A Method of Designing Authentication Scheme for Aadhaar User
Main Article Content
Abstract
The Unique IDentification (UID) project is the flagship of government of India. The UID number or aadhaar number, which is a twelve-digit number, is issued by UID Authority of India (UIDAI) for all the citizens of India. Nowadays, government of India has made mandatory to connect aadhaar cards to other government issued documents such as bank passbook, PAN card, ration card, driving licence, SIM card, etc. Connecting aadhaar number to different social schemes has helped government in detection of multiple user accounts across different schemes. But this itself is not enough, since many users utilise social scheme facility for different purposes such as ration, subsidy, acquiring loan, special concessions, interest rates, etc. Presently there is no method at place, which can find out which social scheme authority must receive what information about users. In this paper, we propose a novel authentication scheme for revealing appropriate user information to social scheme authority. The method involve use of aadhaar number which is connected to user’s name, gender, address, mobile number, etc. The designed system is simulated over authentication of a group of users across different social schemes. Our method can be used as a tool for securely authenticating officials for disclosure of user information.
Introduction: A Method of Designing Authentication Scheme for Aadhaar User - focuses on enhancing secure data sharing through Aadhaar. The paper proposes a novel authentication system to disclose specific user information to social scheme authorities, ensuring appropriate and secure access. By leveraging Aadhaar's connectivity with user data, the scheme facilitates precise authentication for various social benefits. The simulated method demonstrates secure and efficient data authentication for multiple schemes.
Objectives:
The primary objective of this study is to design and develop a novel authentication scheme that securely manages the disclosure of Aadhaar-linked user information to various social scheme authorities. The proposed system aims to address the lack of existing methods for determining which information should be shared with specific authorities based on the social schemes they govern. By leveraging the Aadhaar database, which contains user details such as name, gender, address, and mobile number, the scheme ensures precise and secure authentication.
Methods: The proposed method involves the development of a secure authentication scheme utilizing Aadhaar numbers as the primary identifier, linked to user-specific details such as name, gender, address, and mobile number. The system is designed to authenticate users based on their eligibility for various social schemes and ensure that only the necessary information is disclosed to the respective scheme authorities. This approach incorporates data encryption and access control mechanisms to protect sensitive user data and prevent unauthorized access. The method is simulated on a group of users, testing the authentication process across multiple social schemes to evaluate its efficiency and security. The simulation results demonstrate how the system enables precise information sharing, ensuring compliance with privacy regulations and enhancing trust in Aadhaar-based authentication processes.
Results: The proposed simulation results demonstrate the effectiveness and reliability of the authentication scheme in securely managing Aadhaar-based user information across various social schemes. The simulation involved a diverse group of users, each with unique eligibility criteria for specific government schemes such as subsidies, loans, and concessions. The system successfully authenticated users by verifying their Aadhaar-linked details and disclosed only the necessary information to the corresponding scheme authorities. The results highlighted the scheme's ability to prevent unauthorized access and protect user privacy through encryption and access control mechanisms. Additionally, the simulation confirmed the scheme's efficiency in handling multiple user authentications simultaneously, with minimal processing delays and accurate data sharing. These findings validate the potential of the proposed method to enhance the security and functionality of Aadhaar-based authentication systems.
Conclusions: The study presents a novel Aadhaar-based authentication scheme designed to securely and efficiently manage the disclosure of user information to various social scheme authorities. By leveraging encryption, access control mechanisms, and Aadhaar-linked user details, the method ensures accurate, privacy-preserving data sharing tailored to the requirements of individual schemes. The simulation results validate the scheme's effectiveness in authenticating users, safeguarding sensitive data, and streamlining access to government benefits. Overall, the proposed authentication framework offers a robust solution to address existing gaps in Aadhaar-based information management, enhancing security, trust, and operational efficiency.