Skip to main content

Authentication of User in Connected Governance Model

  • Conference paper
  • First Online:
Data Science and Analytics (REDSET 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1230))

Abstract

India is striving hard to deliver Citizen centric electronic services within the affordability of populace. For this purpose, service providers have to rely upon internet as public communication medium, which is susceptible to infringement attempts of adversary. To resolve this issue, vital resources like user information should be managed in secure manner. As the state administrator, Government have to play a vital role to gain the trust of user over this electronic service delivery model. To ensure Privacy, Integrity, Non-Repudiation, Authentication (PINA) of electronic transaction, each user (i.e. Citizen) should be uniquely identified from the initial stage of transaction. This approach will prevent unauthorized access of adversary and hence services can be successfully delivered to the intended recipient only. To achieve this objective, in this paper authors have proposed a 3-level user authentication scheme during Citizen to Government to Bank (i.e. C2G2B) type of electronic transaction carried out through a Citizen centric multivariate smart card based connected service delivery model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Biswas, S, Roy, A.: An intrusion detection system based secured electronic service delivery model. In: 3rd International Conference on Electronics Communication and Aerospcace Technology (ICECA 2019), pp. 1316–1321, IEEE, India, June 2019. https://doi.org/10.1109/ICECA.2019.8822016

  2. Roy, A: Smart delivery of multifaceted services through connected governance model. In: 3rd International Conference on Computing Methodologies and Communication (ICCMC 2019), pp. 476–482, IEEE, India, March 2019. https://doi.org/10.1109/ICCMC.2019.8819851

  3. Khatun, R., Bandopadhyay, T., Roy, A.: Data modelling for e-voting system using smart card based e-governance system. Int. J. Inf. Eng. Electron. Bus. 9, 45–52 (2017). https://doi.org/10.5815/ijieeb.2017.02.06

    Article  Google Scholar 

  4. Roy, A., Karforma, S.: UML based modeling of ECDSA for secured and smart e-governance system. In: Computer Science & Information Technology (CS & IT-CSCP 2013), National Conference on Advancement of Computing in Engineering Research (ACER13), pp. 207–222, March 2013. https://doi.org/10.5121/csit.2013.3219. ISSN 2231–5403, ISBN 978-1-921987-11-3

  5. Jin, H., Debiao, H., Jianhua, C.: An identity based digital signature from ECDSA. In: 2010 Second International Workshop on Education Technology and Computer Science, vol. 1, pp. 627–630, March 2010. https://doi.org/10.1109/etcs.2010.159

  6. Yahaya, Y.H., Isa, M.R.M., Aziz, M.I.: Fingerprint biometrics authentication on smart card. In: 2009 Second International Conference on Computer and Electrical Engineering (IEEE), vol. 2, pp. 671–673, December 2009. https://doi.org/10.1109/ICCEE.2009.155

  7. Prabu, M., Shanmugalakshmi, R.: A comparative analysis of signature schemes in a new approach of variant on ecdsa. In: 2009 International Conference on Information and Multimedia Technology (IEEE), pp. 491–494, December 2009. https://doi.org/10.1109/ICIMT.2009.65

  8. Lin, Y., Maozhi, X., Zhiming, Z.: Digital signature systems based on smart card and fingerprint feature. J. Syst. Eng. Electron. 18(4), 825–834 (2007)

    Article  Google Scholar 

  9. Nkomo, P.T., Terzoli, A., Muyingi, H., Krishna Rao, G.S.V.R.: Smart card initiative for south african e-governance - a study. In: 2006 8th International Conference Advanced Communication Technology (IEEE), pp. 2231–2232, February 2006. https://doi.org/10.1109/ICACT.2006.206443

  10. Civico, F.D., Peinado, A.: Low complexity smart card-based physical access control system over IP networks. In: 12th IEEE Mediterranean Electrotechnical Conference, pp. 799–802, May 2004. https://doi.org/10.1109/MELCON.2004.1347052

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abhishek Roy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ghosh, A., Das, T., Majumder, S., Roy, A. (2020). Authentication of User in Connected Governance Model. In: Batra, U., Roy, N., Panda, B. (eds) Data Science and Analytics. REDSET 2019. Communications in Computer and Information Science, vol 1230. Springer, Singapore. https://doi.org/10.1007/978-981-15-5830-6_10

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-5830-6_10

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-5829-0

  • Online ISBN: 978-981-15-5830-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics