Aadhaar Security: Creating a secure environment for Third parties and Government
Siddharth Vagrecha,  Isha Agarwal,  Srushti Singh,  Apoorva K A
In recent years we had heard about many aadhaar data/information that has been leaked. Largely, data breaches were from third-parties websites and applications. Due to which people have lost their trust on aadhaar card. Aadhaar, which is at most required for every identification process in India, requires a high level of security when sharing with third-parties websites or applications. With that idea, we have proposed a solution to protect aadhaar information on a digital platform. Our work is that aadhaar information must be converted into a HASH value using the hashing algorithm. This HASH value will be verified and authenticated by UIDIA and is stored in their database. This HASH value is sharable on third-party’s digital platforms without revealing any personal information of the user/person such as Aadhaar UIN (Unique Identification Number). Thus, if any third-party suffer from cyber threats such as data breaches, the hacker will get only HASH values that cannot be reversed in order to get actual aadhaar information. Hence, we can create a secure environment for Third parties as well as the government.
Keywords- Aadhaar Security, Cryptography, Encryption, Hashing Algorithm, Information Security, Database, Web Application, Mobile Application.
Cite this Article
Siddharth Vagrecha,  Isha Agarwal,  Srushti Singh,  Apoorva K A,   "Aadhaar Security: Creating a secure environment for Third parties and Government"
, International Journal of Engineering Development and Research (IJEDR), ISSN:2321-9939, Volume.8, Issue 1, pp.443-449, January 2020, Available at :http://www.ijedr.org/papers/IJEDR2001084.pdf