eGovernance Under guidance of Dr. P.V. Kamesam IBM Research Lab New Delhi Ashish Gupta 3 rd Year B.Tech, Computer Science and Engg. IIT Delhi.

Slides:



Advertisements
Similar presentations
Agenda 2 factor authentication Smart cards Virtual smart cards FIM CM
Advertisements

ICS 434 Advanced Database Systems
Presentation by Priyanka Sawarkar
Enterprise Content Management Departmental Solutions Enterprisewide Document/Content Management at half the cost of competitive systems ImageSite is:
ISecurity Complete Product Series For System i. About Raz-Lee Internationally renowned System i solutions provider Founded in 1983; 100% focused on System.
Connect. Communicate. Collaborate Click to edit Master title style MODULE 1: perfSONAR TECHNICAL OVERVIEW.
11© 2011 Hitachi Data Systems. All rights reserved. HITACHI DATA DISCOVERY FOR MICROSOFT® SHAREPOINT ® SOLUTION SCALING YOUR SHAREPOINT ENVIRONMENT PRESENTER.
TAC Vista Security. Target  TAC Vista & Security Integration  Key customer groups –Existing TAC Vista users Provide features and hardware for security.
Chapter 9 Designing Systems for Diverse Environments.
CoreGRID Workpackage 5 Virtual Institute on Grid Information and Monitoring Services Authorizing Grid Resource Access and Consumption Erik Elmroth, Michał.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Presentation Outline  Project Aims  Introduction of Digital Video Library  Introduction of Our Work  Considerations and Approach  Design and Implementation.
Distributed Systems Architectures
Presentation Outline  Project Aims  Introduction of Digital Video Library  Introduction of Our Work  Considerations and Approach  Design and Implementation.
Internet Resources Discovery (IRD) IBM DB2 Digital Library Thanks to Zvika Michnik and Avital Greenberg.
©Silberschatz, Korth and Sudarshan1.1Database System Concepts Chapter 1: Introduction Purpose of Database Systems View of Data Data Models Data Definition.
Chapter 9: Moving to Design
E-Business: Intra-Business E-Commerce
Distributed Systems: Client/Server Computing
Live Meeting APIs Robert Devine Program Manager Microsoft Corporation.
Web-based Portal for Discovery, Retrieval and Visualization of Earth Science Datasets in Grid Environment Zhenping (Jane) Liu.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
Software Configuration Management (SCM)
Introduction to the Enterprise Library. Sounds familiar? Writing a component to encapsulate data access Building a component that allows you to log errors.
By Mihir Joshi Nikhil Dixit Limaye Pallavi Bhide Payal Godse.
1 EDMS 101 Speaker: Monica Crocker, DHS EDMS Coordinator Overview of current project(s) Objective of this section: This session outlines EDMS fundamentals.
Trimble Connected Community
 Cloud computing  Workflow  Workflow lifecycle  Workflow design  Workflow tools : xcp, eucalyptus, open nebula.
Module 8 Configuring and Securing SharePoint Services and Service Applications.
CST203-2 Database Management Systems Lecture 2. One Tier Architecture Eg: In this scenario, a workgroup database is stored in a shared location on a single.
Module 7: Fundamentals of Administering Windows Server 2008.
Chapter 7 Integration of Information I. Integration of information in business systems 1. What Is Meant by the Concept of Integrating information in business?
Chapter 6 of the Executive Guide manual Technology.
1st Workshop on Intelligent and Knowledge oriented Technologies Universal Semantic Knowledge Middleware Marek Paralič,
Module 9 Configuring Messaging Policy and Compliance.
CS480 Computer Science Seminar Introduction to Microsoft Solutions Framework (MSF)
Microsoft TechForge 2009 SQL Server 2008 Unplugged Microsoft’s Data Platform Vinod Kumar Technology Evangelist – DB and BI
1 NexSentry Command Center Powerful security management system with UNIX server and Windows NT 4 Operator Stations.
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
MULTIMEDIA DATABASES -Define data -Define databases.
4 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Computer Software Chapter 4.
1 Computing Challenges for the Square Kilometre Array Mathai Joseph & Harrick Vin Tata Research Development & Design Centre Pune, India CHEP Mumbai 16.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Framework for MDO Studies Amitay Isaacs Center for Aerospace System Design and Engineering IIT Bombay.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
Business Productivity Infrastructure Optimization Campaign 1 Agenda: BPIO Partner Sales Readiness Workshop Day 3: Topic: Enterprise Content management.
OAIS Rathachai Chawuthai Information Management CSIM / AIT Issued document 1.0.
Afresco Overview Document management and share
1 © Xchanging 2010 no part of this document may be circulated, quoted or reproduced without prior written approval of Xchanging. MOSS Training – UI customization.
Digital Video Library Network Supervisor: Prof. Michael Lyu Student: Ma Chak Kei, Jacky.
Distributed System Architectures Yonsei University 2 nd Semester, 2014 Woo-Cheol Kim.
Module 1: Overview of Microsoft Office SharePoint Server 2007.
Microsoft ® Official Course Implementing Enterprise Content Management Microsoft SharePoint 2013 SharePoint Practice.
Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly.
CSC 480 Software Engineering Lecture 17 Nov 4, 2002.
The Claromentis Digital Workplace An Introduction
Copyright 2007, Information Builders. Slide 1 iWay Web Services and WebFOCUS Consumption Michael Florkowski Information Builders.
Building Preservation Environments with Data Grid Technology Reagan W. Moore Presenter: Praveen Namburi.
IT 5433 LM1. Learning Objectives Understand key terms in database Explain file processing systems List parts of a database environment Explain types of.
5/29/2001Y. D. Wu & M. Liu1 Content Management for Digital Library May 29, 2001.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
Chapter 1: Introduction
CSC 480 Software Engineering
Week Thirteen – Continuous Auditing/CAATs and QA/QC
Dev Test on Windows Azure Solution in a Box
Week Thirteen – CAATs & Continuous Auditing
Project Information Management Jiwei Ma
Preparing for the Windows 8.1 MCSA
Presentation transcript:

eGovernance Under guidance of Dr. P.V. Kamesam IBM Research Lab New Delhi Ashish Gupta 3 rd Year B.Tech, Computer Science and Engg. IIT Delhi

Introduction Definition of eGov It can be defined as the civil and political conduct of government, including service provision, using information and communication technologies. e-Gov solution Government Transactions Citizens Overview of Presentation Part 1 : Content Manager Part 2 : Audit Trails in Distributed Databases

Intro to Content Manager The Problem A Major challenge in eGov : Data Management E.g. Land Records, Citizen Database etc. Content Manager : a Possible Solution What is Content Manager ? Content Manager (a product from IBM) is a scalable solution for storing and retrieving documents of various types.

Content Manager Brief Overview of the features of CM 1. Lets you store content regardless of format. ( Unstructured data ) E.g. text documents, scanned images, audio, video, forms any binary object 2. Stores data on distributed servers and provides single point access. 3. Provides many sophisticated features like Access control Storage management – Archiving, Purging, Migration User management Automated Workflow Enterprise wide search from Internet or intranet clients. Streaming audio and video.

The Beginners Guide to CM Provides an introduction to a layman about Content Manager Covers essential topics of CM Relevant Figures to explain important concepts All discusses development of Client Application for CM Useful Appendices with extra info like installation, references etc.

Developed an easy to use CM Programming API Benefits Makes it very easy to perform operations on the CM Database Encapsulates the complexity of CM API Object Oriented Approach allows easy integration into new apps Speeds up Application Development Time Extensibility : Acts like a new layer on top of CM New layers like Custom Access Control, Audit Layer can be added Content Manager API Folder Manager API Library Client API SimpleCMAPI Application Security Layer Audit Layer Developed a new easy to use API on top of Content Manager Programming API

A Prototype Application  Defining the problem  Proposed a prototype solution  Developed an Application in Visual C++ on top of Content Manager  Demonstrates use of our new API with additional layers  Workflow  Security Layer  Audit Layer Inner Line Permit for VISITOR RESIDENTSHIP Requirements for entering Arunachal Pradesh OR

Some Screenshots of the Application developed Security Layer Workflow in CM Two databases: Citizen Database Inner Line Permit Database Main Screen

Definition of Audit Trail An audit trail is a series of records of computer events, about an operating system, an application, or user activities. Purpose of Audit Trail  Individual Accountability: track individual actions to facilitate audit.  Reconstructing Events: reconstruct events as and when required.  Problem Monitoring: online tools to help monitor problems  Intrusion Detection: identifying attempts to penetrate a system and gain unauthorized access. Audit Trails on Distributed Databases

The eGov Middleware Data Virtualization Isolates logical view of data storage available to the application developer from the physical placement Data Virtualizer Transaction Commands Query processor and optimizer Database MIDDLEWAREMIDDLEWARED Application

Audit Trail Component : A module responsible for managing the audit trail of eGov applications across the entire system. Problem Description Where can we place the Audit Trail Component in the eGov Architecture ? Possible options: 1. Application 2. In the Middleware, above DV Module 3. In the Component Databases

Issues Involved in the Placement Security Issues  Risking security at the hands of applications  Tamper proofing of Audit Trail Implementation Issues  Application Complexity  Database design Complexity Audit Trail Transparency to the application developers Consistency of Audit Trail across the entire system Ease of Audit Policy Management

Proposed Solution Data Virtualizer Query processor and optimizer Database Audit Policy Database MID L E W A R E Transaction Commands Audit Trail Agent Application SECURITYSECURITY

Further Research Issues Audit Trail Agent Architecture  Storage of Audit Trail is an issue  Distributed or Centralized ? Possible Solution: A Buffered Distributed - Centralized Architecture  Amalgamation of audit trail data at the central server Timestamping issues to ensure correct chronological sequencing of audit trail for analysis – Time sync, which time to use Proper Categorization of Audit Trail data to facilitate analysis  Ensuring Tamperproofing of Audit Trail for the Auditor Authentication of Distributed Sources Encryption Access Control Secure Transmission  Audit trail management (Archiving and purging)  Access Control to Audit Trail

Conclusion Extensible API developed for Content Manager along with an application Audit Trail Architecture in eGov Working at IRL Team work Research Experience Responsibility Thanks

Things Learnt Enterprise Database Technology Visual C++ / Database Interaction API Wrapper Technology Distributed Database Systems Audit Trail Technology and Middleware Tech. Security Issues in large scale databases IIT Education File Systems Course CS120 and CS130

Other Tasks Laid down a list of requirements for eGov data management solutions A document on security issues of smart cards Future Work  Integration of EIP with CM  Further extension of the new CM API with focus on security and audit trail layers  Development of applications for more real life scenarios

Architecture of CM Library Server Multiple Object Servers Client Fig: Architecture of Content Manager for a single Implementation