Вы находитесь на странице: 1из 6

2014 IEEE 11th International Conference on e-Business Engineering

Digital Signature Modeling in e-Business


Goutam Saha1, Mina Desai2, Arghya Ghosh3, Niladri Saha4
1, 2, 3, 4
Centre for Development of Advanced Computing (C-DAC), Kolkata Plot
E-2/1, Block-GP, Sector - V, Saltlake, Kolkata, India

goutam.saha@cdac.in, mina.desai@cdac.in, arghya.ghosh@cdac.in, niladri.saha@cdac.in

Abstract – The aim of this paper is to solve solution has been developed in accordance with
the problems related to integrity, security, business policies, rules and regulations, so the
authenticity and non-repudiation of prevalent requirement of Business Process Reengineering
ERP based e-business application solution in (BPR) is negligible [1]. Concept mapping
Indian perspective. Traditional approaches and technique has been used to enhance the design
methodologies for implementing e-business aspect of workflow management system.
solution have rarely achieved the requisite
solution to the above problems even with the The implementation is a significant step
role based access control system. We have forward towards the development of a low-cost,
explored a methodology which emphasizes user friendly solution having the movement of
authentication in e-business with design of digital files duly signed electronically, using
intelligent system. It ambitiously replaces the Digital Signature based on PKCS #12
present day written signature authentication standards, in a hierarchical system.
process with digital signatures having full
compliance to integrity, security, authenticity II. OBJECTIVE
and non-repudiation. The design also models The prime objectives of the proposed model
in-depth functionalities, audit trail and keeps was to develop e-business solution with the
track of evidences of document tampering from following benefits:
any sources after the digital signature is placed To computerize each and every processes of the business.
in the system. The model is implemented
successfully and is found to be at par with the To improve efficiency, consistency and effectiveness of
prevalent written signature authentication business processes.
system. We outline the plausible future work to
model it for e-Governance system in Indian To reduce turnaround time.
perspective. To provide effective resource management to improve the
quality of administration.
Keywords: e-business; security; open-source;
e-commerce; digital signature; ERP To reduce processing delays.

I. INTRODUCTION To establish transparency and accountability.


The e-business concept in India is quite
recent and it is now gradually gaining the To improve operational efficiency and decision making by
momentum as well as the importance. The idea the application of IT in all mainstream business processes.
is to carry out business processes via workflow- III. TECHNOLOGIES USED
based application having inbuilt digital
signature implementation. The whole process is A. Digital Signature
conceptually designed to be similar to the The model has embedded digital signatures
manual procedures which eventually reduce the by using asymmetric key cryptography concept.
overheads and increase transparency. Digital signature is analogous to the physical
The implemented model uses workflow signature which proves the ownership of the
management system typically made to improve document. It ensures the authenticity and
various business processes to make it full proof. integrity of a digital document. A valid digital
So the design and development of these signature also assures that the document has
processes must ensure correct, effective and been created by a valid sender and that it had
efficient model to evolve with a better not been altered in transit. The key services
performance oriented workflow management provided by the digital signature include
system. Prerequisite for these activities is to authentication, non-repudiation and integrity.
define the basic processes of a business and Authentication is provided by digital certificate
model them into a workflow system. The issued by a trusted third party. It provides the

978-1-4799-6563-2/14 $31.00 © 2014 IEEE 350


DOI 10.1109/ICEBE.2014.67
identity of a person. Nonrepudiation makes the verification process as depicted in
signer unable to deny that he/she has sent the Section A.
message, signed the document or participated in
a transaction. Integrity ensures that the 3) Non-repudiation: It
document has not been tampered in transit [5- prevents the signer from denying that
6]. he or she has signed it. Public Key
The application of digital signature Infrastructure (PKI) provides digital
implemented two main process namely signing certificates which help the recipient
and verification of digital signature. to know whether the public key really
belongs to an individual. Digital
1) Signing: A suitable certificates bind an individual to a
approved cryptographic hash public key. Time stamping is another
function is used to generate a hash critical component of non-
value from the data at the sender’s repudiation that offers a time stamp
end. It is then encrypted using of digital signature.
signer’s private key to generate
signature. Now, the certificate issued C. Concept Mapping
by a third party along with the The structure of a workflow process was
signature is attached to the data to represented by the use of concept maps
produce digitally signed document. containing the network of commitments where
the nodes represented the loops and the arcs
2) Verification: This is used to represented the dependence relationship
validate the signature. By applying between the loops. This representation was
the hash function on the data at the mandatory in anticipation of identifying
recipient end, hash value is potential process “breakdowns” and
generated. The encrypted signature is “bottlenecks”.
then decrypted using the signer’s
public key, from which we get D. Platform used
another hash value. If these two hash The platform used in the development is
values are equal then the signature is J2EE architecture along with struts framework,
valid. which provided the MVC architecture.
Hibernate is used for object-relational mapping
B. Security (ORM). The solution is platform independent.
By implementing the signing and Linux, Apache and MySQL architecture is used
verification process, recipients were assured of to make the solution low cost.
integrity, authenticity and nonrepudiation. E. Model-View-Controller (MVC)
1) Integrity: Algorithms and The main aim of the MVC architecture is to
procedures used to assure integrity separate the business logic and the application
includes Parity bits or Cyclic data from the presentation layer of the user. The
Redundancy Check (CRC) functions, main components of the MVC architecture are
it checks unintentional modifications Model, View and Controller. Fig 1 depicts the
during transmission; One-way hash MVC architecture.
using SHA-1 creates hash value or 1) Model: It handles the data
message digest for a message of any of an application. It also governs the
length which helps the recipient to business logic but remains unaware
determine if the message has been of the presentation layer.
altered; By the use of Message
Authentication Codes (MAC), it 2) View: It represents the
prevents an attacker from obtaining presentation of the application. It is
the original message, modifying it independent of the business logic and
and attaching a new hash. remains unaffected if the model
changes.
2) Authenticity: Digital
signature provides document 3) Controller: Any request
authenticity by verifying a signer’s sent by the user passes through the
digital identity by signing and controller. It is responsible for
handling the request coming from

350
view and passes it to the model for various subtasks constituting the
appropriate actions. After the action process. Workflow provides a
has been taken the controller is common representation of subtask’s
responsible for directing the structure among the actors involved
appropriate view to the user. in the process.

2) Workflow modeling and


design concept: After workflow
analysis has been done; the number
of tasks, subtasks, roles of actors and
their dependencies, rules governing
various processes and other requisite
parameters of the system are
available. Then one of the two
following models as depicted below,
is applied to design the workflow.

a) The functional model: In


this model a workflow can be seen as
a meta-concept defining the
reusability characteristics of the
modeling elements.
Fig. 1. MVC Architecture
b) Control aspect model: It is
IV. DESIGN ASPECTS OF THE PROPOSED concerned with breaking a work
MODEL process into a number of tasks,
ordering them in a process model and
The implementation methodology includes routing them along predefined
primarily two processes namely, Workflow intended path.
Process Management and
Application of Digital Signatures. The task is again divided into indispensable
subtasks [3]. The basic idea behind the division
A. Workflow Process Management
into subtask is that each subtask within a given
Workflow management systems are task adds some value, i.e., status to the work
typically used to improve various business process. The design aspects of workflow are
processes to automate them without any fully different from the design aspects of
lacunae. Prerequisite for this activity is to define Management Information System (MIS). The
the basic processes of a business, analyse them most effective workflow design consists of a
by workflow process analysis and select a work process design model as well as business
suitable model by the application of design hierarchical model. The work process design
concept. model describes the behavioral aspects with
1) Workflow process analysis: respect to the process, the initial status to the
The analysis of workflow processes intermediate status to its final status. The main
is the most crucial step before element of the process is the task which is the
considering design aspect. It is elementary unit of work inside the workflow.
carried out through observations and Tasks are further divided into subtasks with an
discussions with the actors involved intermediate status and can join a different task
in the work process. The purpose of path also depending on the condition to be
this analysis is to identify the use satisfied and the relevant status achieved.
cases, actors their roles, their Subtask splitting allows the modularization of
interdependencies, the routes the the workflow process and can be designed and
subtask follows in a process and the developed as a self contained activity
rules governing the whole process. fragments. This modular design of workflow
Sometimes Business Process helps in producing reusable workflow
Reengineering (BPR) is required to specifications as the soft specification, which is
remove unnecessary loops in the framed as workflow process. Now the business
process [1]. This is realized by hierarchical model will set up a path for the task
adding, removing or redefining

350
and subtask from department to department to electronic signature technologies do not address
achieve intended status. the integrity of the digital signature itself. Our
model addresses to this problem by encrypting
There must be a task manager mechanism
the digital signature itself by password
which generates the tasks, splits them into
protected private key of the signer. When the
subtasks, assigns status to the tasks, subtask and
document is received by the intended recipient
coordinates the sending and receiving of the
it decrypts the digital signature by using public
tasks from department to department and among
key of the sender. Thus the sender of the
the users of the same department. This sending
document is bound to the contents of the
and receiving of the task is associated with the
document. This addresses the authenticity of the
system generated pdf reports and approval note-
signer. The user enters the system with his/her
sheets to be digitally signed. This is the locus of
password and then only he is able to download
the entry of the application of digital signature
the document to be digitally signed with time-
to digitally sign the system generated reports.
stamping. After he/she puts his/her digital
Such reports are digitally preserved in the
signature on the document, he/she forwards it to
system for future use. The reports here imply
the next level of hierarchy. During forwarding,
any kind of MIS model, documents, forms etc.
the system validates if the UID of the digital
The top down approach is to be assumed signature is bound to the user which, in turn,
during the process modeling, a candidate work gives solution to the problem of nonrepudiation.
flow task as resulted from analysis phase is now The signing and verification process is as
decomposed into subtasks. A set of described in Section III (A) that keeps the
decomposition criteria to be considered are: integrity and security of the document intact.
Subtasks must add status and value to the process.
C. Key Management
Subtask improves readability and
The digital signature solution imbibed in the
understanding the design documents. system uses Public Key Infrastructure (PKI)
Modularization of subtask with concept for the management of complete
development. Each subtask must not have 4-5 simpler of digital signature. The key
ecosystem
tasks. management system has a software module
Flexible. which functions as Certificate Authority (CA)
High cohesion, low coupling. that issues and verifies the digital certificates.
Our solution uses control aspect model for There is a Registration Authority (RA) which
designing the workflow. verifies the identity of the individual and
ensures that the public key is bound to the
3) Implementation: Implementing a individual to which CA has issued digital
workflow for a complex business system and certificate. Fig. 2 depicts the process.
integrating it with an existing legacy
information system requires a specific approach A secured central repository is maintained in
to have expected benefits and seamless the system which is used for validating the key-
execution. The development of such a system user binding. The system has a digital certificate
can be used for modeling any work process and policy defined by the competent authority
identify the critical issues which needs to be legally vetted by Legal Advisor. The policy
addressed for improving the process [2-4]. The defines issuance, distribution, validity, number
work process is broken into subtasks with of bits key, signature algorithm used, storage,
corresponding identification code and status. certificate reissuance and revocation rules.

B. Application of Digital Signature


All official documents, note-sheets, reports
bearing digital signatures are to be circulated in
PDF format in the web based integrated
workflow.

It is a general perception that in the


traditional manual signature system, a signed
document possesses not only integrity of the Fig. 2. Key Management
contents of that document but that the document
signature itself also possesses the element of V. SYSTEM ARCHITECTURE
integrity. The current commercial
The system architecture of the proposed
implementations of digital signature and
model is given in Fig. 3. The diagrammatic

350
representation of the workflow model is Fig. 3. System architecture of the proposed model
provided in Fig. 4.

Fig. 4. Proposed Workflow model

VI.ADVANTAGES AND
DISADVANTAGES
The following are some of the advantages
and disadvantages of the model:
A. Advantages
Conceptually similar to the existing
manual workflow process.
Improves efficiency, consistency and
effectiveness of business processes.
Reduce turnaround time and processing
delays.

350
Provides high security and effective (BPR). Similar approach can be extended for
resource management to improve the eGovernance system in Indian perspective for
quality of business administration. government offices wherein signed approvals
Establish transparency and accountability. from the competent authority is a mandatory
process.
High cohesion and low coupling model.
Helps in modular development, ACKNOWLEDGMENT
deployment and implementation.
We would like to express the deepest
Reduces the extent of Business Process gratitude to our Executive Director Col. (Retd.)
Reengineering (BPR). A. K. Nath who has the attitude and the
Less paper office. substance of a genius for extending his
Inbuilt digital preservation of digitally technical guidance and persistent help to design,
signed official records. develop and implement the module, without
which this execution would not have been
Easy search and retrieval of the official possible. In addition, we thank all the team
documents. mates who made full effort to develop and
implement the model successfully.
B. Disadvantages Lack of flexibility to handle
exceptional situations out of the normal REFERENCES
workflow. [1] A.I. Anton, W.M. McCracken and C. Potts, “Goal
decomposition and scenario analysis in business
process reengineering”, in Proceedings of the 6th
VII. CONCLUSION International Conference on Advanced Information
The design, development and Systems Engineering, CAiSE’94, Utrecht, The
implementation of the above described model Netherlands, June 6-10, 1994..
has encompassed efficiency, consistency, [2] Medina-Mora, T. Winigrad, R. Flores and F. Flores,
accountability and transparency in the business “The Action Workflow Approach to Workflow
Management Technology”, In Proceedings of the
processes. As the modules are highly cohesive 1992 ACM conference on Computer-supported
with low coupling nature, incremental cooperative work, CSCW ’92, Toronto, Canada,
development and deployment of the modules ISBN 0-89791-542-9, pp 281-288.
can be carried out easily. The application of [4] Wil M.P. van der Aalst, Mathias Weske and Guido
digital signature has made the solution secure, Wirtz, “Advanced Topics in Workflow
authentic and accountable. It is advisable to Management: Issues, Requirements, and Solutions”,
Journal of Integrated Design and & Process Science,
have detailed study of the existing workflow Vol. 7, Issue 3, pp 4977, August 2003.
model before the designing phase. This reduces
[5] Adobe Systems, PDF-Reference 1.7,2006.
the need of Business Process Reengineering
[6] Adobe Systems, PDF 320001:2008.
[3] S. Jablonski and C. Bussler, Workflow Management: Modeling Concepts, Architecture and Implementation,
International Thomson Computer Press, 1996.

350

Вам также может понравиться