Object-oriented Metrics Analysis for Implementation of Authentication in Smart Card Based E-governance Mechanism
نویسندگان
چکیده
The gradual scientific enhancements have made the present day society highly technology dependent in nature. To attend this community, nowdays the state owned agencies are extensively using ICT based governance mechanism called Electronic Governance. This paradigm shift from conventional form of governance to electronic form of governance have helped the Government and its Citizenry to a great extent. The administration can launch new developmental project for its Citizenry with less man power, operational cost and more promptness and accuracy. Whereas the Citizenry can access their facilities in-timely manner with ease and transparency. As a natural phenomenon to the real life application of this electronic mechanism, huge data traffic load will be mounted over the servers and the nodes of the system. Eventually the eavesdropper will attempt to breach the entire data transmission process and finally escalate their access to materialize their ill intentions. In this case, the security analyst must prevent the unauthorized access of these services and facilities at any cost. Considering this situation, the authors have already proposed an EGovernance model using object oriented software engineering approach, which is based on a multivariate electronic smart card called Multipurpose Electronic Card (MEC). This smart card will help to uniquely identify its original owner during E-Governance transactions including the financial transactions also. To validate our E-Governance model scientifically, in this paper we have performed the object oriented metrics analysis for authentication of the users using our proposed smart card based E-Governance mechanism.
منابع مشابه
Coupling and Cohesion Analysis for Implementation of Authentication in E-Governance
E-Governance is the electronic mechanism used for deployment of administration by the state-owned agencies under its jurisdiction using Information and Communication Technology (ICT). The security of this entire mechanism is very much susceptible to the attempts of the hackers made initially to breach the system and escalate its privileges in the subsequent phases. To avoid this menace, the E-G...
متن کاملSurvey on Biometric Applications for Implementation of Authentication in Smart Governance
With large scale proliferation of internet and network, more and more people tend to communicate through the insecure network channels. So, to avoid illegal access of confidential and private resources, user authentication is the primary requirement of this age. Nowadays, smart card based authentication schemes have been deployed widely to ensure the legitimacy of a user‟s access request. Smart...
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملA Secure SCAM (Smart Card based Authentication Mechanism)
Recently, Tsai et al. proposed dynamic ID based smart card authentication scheme. This paper demonstrates that Tsai et al.’s scheme fails to provide early wrong password detection, secure password change and protection against insider attack. To overcome, we propose a secure SCAM (Smart Card based Authentication Mechanism) which keeps all previous merits and achieves security and functionality ...
متن کاملSecure Authentication and Document Signature with Cryptogram Smart Card in an Insecure Environment
This paper describes a mechanism for secure online user authentication and document signature with a cryptogram Java card in an insecure environment. The mechanism requires possession of both the card and some secrets, known as Concepts, to authenticate the user. The concepts are represented in image form. A method of secure document signing with the concept-based images is also outlined. Possi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013