CFP last date
20 December 2024
Reseach Article

Improvised Four Level User Authentication Framework using Biometric Recognition for e-Governance Projects in India: A Security Perspective

Published on November 2014 by Ajeet Singh Poonia, Govind Singh Tanwar
National Conference on Innovations and Recent Trends in Engineering and Technology
Foundation of Computer Science USA
NCIRET - Number 1
November 2014
Authors: Ajeet Singh Poonia, Govind Singh Tanwar
e14aa5ba-9c25-4071-a375-29380eb090d2

Ajeet Singh Poonia, Govind Singh Tanwar . Improvised Four Level User Authentication Framework using Biometric Recognition for e-Governance Projects in India: A Security Perspective. National Conference on Innovations and Recent Trends in Engineering and Technology. NCIRET, 1 (November 2014), 1-4.

@article{
author = { Ajeet Singh Poonia, Govind Singh Tanwar },
title = { Improvised Four Level User Authentication Framework using Biometric Recognition for e-Governance Projects in India: A Security Perspective },
journal = { National Conference on Innovations and Recent Trends in Engineering and Technology },
issue_date = { November 2014 },
volume = { NCIRET },
number = { 1 },
month = { November },
year = { 2014 },
issn = 0975-8887,
pages = { 1-4 },
numpages = 4,
url = { /proceedings/nciret/number1/18617-1902/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Innovations and Recent Trends in Engineering and Technology
%A Ajeet Singh Poonia
%A Govind Singh Tanwar
%T Improvised Four Level User Authentication Framework using Biometric Recognition for e-Governance Projects in India: A Security Perspective
%J National Conference on Innovations and Recent Trends in Engineering and Technology
%@ 0975-8887
%V NCIRET
%N 1
%P 1-4
%D 2014
%I International Journal of Computer Applications
Abstract

e-Governance is the use of internet technology as a platform for exchanging information, providing services and transacting with citizens, businesses, and other arms of government. e-Governance as an administration tool provides a sound strategy to strengthen overall governance. It not only improves accountability, transparency and efficiency of government processes, but also facilitates sustainable and inclusive growth. e-Governance as a societal tool provides a mechanism of direct delivery of public services to the marginal segments of the society in the remotest corners, without having to deal with intermediaries. e-Governance also deals with the sensitive data of governance, so it requires a sound protected, and impenetrable level of security. Along with securing the e-Governance web portal at higher and abstract level, it also requires maintaining the data confidentiality, integrity and availability at user level. Presently the e-Governance web portal in India has issues with the security aspects and is functional using two basic levels of authentication. This paper highlights the problems related with data confidentiality, integrity and availability which are potential reasons for the failure of e-Government Projects in India. Through this paper we intend to provide solution for the user level authentication related to various e-Governance Projects running in India. In the paper, we have also suggested a new security level framework with four layer authentication, synchronised with the unique identification card (Aadhar Card) system. In this context, we have also tried to evaluate the current status of authentication in e-Governance related initiatives in India and future prospects of e-Governance in India.

References
  1. Government of India, Department of Administrative Reforms and Public Grievances, "National e-Governance Plan," accessed Apr. 26, 2012, http://arc. gov. in/11threp/ARC_11thReport_Ch7. pdf, 106.
  2. Maheshwari B. , Uma Kumar V. K et al. E-Governance Portal Effectiveness: Managerial Considerations for Design and Development. Computer Society of India, 2007: p. 1-12.
  3. Sharma S. K. , Gupta J. N. Building Blocks of an E-Government: A Framework. 2003, IGL Global. p. 34-48.
  4. e-Governance Policy for Modernising government through digital democracy in India, Journal of Information Policy 2 (2012): 183-203. Online ISSN: 2158-3897
  5. Aggarwal S. "UID - Challenges, Applicability and Opportunity". pp-1-8.
  6. Sharma S. S. An E-Government Service Framework. 2006. p. 376-378.
  7. Unique identification card project: http://www. UIDAI. gov. in
  8. Ministry of Communication and Information Technology, e-Pramaan: Framework for e-Authentication, Information Technology Editor. 2012, Government Press. p. 18.
  9. CIO, H. K. O. o. G. , 2008 Digital 21 Strategy – Continuing to build on our strength through technology across the community. 2004, Commerce and Economic Development Bureau: Hong Kong.
Index Terms

Computer Science
Information Sciences

Keywords

E-governance Security Service Authentication One-time Password (otp) Backup Replica Copy.