Security Trend and Trust in India's E-Governance Framework

Security Trend and Trust in India's E-Governance Framework

Rajiv Ranjan Suman, Bhaskar Mondal, Tarni Mandal
Copyright: © 2022 |Pages: 16
DOI: 10.4018/IJEGR.300775
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In an e-governance framework, the end user frequently falls victim to the digital divide and a lack of required knowledge regarding self-protection against cyber-attacks. The purpose of this research is to examine the threats to the e-governance framework, end users' trust in the security of e-governance applications, and end users' security behaviour on the Internet. Additionally, the research forecasts future trends in various types of security attacks in India. To forecast future trends in various types of security attacks in India, historical data from the CERT-in annual report is gathered (2006 to 2020). To forecast future trends, the AutoRegressive Integrated Moving Average (ARIMA) is applied to the collected data. Additionally, an anonymous survey of 1,000 end users was conducted to ascertain end users' trust in the security of e-governance applications and some end users' security behaviour on the Internet. The research concludes that five of the six attack categories identified by CERT-in will see a consistent increase in the next five years.
Article Preview
Top

1. Introduction

The e-governance system enables electronic communication between various government services via the Internet (Alrubaiq, 2021). These services include transactions between the government and citizens, the government and other governments, and the government and businesses, as well as e-learning, e-procurements, and e-voting. With the increasing availability of the Internet and handheld cellular devices, e-governance is rapidly spreading across geopolitical areas. It frequently transmits the user's critical personal data over the Internet. These records are kept on servers. The data may be eavesdropped on, stolen from, or leaked to unauthorised individuals or adversaries. Such security incidents may not only erode stakeholder trust and privacy, but may also result in financial loss, health loss, service interruptions, and denial of service attacks (Alzahrani, 2017).

Increased infrastructure and lower costs of Internet access have resulted in a significant increase in Internet users in India over the last decade. According to a report by the Telecommunication Regulatory Authority of India (TRAI), Internet users increased by approximately 4% between January and March 2021, reaching 825.30 million (Manchanda, 2021). As a result, an increasing proportion of the population is turning to online commercial, medical, educational, administrative, legal, entertainment, and social services provided by both private and public sectors. However, this has increased the occurrences of data breaches, which result in malicious users capturing confidential and sensitive user data (Shekhar, 2021; Dhwani, 2021).

1.1 What is Security?

In this context, security refers to safeguarding data and other resources within the e-governance framework against unauthorised access, use, tampering, or destruction. Security experts recommend encrypting sensitive data to prevent unauthorised parties from reading it. Data should be encrypted while it is being stored and while it is being moved or transferred between devices and applications (Mondal, 2020). To prevent attackers from tampering with security algorithms, they should be implemented in read-only hardware. The encryption key should be securely stored and managed by the organisation that owns the data. It should never be accessed by untrusted hardware, software, or individuals. No one should be able to access unencrypted data except the authorised user (person or software). A multi-level authentication process should be used to verify the authorised user or software in a secure manner (Turner, 2021).

Reliable data encryption is a well-known method of ensuring data security. A strong security algorithm, on the other hand, requires a reasonable amount of hardware resources in terms of CPU power, memory size, and electric power to run efficiently (Mondal, 2022). In India, over 95% of users access the Internet wirelessly via their mobile phones (Manchanda, 2021). A sizable portion of these users access digital services via low-cost mobile phones with limited battery life. They are, however, expected to respond quickly, as e-governance applications are expected to be heavily utilised in the day-to-day lives of ordinary citizens (Alrubaiq, 2021). Typically, OTPs sent for authentication and consenting to transactions have a validity of thirty seconds to ten minutes. As a result, these devices require security software that is both fast and light on the hardware.

Complete Article List

Search this Journal:
Reset
Volume 20: 1 Issue (2024)
Volume 19: 1 Issue (2023)
Volume 18: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 17: 4 Issues (2021)
Volume 16: 4 Issues (2020)
Volume 15: 4 Issues (2019)
Volume 14: 4 Issues (2018)
Volume 13: 4 Issues (2017)
Volume 12: 4 Issues (2016)
Volume 11: 4 Issues (2015)
Volume 10: 4 Issues (2014)
Volume 9: 4 Issues (2013)
Volume 8: 4 Issues (2012)
Volume 7: 4 Issues (2011)
Volume 6: 4 Issues (2010)
Volume 5: 4 Issues (2009)
Volume 4: 4 Issues (2008)
Volume 3: 4 Issues (2007)
Volume 2: 4 Issues (2006)
Volume 1: 4 Issues (2005)
View Complete Journal Contents Listing