Open Access   Article Go Back

A Study on Different Applications of M-governance and its Security

D. Banerjee1 , S. K. Karforma2

Section:Survey Paper, Product Type: Journal Paper
Volume-07 , Issue-01 , Page no. 283-288, Jan-2019

Online published on Jan 20, 2019

Copyright © D. Banerjee, S. K. Karforma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: D. Banerjee, S. K. Karforma, “A Study on Different Applications of M-governance and its Security,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.01, pp.283-288, 2019.

MLA Style Citation: D. Banerjee, S. K. Karforma "A Study on Different Applications of M-governance and its Security." International Journal of Computer Sciences and Engineering 07.01 (2019): 283-288.

APA Style Citation: D. Banerjee, S. K. Karforma, (2019). A Study on Different Applications of M-governance and its Security. International Journal of Computer Sciences and Engineering, 07(01), 283-288.

BibTex Style Citation:
@article{Banerjee_2019,
author = {D. Banerjee, S. K. Karforma},
title = {A Study on Different Applications of M-governance and its Security},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {07},
Issue = {01},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {283-288},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=633},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=633
TI - A Study on Different Applications of M-governance and its Security
T2 - International Journal of Computer Sciences and Engineering
AU - D. Banerjee, S. K. Karforma
PY - 2019
DA - 2019/01/20
PB - IJCSE, Indore, INDIA
SP - 283-288
IS - 01
VL - 07
SN - 2347-2693
ER -

           

Abstract

Mobile governance (m-governance) provides all the government services in a convenient manner. The proper establishment of e-governance has a great impact on the initiatives taken for m-governance. M-governance can be presumed as an extension of e-governance. Mobile computing and different communication technology are used for delivering different government services and for accessing information from both the central and state governments. M-governance provides greater flexibility to all the users of different domains. Security is the most important issue in today’s world. This paper gives an overview of the architecture and framework of m-governance as well as various applications of government initiatives on a mobile platform with different aspects of providing security to all these projects. These mobile applications can be successfully instigated and sustained only if the m-governance framework can implement the optimum security structure. It can convince all the participants about its authenticity, integrity, acceptability, as it is solely responsible for securing all the public information from unauthorized access, by using different security techniques like encryption, digital signature, digital certificates, watermarking etc.

Key-Words / Index Term

M-governance Framework, Security, Risks, Mobile Applications

References

[1] Sumanta Bhattacharya, Joyita Goswami (Ghosh), “Study of E-Governance: The Attractive Way to Reach the Citizens”, IJCA Special Issue on “2nd National Conference- Computing, Communication and Sensor Network”, CCSN, 2011.
[2] Dr Ashok Jain, Kiran Ranawat, “M-Governance in India:
Problems and Acceptability”, Imperial Journal of Interdisciplinary Research (IJIR), Vol-3, Issue-1, 2017
[3]https://www.statista.com/statistics/274658/forecast-of-mobile-phone-users-in-india/
[4] Mrs Vaishali Kadu1, Ms.Vijaya Mahesh Bagret2, Mr.Abhishek Verma, “Transforming from e-Governance to M-Governance”, International Journal of Advanced Research in Computer and Communication Engineering” Vol. 4, Issue 2, February 2015.
[5] https://www.2thepoint.in/m-governance-brief/
[6]http://vikaspedia.in/e-governance/mobile-governance/m-governance-in-india
[7]https://apps.mgov.gov.in/descp.do?appid=1430¶m=app.password%20of%20hamraazSolution
[8] Miss. M. Debora, “M-Governance in India: Issues and Initiatives”, International Journal of Computer & Mathematical Sciences, IJCMS, ISSN 2347 – 8527, Volume 7, Issue 2, February 2018
[9] Kumar D, Dr N. Panchanatham “A case study on Cyber Security in E-Governance”, International Research Journal of Engineering and Technology (IRJET), Volume: 02 Issue: 08 | Nov-2015
[10] Abhishek Roy, Sunil Karforma, “A Survey on E-Governance Security”, International Journal Of Computer Engineering And Computer Applications Issn 0974- 4983.
[11] A Roy, S Banik, S Karforma, J Pattanayak, “Object-oriented modelling of IDEA for E-governance security”, Proceedings of International Conference on Computing and Systems 2010, 263-269
[12] Prof. Sunil Karforma and Dr Abhisek Roy, “A survey on digital signatures and its applications”, J. of Comp. and I.T. Vol. 3(1&2), 45-69 (2012). [13] Nikhilesh Barik & Dr Sunil Karforma, ”A Study on Efficient Digital Signature Scheme for E-Governance Security”, Global Journal of Computer Science and Technology, Volume 12, Issue 3, Version 1.0, February 2012
[14] Vishal R. Pancholi, Dr Bhadresh P. Patel, Dr Dilendra Hiran, “A Study on Importance of Digital Signature for E-Governance Schemes”, IJIRST –International Journal for Innovative Research in Science & Technology| Volume 4 | Issue 10 | March 2018, ISSN (online): 2349-6010
[15] M.Suganya and Dr.S. Suganya, “A Fingerprint Biometric Privacy Using Visual Cryptography “, International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056, Volume: 04 Issue: 04 | Apr -2017
[16] Soumendu Banerjee, Sunil Karforma, “Object-Oriented Modeling for Authentication of Certificate in E-Learning Using Digital Watermarking”, International Journal of Advanced Research in Computer Science, Volume 8, Issue 8.
[17] Frank Y.Shih, “Digital watermarking and steganography: Fundamentals and techniques”, CRC Press, London, New York
[18] M. Padma, M. Lakshmi Neelima, “Mobile Cloud Computing: Issues from a Security Perspective”, IJCSMC, Vol. 3, Issue. 5, May 2014.