Abstract
DigiLocker, a government of India initiative, provides a free platform to the citizens of India to store and access important personal documents. This platform is implemented by using various open source technologies to deliver a mass solution and contributes back to the ever-growing Indian community. DigiLocker is a weapon for paperless E-governance. It is a platform to issue and verify all types of certificates and documents digitally. Thus gradually eliminate the use of physical documents. In this paper, we have proposed a framework to secure individual information using secured verification method of blockchain-based validation technique. The proposed framework ensures proper validation and verification with a unique hash key. Additionally, Argon2 encryption mechanism is used for securing the hash key in the proposed framework. This will enable a timeline for visibility of the uploaded documents by any authorized person/organization and reduce fraudulent use of documents.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
The “DigiLocker”: A Digital India Initiative. https://digitallocker.gov.in
Vohra, S.M.: Digital India and its impact on Indian economy. SEMCOM Manag. Technol. Rev. (2018)
Bandgar, V.B.: Government initiatives for digital India. J. Adv. Libr. Sci. 6(1), 328–335 (2019)
Rathore, S., Panwar, A.: Digital-locker services in India: an assessment of user adoption and challenges. In: Leveraging Digital Innovation for Governance, Public Administration, and Citizen Services: Emerging Research and Opportunities, pp. 101–131. IGI Global (2020)
Ramya, U.M., Sindhuja, P., Atsaya, R.A., Dharani, B.B., Golla, S.M.V.: Reducing forgery in land registry system using blockchain technology. In: International Conference on Advanced Informatics for Computing Research, pp. 725–734. Springer, Singapore (2018)
Pal, S.K.: Changing technological trends for E-governance. In: E-governance in India, pp. 79–105. Palgrave Macmillan, Singapore (2019)
Ghodke, A.V., Dagade, R.V.: Electronic secure vehicle verification system using advanced digilocker system. In: 2018 3rd International Conference for Convergence in Technology (I2CT), pp. 1–4. IEEE (2018)
Kalra, R., Verma, R., Nasa, C.: Aadhaar Thumb: one Platform to all Services (2018)
Mehra, A., Lokam, S., Jain, A., Sivathanu, M., Singanamalla, S., ONeill, J.: Vishrambh: trusted philanthropy with end-to-end transparency. In: HCI for Blockchain: a CHI 2018 Workshop on Studying, Critiquing, Designing and Envisioning Distributed Ledger Technologies, Montreal, QC, Canada (2018)
Kumar, R., Kumar, S., Tiwari, S.K.: Adoption of free and open source software in India. Int. J. Appl. Eng. Res. 13(16), 12725–12731 (2018)
Kumar, V., Chaturvedi, A., Dave, M.: A solution to secure personal data when Aadhaar is linked with DigiLocker. Int. J. Comput. Netw. Inf. Secur. 10(5), 37–44 (2018)
Valois, M., Lacharme, P., Le Bars, J.M.: Performance of password guessing enumerators under cracking conditions. In: IFIP International Conference on ICT Systems Security and Privacy Protection, pp. 67–80. Springer, Cham (2019)
Nielson, S.J., Monson, C.K.: More symmetric crypto: authenticated encryption and kerberos. In: Practical Cryptography in Python, pp. 249–292. Apress, Berkeley, CA (2019)
Biryukov, A., Dinu, D., Khovratovich, D.: Argon2: new generation of memory-hard functions for password hashing and other applications. In: 2016 IEEE European Symposium on Security and Privacy (EuroS and P), pp. 292–302. IEEE (2016)
Aggarwal, A., Chaphekar, P., Mandrekar, R.: Cryptanalysis of bcrypt and SHA-512 using distributed processing over the cloud. Int. J. Comput. Appl. 128(16) (2015)
Malvoni, K., Knezovic, J.: Are your passwords safe: energy efficient bcrypt cracking with low-cost parallel hardware. In: 8th USENIX Workshop on Offensive Technologies (2014)
Wiemer, F., Zimmermann, R.: High-speed implementation of bcrypt password search using special-purpose hardware. In: 2014 International Conference on ReConFigurable Computing and FPGAs (ReConFig14), pp. 1–6. IEEE (2014)
Choe, J., Moreshet, T., Bahar, R.I., Herlihy, M.: Attacking memory-hard scrypt with near-data-processing (2019)
Josefsson, S.: The memory-hard Argon2 password hash function. memory (2015)
Maliberan, E.V.: Modified SHA1: a hashing solution to secure web applications through login authentication. Int. J. Commun. Netw. Inf. Secur. 11(1), 36–41 (2019)
Kumar, V., Chaturvedi, A., Dave, M.: A solution to secure personal data when Aadhaar is linked with DigiLocker. Int. J. Comput. Netw. Inf. Secur. 10(5), 37–44 (2018)
Wetzels, J.: Open sesame: The password hashing competition and Argon2 (2016). arXiv:1602.03097
VS, R., Raj, V.C., Eswaran, S., RU, S.: Optimization of digitalized document verification using e-governance service delivery platform (e-SDP). Int. J. Appl. Eng. Res. 11(4), 2531–2539 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sethy, A., Ray, A. (2020). Leveraging Blockchain as a Solution for Security Issues and Challenges of Paperless E-Governance Application. In: Das, H., Pattnaik, P., Rautaray, S., Li, KC. (eds) Progress in Computing, Analytics and Networking. Advances in Intelligent Systems and Computing, vol 1119. Springer, Singapore. https://doi.org/10.1007/978-981-15-2414-1_65
Download citation
DOI: https://doi.org/10.1007/978-981-15-2414-1_65
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-2413-4
Online ISBN: 978-981-15-2414-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)