An Approach towards Digital Signatures for e-Governance in India

Recent development in e-Governance would like to leverage digital signature capabilities, but facing challenges due to lack in user experience, technology and procedural challenges associated with it. Digital signature as part of Public Key Cryptography is a well-known mechanism to carry out digital authentication and verification of electronic transactions in the online world. This paper discusses a cloud based digital signature initiative taken for enabling e-Authentication and Security in the Transaction Phase of e-Government in India. This paper also describes a digital signature framework termed as Signature Service Middleware (SSM), to realize digital signing of transactions for e-Government and non e-Government applications. Suggested framework takes into consideration an integrated approach to offer web, mobile and cloud based digital signatures for e-Government and non e-Government applications. Currently, SSM is in prototype stage.

[1]  S. Prasanna Ganesan,et al.  An asymmetric authentication protocol for mobile devices using elliptic curve cryptography , 2010, 2010 2nd International Conference on Advanced Computer Control.

[2]  Ayman I. Kayssi,et al.  Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[3]  Jörg Schwenk,et al.  On Technical Security Issues in Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.

[4]  S. Prasanna Ganesan An Authentication Protocol For Mobile Devices Using Hyperelliptic Curve Cryptography , 2010 .

[5]  Gene Tsudik,et al.  Server-Supported Signatures , 1996, ESORICS.

[6]  Johann Großschädl,et al.  A Survey of Public-Key Cryptography on J2ME-Enabled Mobile Devices , 2004, ISCIS.

[7]  Antonio F. Gómez-Skarmeta,et al.  A Survey of Electronic Signature Solutions in Mobile Devices , 2007, J. Theor. Appl. Electron. Commer. Res..

[8]  Wolfgang Bauer,et al.  Minimal-footprint Middleware for the Creation of Qualified Signatures , 2010, WEBIST.

[9]  Deren Chen,et al.  Generating digital signatures on mobile devices , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..

[10]  Antonio Maña,et al.  Practical Mobile Digital Signatures , 2002, EC-Web.

[11]  William M. Daley,et al.  Security Requirements for Cryptographic Modules , 1999 .

[12]  Frank Stajano,et al.  On Storing Private Keys in the Cloud , 2010, Security Protocols Workshop.

[13]  Kanika Lakhani,et al.  Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing , 2010, 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010).

[14]  Deepak Singh Chouhan,et al.  Building Trust In Cloud Using Public Key Infrastructure - A step towards cloud trust , 2012 .

[15]  Gustavus J. Simmons,et al.  Symmetric and Asymmetric Encryption , 1979, CSUR.

[16]  S. K. Dubey,et al.  Security and Privacy in Cloud Computing: A Survey , 2013 .

[17]  Heiko Rossnagel,et al.  Mobile Qualified Electronic Signatures and Certification on Demand , 2004, EuroPKI.

[18]  Sathya Narayanan,et al.  Mobile Device Data Security: A Cryptographic Approach by Outsourcing Mobile Data to Cloud , 2015 .

[19]  Matt Bishop,et al.  What Is Computer Security? , 2003, IEEE Secur. Priv..

[20]  Yehuda Lindell,et al.  Introduction to Modern Cryptography , 2004 .