of their legal rights and obligations. E-governance may be understood as the performance of this governance through the electronic medium in order to facilitate an efficient, speedy and transparent process of disseminating the required information to the public, and other agencies to perform the government administration activities. Authentication is the key to secure e-Governance applications and services. User name and password credentials are used for authenticating and authorizing, which is not sufficient. As Internet is more vulnerable nowadays, this one factor authentication is not secure and it is vulnerable for hacking. Even, in case of RESTful Web services, the current system doesn't provide any security measures except user name and password credentials, even which are hard coded in the invoking applications. This paper proposed a novel and sufficient solution that addresses the authentication in more secure and complex way. The proposed work uses the multi-factor authentication for e-Governance Applications through RESTful web services. Multi-factor Authentication includes One Time Password (OTP), Digital Signatures, extended Token based authentication for web services. Solutions to be delivered as Web services (Component based architecture) with certain access control which serves the following two purposes. First, it secures the application and services, and latter it provides a reusable component for authentication.

References
  1. Reeder, R. W. Schechter, “When the Password Doesn’t Work: Secondary Authentication for Websites”, IEEE Transaction on Security & Privacy, Vol. 9, Issue 2, pp 43 – 49, April 2011.
  2. Xu Chengqiang , Zhang Zhenli , “An integrated One-Time-Password and access control authentication scheme”, 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT 10), Vol. 2, pp. 252 – 254, November 2010.
  3. Dunlu Peng, Chen Li, Huan Huo, “An Extended UsernameToken-based Approach for REST-style Web Service Security Authentication”, 2nd IEEE International Conference on Computer Science and Information Technology, pp 582 – 586, August 2009.
  4. Li Liangzhi, “Research on the E-Government Scheme based on Multi- Technologies and Bi-directional Authentication”, International Conference on Management of e-Commerce and e-Government (ICMECG ’08), pp 124 – 127, October 2008.
  5. Kaleem Iqbal Siddiqui , Raja Iqbal , Tauseef Ahmad Rana , “Qualifier based access to web-services for portal to portal Communication”, proceedings of the International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC ‘05), Vol. 1, pp 138 -144, 2005
  6. http://docs.amazonwebservices.com/AmazonDevPay/latest/DevPayDeveloperGuide/LSAPI_Auth_REST.html
  7. http://www.bouncycastle.org/csharp/resources.html
  8. http://www.akadia.com/services/ssh_test_certificate.html
Index Terms

Computer Science
Information Sciences

Keywords

Authentication E-Governance Access Control Authorization Security