Advertisement

Leveraging Blockchain as a Solution for Security Issues and Challenges of Paperless E-Governance Application

  • Ambica SethyEmail author
  • Abhishek Ray
Conference paper
  • 16 Downloads
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1119)

Abstract

DigiLocker, a government of India initiative, provides a free platform to the citizens of India to store and access important personal documents. This platform is implemented by using various open source technologies to deliver a mass solution and contributes back to the ever-growing Indian community. DigiLocker is a weapon for paperless E-governance. It is a platform to issue and verify all types of certificates and documents digitally. Thus gradually eliminate the use of physical documents. In this paper, we have proposed a framework to secure individual information using secured verification method of blockchain-based validation technique. The proposed framework ensures proper validation and verification with a unique hash key. Additionally, Argon2 encryption mechanism is used for securing the hash key in the proposed framework. This will enable a timeline for visibility of the uploaded documents by any authorized person/organization and reduce fraudulent use of documents.

Keywords

Aadhaar authentication Argon2id Blockchain security DigiLocker Data analytics Ethereum 

References

  1. 1.
    The “DigiLocker”: A Digital India Initiative. https://digitallocker.gov.in
  2. 2.
    Vohra, S.M.: Digital India and its impact on Indian economy. SEMCOM Manag. Technol. Rev. (2018)Google Scholar
  3. 3.
    Bandgar, V.B.: Government initiatives for digital India. J. Adv. Libr. Sci. 6(1), 328–335 (2019)Google Scholar
  4. 4.
    Rathore, S., Panwar, A.: Digital-locker services in India: an assessment of user adoption and challenges. In: Leveraging Digital Innovation for Governance, Public Administration, and Citizen Services: Emerging Research and Opportunities, pp. 101–131. IGI Global (2020)Google Scholar
  5. 5.
    Ramya, U.M., Sindhuja, P., Atsaya, R.A., Dharani, B.B., Golla, S.M.V.: Reducing forgery in land registry system using blockchain technology. In: International Conference on Advanced Informatics for Computing Research, pp. 725–734. Springer, Singapore (2018)Google Scholar
  6. 6.
    Pal, S.K.: Changing technological trends for E-governance. In: E-governance in India, pp. 79–105. Palgrave Macmillan, Singapore (2019)Google Scholar
  7. 7.
    Ghodke, A.V., Dagade, R.V.: Electronic secure vehicle verification system using advanced digilocker system. In: 2018 3rd International Conference for Convergence in Technology (I2CT), pp. 1–4. IEEE (2018)Google Scholar
  8. 8.
    Kalra, R., Verma, R., Nasa, C.: Aadhaar Thumb: one Platform to all Services (2018)Google Scholar
  9. 9.
    Mehra, A., Lokam, S., Jain, A., Sivathanu, M., Singanamalla, S., ONeill, J.: Vishrambh: trusted philanthropy with end-to-end transparency. In: HCI for Blockchain: a CHI 2018 Workshop on Studying, Critiquing, Designing and Envisioning Distributed Ledger Technologies, Montreal, QC, Canada (2018)Google Scholar
  10. 10.
    Kumar, R., Kumar, S., Tiwari, S.K.: Adoption of free and open source software in India. Int. J. Appl. Eng. Res. 13(16), 12725–12731 (2018)Google Scholar
  11. 11.
    Kumar, V., Chaturvedi, A., Dave, M.: A solution to secure personal data when Aadhaar is linked with DigiLocker. Int. J. Comput. Netw. Inf. Secur. 10(5), 37–44 (2018)Google Scholar
  12. 12.
    Valois, M., Lacharme, P., Le Bars, J.M.: Performance of password guessing enumerators under cracking conditions. In: IFIP International Conference on ICT Systems Security and Privacy Protection, pp. 67–80. Springer, Cham (2019)Google Scholar
  13. 13.
    Nielson, S.J., Monson, C.K.: More symmetric crypto: authenticated encryption and kerberos. In: Practical Cryptography in Python, pp. 249–292. Apress, Berkeley, CA (2019)Google Scholar
  14. 14.
    Biryukov, A., Dinu, D., Khovratovich, D.: Argon2: new generation of memory-hard functions for password hashing and other applications. In: 2016 IEEE European Symposium on Security and Privacy (EuroS and P), pp. 292–302. IEEE (2016)Google Scholar
  15. 15.
    Aggarwal, A., Chaphekar, P., Mandrekar, R.: Cryptanalysis of bcrypt and SHA-512 using distributed processing over the cloud. Int. J. Comput. Appl. 128(16) (2015)Google Scholar
  16. 16.
    Malvoni, K., Knezovic, J.: Are your passwords safe: energy efficient bcrypt cracking with low-cost parallel hardware. In: 8th USENIX Workshop on Offensive Technologies (2014)Google Scholar
  17. 17.
    Wiemer, F., Zimmermann, R.: High-speed implementation of bcrypt password search using special-purpose hardware. In: 2014 International Conference on ReConFigurable Computing and FPGAs (ReConFig14), pp. 1–6. IEEE (2014)Google Scholar
  18. 18.
    Choe, J., Moreshet, T., Bahar, R.I., Herlihy, M.: Attacking memory-hard scrypt with near-data-processing (2019)Google Scholar
  19. 19.
    Josefsson, S.: The memory-hard Argon2 password hash function. memory (2015)Google Scholar
  20. 20.
    Maliberan, E.V.: Modified SHA1: a hashing solution to secure web applications through login authentication. Int. J. Commun. Netw. Inf. Secur. 11(1), 36–41 (2019)Google Scholar
  21. 21.
    Kumar, V., Chaturvedi, A., Dave, M.: A solution to secure personal data when Aadhaar is linked with DigiLocker. Int. J. Comput. Netw. Inf. Secur. 10(5), 37–44 (2018)Google Scholar
  22. 22.
    Wetzels, J.: Open sesame: The password hashing competition and Argon2 (2016). arXiv:1602.03097
  23. 23.
    VS, R., Raj, V.C., Eswaran, S., RU, S.: Optimization of digitalized document verification using e-governance service delivery platform (e-SDP). Int. J. Appl. Eng. Res. 11(4), 2531–2539 (2016)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.School of Computer Engineering, Kalinga Institute of Industrial TechnologyDeemed to be UniversityBhubaneswarIndia

Personalised recommendations