15.11.2012 Views

icegov2012 proceedings

icegov2012 proceedings

icegov2012 proceedings

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

A Novel Scheme of Government Information Sharing<br />

System for Implementing Paperless Government in Korea<br />

John (Jong Uk) Choi,<br />

JooWon Cho<br />

Sangmyung University<br />

juchoi@markany.com<br />

ABSTRACT<br />

Secure integration and interoperability are key issues in<br />

implementing ‘paperless’ digital government, and PKI scheme has<br />

been recommended for secure delivery of the document between<br />

government organizations. However, when requested documents<br />

safely arrive at other organizations, there are no ways to prevent<br />

illegal modification, editing using authoring tools, or transferring<br />

to the third parties.<br />

In this paper, we suggest a novel approach to implementing a<br />

government information sharing system: PKI, access control and<br />

forgery prevention which were employed in implementing<br />

Government Information Sharing (GIS) Center in Korea.<br />

Categories and Subject Descriptors<br />

D. 2.11 [Software Engineering]: Software Architectures –<br />

Domain-specific architectures.<br />

General Terms<br />

Security<br />

Keywords<br />

DRM, Forgery prevention, Access control, Public service<br />

1. INTRODUCTION<br />

Even if PKI scheme can provide very secure mechanism of<br />

authentication, confidentiality, and non-repudiation for sharing<br />

information between government organizations, still there remain<br />

several problems and potential risks. What PKI scheme can<br />

provide is to guarantee secure delivery of documents between two<br />

parties. However, even though the document has been delivered to<br />

the right person without any modification has been made, there<br />

remain a couple of potential risks: it can be modified at right<br />

person’s devices after delivery, or easily screen copied into a new<br />

file and transferred to the third parties. In other words, PKI<br />

scheme provides a secure delivery of a document between two<br />

parties or multi parties, but cannot guarantee secure ‘use’ of the<br />

Permission to make digital or hard copies of part or all of this work for<br />

personal or classroom use is granted without fee provided that copies are<br />

not made or distributed for profit or commercial advantage and that copies<br />

bear this notice and the full citation on the first page. Copyrights for<br />

components of this work owned by others than ACM must be honored.<br />

Abstracting with credit is permitted. To copy otherwise, to republish, to<br />

post on servers or to redistribute to lists, requires prior specific permission<br />

and/or a fee.<br />

ICEGOV '12, October 22 - 25 2012, Albany, NY, USA<br />

Copyright 2012 ACM 978-1-4503-1200-4/12/10...$15.00<br />

Dong Hwa Kim<br />

MarkAny<br />

dhkim@markny.com<br />

452<br />

Chang Hun Yoo<br />

MarkAny<br />

chyoo@markany.com<br />

document, protecting from misuse when it is delivered. Even<br />

though PKI procedures and certificates employed in GIS service<br />

can deliver requested documents safely to applicants, still there<br />

can be serious concerns: data leakage and illegal modification. In<br />

other words, even though PKI can provide user authentication,<br />

confidentiality, and non-repudiation in the process of document<br />

delivery, there are worries of illegal leakage to the third parties<br />

and possible forgery after it was safely received by the applicant.<br />

Because the data and documents delivered to the applicants are in<br />

digital form, they can be easily manipulated with authoring tools<br />

at applicant’s devices and copied on storage devices for transfer to<br />

third parties.<br />

In this paper, a novel approach for building an information<br />

sharing system is suggested, based on PKI infrastructure, access<br />

control technology, and forgery prevention technology. This<br />

approach was implemented in ‘Government Information Sharing<br />

Center’ in Korea. We provided this novel technology to the GIS<br />

(Government Information Sharing) center to make secure delivery<br />

and secure use of the documents.<br />

2. GOVERNMENT INFORMATION<br />

SHARING (GIS) CENTER<br />

Government Information Sharing (GIS) center in Korea was<br />

designed to increase productivity and efficiency of public service<br />

by decreasing time spent in manual delivery of documents and<br />

also by decreasing errors caused by manual input and delivery. In<br />

designing GIS center, employed were three components: PKI for<br />

authentication and authorization, E-DRM (Enterprise DRM) for<br />

preventing illegal access and information leakage, and 2D<br />

Barcode for preventing illegal modification of the data.<br />

2.1 e-Container<br />

When a user of GIS system sends request to the center using web<br />

application form with PKI certificates through web, an e-container<br />

is automatically generated. The request specifies the document,<br />

purpose, department and person, requested operations (‘read’,<br />

‘print’), and expire_ date. Currently, two operations are possible:<br />

‘read ’, and ‘print’ documents at applicant terminal. When the econtainer<br />

arrives at GIS center from applicant, validity of the<br />

request is checked with retrieval of employee (requester)<br />

information from database. Based on position, department, and<br />

job assignment, GIS system creates a ‘E-DRM right’ package<br />

which is included in the e-container. Then, the e-container is<br />

delivered to document source in which requested document<br />

resides.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!