SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 6, Ver. V (Nov – Dec. 2015), PP 20-24
www.iosrjournals.org
DOI: 10.9790/0661-17652024 www.iosrjournals.org 20 | Page
An Indepth Understanding of e-Procurement: A Case Study
Approach
Shaikh Imtiyaj, N.R Biswal, T.P Ray, Dr A.K Hota
Dept. of CSE, C.V. Raman College of Engineering, BPUT, Bhubaneswar, Odisha, India
Scientist, Ministry of Electr & IT, Bhubaneswar, Odisha, India
Scientist, Ministry of Electr & IT, Bhubaneswar, Odisha, India
Scientist, Ministry of Electr & IT, Bhubaneswar, Odisha, India
I. Introduction:
The science market has become open and accessible to all in the international community without any
restriction; the rapid explosion in Information Technology has played a vital role in this mission. The use of
Information Technology particularly web based internet applications to enhance the access to and delivery of
government information and services to their citizens, public agencies, employees, business partners, financial
institutions and government departments. The rapid growth of competition in the market and the consequent
changes in economic conditions impose organizations and firms to implement new technologies to stay
competitive. The Central, State Government, Judiciary, Autonomous Bodies, Boards & Corporations, PSUs,
Joint Ventures, Statutory Bodies, Commissions and Councils have invested in numerous initiatives throughout
the length and breadth of the country aimed at extending the benefits of information revolution to rural and
remote area. The Government envisions providing good governance by establishing a Committed, Accountable,
Responsive, Inspiring, Nationalist, and Genuine Government - CARING Government. e-Procurement is one of
the best vehicles that are being gainfully used in reaching the goal of CARING governance
The rapidly changing pace of the global business world compels organizations to take quick, decisive
action when considering new technological developments. The technological developments and movement
toward a global marketplace over the past decade have forced companies to restructure their business practices
in order to gain competitive advantage or even to survive. One aspect of the restructuring has been the transition
of several business processes into the electronic environment of cyberspace, commonly referred to as e-
Business. While e-Business includes all aspects of doing business in an electronic environment, two specific
areas deal primarily with external transactions, specifically the e-Commerce and e-Procurement processes. The
benefits include decreased administration and overhead costs, decreased labor hour cost per transaction, more
accurate and timely business intelligence, more timely payment, and enhanced cash flow management. However
the most striking benefit will be to get organizations to analyze their procurement processes.
e-Governance : Objective
 Providing information speedily to all citizens
 Improving transparency
 Improving public services such as transportation, power, health, water, security and municipal services etc.
 Reduce Corruption
e-Governance development models :
The e-Governance Models are
 G2C : Government to Citizens
 G2B : Government to Business
 G2G : Government to Government
Figure 1: Governance Development Model
An Indepth Understanding of e-Procurement: A Case Study Approach
DOI: 10.9790/0661-17652024 www.iosrjournals.org 21 | Page
e-Procurement :
A major Government to Business e-Governance initiative to bring transparency in public procurement process is
e-Procurement.
e-Procurement, commonly known as Electronic procurement.
Figure 2: e-Procurement Cycle
e-Procurement is the business-to-business or business-to-consumer or business-to-Government
purchase and sale of Supplies, Works and Services using the Internet. e-Procurement caters to the online
tendering process from online tender creation to award of contract(AOC). Using e-Tendering the Departments
can create the tender, publish the tender, receive bids, open the tenders, evaluate tenders and finally publish
award of contract. Using e-Tendering, the bidders can search tenders, submit bids online and track the status of
their bids. Timely and efficient delivery of e-Governance services is an important aspect. Indian IT-Act 2000
has mandated the usage of Digital Signature Certificate (DSC) for e-Procurement.
e-Tendering Process :
Tender Creation
Tender Publish
Participation of
Bids by Bidder
Technical Bid
Opening
Technical
Evaluation
Financial Bid
Opening
Financial
Evaluation
Award of Contract
(AOC)
Shaikh Imtiyaj
Figure 3: e-Tendering Process
e-Procurement: Responsibilities
An Indepth Understanding of e-Procurement: A Case Study Approach
DOI: 10.9790/0661-17652024 www.iosrjournals.org 22 | Page
 Creater of the Tender: - The Tender will be created by the officer by using his/her Digital Signature
Certificate, as per approved by the Department Nodal Officer.
 Publisher of the Tender:- He will be normally the Head of the Dept (HOD) of the concerned technical
department and will be the responsible person for timely and accurately hosting of tender on the portal
 Opener of the Tender: - The tender will be decrypted and opened with the Digital Signature Certificates of
each opener as identified during publishing the tender. Each opener will have to access one by one for bid
opening. The Tender technical core committee members will be normally the openers of tender as decided
by the Nodal Officer.
 Evaluator of the Tender: - The Evaluator is the person who will evaluate the tenders and upload the final
decision of the Tender Evaluation Committee.
 Auditor: He will be given privileged access to audit tendering process.
Benefits of e-Procurement:
For data encryption and security purposes, the Digital Signature Certificate is essential to operate in e-
Procurement.
 Healthy competition in participation
 Bidding possible: 24X7 Availability
 Any time, Any where Bid Submission
 Paper less Environment
 Process Efficiency in entire tendering process
 Real time monitoring
 Cost Reduction
 Reduced Tender related Crime
 Transparency
Shaikh Imtiyaj
Figure 4: Benefits of e-Procurement
e-Procurement Risk :
Digital Signature Certificates (DSC) can be presented electronically to prove the identity, to access
information or services on the Internet or to sign certain documents digitally. DSC provides Authorization,
Authentication, Privacy, Non repudiation and Integrity. IT Act 2000 in Government of India gives legal validity
to electronic transactions that are digitally signed. A DSC provides high level of security for online transactions.
You can use certificates to encrypt information such that only the intended recipient can read it. You can
digitally sign information to provide assurance to the recipient that it has not been altered in transit, and enable
verification that you actually sent the message.
An Indepth Understanding of e-Procurement: A Case Study Approach
DOI: 10.9790/0661-17652024 www.iosrjournals.org 23 | Page
e-Procurement Trends in India :

Shaikh Imtiyaj
Figure 5: e-Procurement Trends in India
Algorithm Implementation:
DSC is based on MD5 algorithm from Cryptography. MD5 is Message Digest algorithm, which takes as input a
message of arbitrary length and produces as output a 128-bit "message digest" of the input. MD5 is more secure
than MD4.
import java.security.*;
class Md5FeeduDemoTest {
public static void main(String[] a) {
try {
MessageDigest md = MessageDigest.getInstance("MD5");
System.out.println("Message Digest5 information: ");
System.out.println(" Algorithm = "+md.getAlgorithm());
System.out.println(" Provider = "+md.getProvider());
System.out.println(" toString = "+md.toString());
String input = "";
md.update(input.getBytes());
byte[] output = md.digest();
System.out.println();
System.out.println("MD5(""+input+"") =");
System.out.println(" "+bytesToHex(output));
input = "xyz";
md.update(input.getBytes());
output = md.digest();
System.out.println();
System.out.println("MD5(""+input+"") =");
System.out.println(" "+bytesToHex(output));
input = "abcdefghijklmnopqrstuvwxyz";
md.update(input.getBytes());
output = md.digest();
An Indepth Understanding of e-Procurement: A Case Study Approach
DOI: 10.9790/0661-17652024 www.iosrjournals.org 24 | Page
System.out.println();
System.out.println("MD5(""+input+"") =");
System.out.println(" "+bytesToHex(output));
} catch (Exception e) {
System.out.println("Exception: "+e);
}
}
public static String bytesToHex(byte[] b) {
char hexDigit[] = {'0', '1', '2', '3', '4', '5', '6', '7',
'8', '9', 'A', 'B', 'C', 'D', 'E', 'F'};
StringBuffer buf = new StringBuffer();
for (int j=0; j<b.length; j++) {
buf.append(hexDigit[(b[j] >> 4) & 0x0f]);
buf.append(hexDigit[b[j] & 0x0f]);
}
return buf.toString();
}
}
Conclusion and Future Work:
e-Procurement reduces the tender related crimes is certainly a significant achievement on the way to a
better, cleaner, honest and developed nation. This study focuses on different opportunities of G2B initiatives in
India. The basic objective of research is to provide a model for better implementation of e-Governance
application.
References
[1]. Shaikh Imtiyaj, N.R Biswal, T.P Ray, Dr A.K Hota , “Digital Signature Certificate: A blessing for e-Governance Application in
Human Development”, International Journal of Advanced Research in Science, Engineering and Technology,Vol. 2, Issue 1 , pp
350-355,January 2015
[2]. William S.,” Cryptography and Network Security, Principles and Practice”, Prentice Hall of India, 2005.
[3]. Dhiren R. Patel ,”Information Security Theory and Practice” , 2008 Edition
[4]. Atul Kahate, “Cryptography and Network Security”, Second Edition
[5]. Cryptography Engineering: Design Principles and Practical Applications by Niels Ferguson, Bruce Schneier, Tadayoshi Kohno
[6]. www.eprocure.gov.in/eprocure/app, last visited 07th
Dec 2015
[7]. https://tendersodisha.gov.in/nicgep/app , last visited 07th Dec 2015
[8]. “Digital Signature,” available at: http:// http://nicca.nic.in , last visited 05th Feb 2015
[9]. “e-Governance,” available at http:// india.gov.in , last visited 07th Dec 2015
[10]. “e-Procurement,” available at http:// demoeproc.nic.in , last visited 07th Dec 2015

Contenu connexe

En vedette (20)

I010514852
I010514852I010514852
I010514852
 
G010133748
G010133748G010133748
G010133748
 
H012645760.iosr jmce p2
H012645760.iosr jmce p2H012645760.iosr jmce p2
H012645760.iosr jmce p2
 
J012555862
J012555862J012555862
J012555862
 
M1302027275
M1302027275M1302027275
M1302027275
 
B1302020508
B1302020508B1302020508
B1302020508
 
M018147883
M018147883M018147883
M018147883
 
A010330106
A010330106A010330106
A010330106
 
J1802026976
J1802026976J1802026976
J1802026976
 
A010520112
A010520112A010520112
A010520112
 
K1102026568
K1102026568K1102026568
K1102026568
 
I011138286
I011138286I011138286
I011138286
 
D017412935
D017412935D017412935
D017412935
 
L1802037276
L1802037276L1802037276
L1802037276
 
K017516167
K017516167K017516167
K017516167
 
Simulation of Signals with Field Signal Simulator
Simulation of Signals with Field Signal SimulatorSimulation of Signals with Field Signal Simulator
Simulation of Signals with Field Signal Simulator
 
B018211016
B018211016B018211016
B018211016
 
E010522527
E010522527E010522527
E010522527
 
K1803036872
K1803036872K1803036872
K1803036872
 
Relationship of Kabaddi Performance with Selected Coordinative Ability of the...
Relationship of Kabaddi Performance with Selected Coordinative Ability of the...Relationship of Kabaddi Performance with Selected Coordinative Ability of the...
Relationship of Kabaddi Performance with Selected Coordinative Ability of the...
 

Similaire à E017652024

Ict Roadshow Presentation1
Ict Roadshow Presentation1Ict Roadshow Presentation1
Ict Roadshow Presentation1Basement
 
User Documentation Verification Portal
User Documentation Verification PortalUser Documentation Verification Portal
User Documentation Verification PortalIRJET Journal
 
E-signatures and Their Impact on Digital Age Transactions - DrySign
E-signatures and Their Impact on Digital Age Transactions - DrySignE-signatures and Their Impact on Digital Age Transactions - DrySign
E-signatures and Their Impact on Digital Age Transactions - DrySignDrysign By Exela
 
Vicent mathias reg no190640723531 proposal
Vicent mathias reg no190640723531 proposalVicent mathias reg no190640723531 proposal
Vicent mathias reg no190640723531 proposalvicentmathias1
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyEryk Budi Pratama
 
MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE FOR AUTOMATING E-GOVERNMENT SERV...
MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE FOR AUTOMATING E-GOVERNMENT SERV...MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE FOR AUTOMATING E-GOVERNMENT SERV...
MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE FOR AUTOMATING E-GOVERNMENT SERV...IRJET Journal
 
Ict enabled municipal initiative
Ict enabled municipal initiativeIct enabled municipal initiative
Ict enabled municipal initiativepcmcindia
 
CSCM The impact of e procurement application
CSCM The impact of e procurement applicationCSCM The impact of e procurement application
CSCM The impact of e procurement applicationEst
 
CSCM The impact of e procurement application
CSCM The impact of e procurement applicationCSCM The impact of e procurement application
CSCM The impact of e procurement applicationEst
 
Monetizing the Internet of Things: Creating a Connected Customer Experience
Monetizing the Internet of Things: Creating a Connected Customer ExperienceMonetizing the Internet of Things: Creating a Connected Customer Experience
Monetizing the Internet of Things: Creating a Connected Customer ExperienceZuora, Inc.
 
Authentication and Tracking of Government Benefits Using Blockchain
Authentication and Tracking of Government Benefits Using BlockchainAuthentication and Tracking of Government Benefits Using Blockchain
Authentication and Tracking of Government Benefits Using BlockchainIRJET Journal
 
Design and develop authentication in electronic payment systems based on IoT ...
Design and develop authentication in electronic payment systems based on IoT ...Design and develop authentication in electronic payment systems based on IoT ...
Design and develop authentication in electronic payment systems based on IoT ...TELKOMNIKA JOURNAL
 
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM TransactionsAnalysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM TransactionsIJERD Editor
 
IRJET - Blockchain Application Used in Enhance Technology from Cryptocurr...
IRJET -  	  Blockchain Application Used in Enhance Technology from Cryptocurr...IRJET -  	  Blockchain Application Used in Enhance Technology from Cryptocurr...
IRJET - Blockchain Application Used in Enhance Technology from Cryptocurr...IRJET Journal
 

Similaire à E017652024 (20)

Lotus procure : A Complete Overview
Lotus procure : A Complete OverviewLotus procure : A Complete Overview
Lotus procure : A Complete Overview
 
Ict Roadshow Presentation1
Ict Roadshow Presentation1Ict Roadshow Presentation1
Ict Roadshow Presentation1
 
User Documentation Verification Portal
User Documentation Verification PortalUser Documentation Verification Portal
User Documentation Verification Portal
 
E-signatures and Their Impact on Digital Age Transactions - DrySign
E-signatures and Their Impact on Digital Age Transactions - DrySignE-signatures and Their Impact on Digital Age Transactions - DrySign
E-signatures and Their Impact on Digital Age Transactions - DrySign
 
IT_in_delhi_govt
IT_in_delhi_govtIT_in_delhi_govt
IT_in_delhi_govt
 
Vicent mathias reg no190640723531 proposal
Vicent mathias reg no190640723531 proposalVicent mathias reg no190640723531 proposal
Vicent mathias reg no190640723531 proposal
 
Jasper, Internet of Things
Jasper, Internet of ThingsJasper, Internet of Things
Jasper, Internet of Things
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE FOR AUTOMATING E-GOVERNMENT SERV...
MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE FOR AUTOMATING E-GOVERNMENT SERV...MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE FOR AUTOMATING E-GOVERNMENT SERV...
MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE FOR AUTOMATING E-GOVERNMENT SERV...
 
Ict enabled municipal initiative
Ict enabled municipal initiativeIct enabled municipal initiative
Ict enabled municipal initiative
 
e-Procurement in Indian Government
e-Procurement in Indian Governmente-Procurement in Indian Government
e-Procurement in Indian Government
 
CSCM The impact of e procurement application
CSCM The impact of e procurement applicationCSCM The impact of e procurement application
CSCM The impact of e procurement application
 
CSCM The impact of e procurement application
CSCM The impact of e procurement applicationCSCM The impact of e procurement application
CSCM The impact of e procurement application
 
Monetizing the Internet of Things: Creating a Connected Customer Experience
Monetizing the Internet of Things: Creating a Connected Customer ExperienceMonetizing the Internet of Things: Creating a Connected Customer Experience
Monetizing the Internet of Things: Creating a Connected Customer Experience
 
Authentication and Tracking of Government Benefits Using Blockchain
Authentication and Tracking of Government Benefits Using BlockchainAuthentication and Tracking of Government Benefits Using Blockchain
Authentication and Tracking of Government Benefits Using Blockchain
 
Design and develop authentication in electronic payment systems based on IoT ...
Design and develop authentication in electronic payment systems based on IoT ...Design and develop authentication in electronic payment systems based on IoT ...
Design and develop authentication in electronic payment systems based on IoT ...
 
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM TransactionsAnalysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
 
Iti
ItiIti
Iti
 
ITM
ITMITM
ITM
 
IRJET - Blockchain Application Used in Enhance Technology from Cryptocurr...
IRJET -  	  Blockchain Application Used in Enhance Technology from Cryptocurr...IRJET -  	  Blockchain Application Used in Enhance Technology from Cryptocurr...
IRJET - Blockchain Application Used in Enhance Technology from Cryptocurr...
 

Plus de IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Dernier

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 

Dernier (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 

E017652024

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 6, Ver. V (Nov – Dec. 2015), PP 20-24 www.iosrjournals.org DOI: 10.9790/0661-17652024 www.iosrjournals.org 20 | Page An Indepth Understanding of e-Procurement: A Case Study Approach Shaikh Imtiyaj, N.R Biswal, T.P Ray, Dr A.K Hota Dept. of CSE, C.V. Raman College of Engineering, BPUT, Bhubaneswar, Odisha, India Scientist, Ministry of Electr & IT, Bhubaneswar, Odisha, India Scientist, Ministry of Electr & IT, Bhubaneswar, Odisha, India Scientist, Ministry of Electr & IT, Bhubaneswar, Odisha, India I. Introduction: The science market has become open and accessible to all in the international community without any restriction; the rapid explosion in Information Technology has played a vital role in this mission. The use of Information Technology particularly web based internet applications to enhance the access to and delivery of government information and services to their citizens, public agencies, employees, business partners, financial institutions and government departments. The rapid growth of competition in the market and the consequent changes in economic conditions impose organizations and firms to implement new technologies to stay competitive. The Central, State Government, Judiciary, Autonomous Bodies, Boards & Corporations, PSUs, Joint Ventures, Statutory Bodies, Commissions and Councils have invested in numerous initiatives throughout the length and breadth of the country aimed at extending the benefits of information revolution to rural and remote area. The Government envisions providing good governance by establishing a Committed, Accountable, Responsive, Inspiring, Nationalist, and Genuine Government - CARING Government. e-Procurement is one of the best vehicles that are being gainfully used in reaching the goal of CARING governance The rapidly changing pace of the global business world compels organizations to take quick, decisive action when considering new technological developments. The technological developments and movement toward a global marketplace over the past decade have forced companies to restructure their business practices in order to gain competitive advantage or even to survive. One aspect of the restructuring has been the transition of several business processes into the electronic environment of cyberspace, commonly referred to as e- Business. While e-Business includes all aspects of doing business in an electronic environment, two specific areas deal primarily with external transactions, specifically the e-Commerce and e-Procurement processes. The benefits include decreased administration and overhead costs, decreased labor hour cost per transaction, more accurate and timely business intelligence, more timely payment, and enhanced cash flow management. However the most striking benefit will be to get organizations to analyze their procurement processes. e-Governance : Objective  Providing information speedily to all citizens  Improving transparency  Improving public services such as transportation, power, health, water, security and municipal services etc.  Reduce Corruption e-Governance development models : The e-Governance Models are  G2C : Government to Citizens  G2B : Government to Business  G2G : Government to Government Figure 1: Governance Development Model
  • 2. An Indepth Understanding of e-Procurement: A Case Study Approach DOI: 10.9790/0661-17652024 www.iosrjournals.org 21 | Page e-Procurement : A major Government to Business e-Governance initiative to bring transparency in public procurement process is e-Procurement. e-Procurement, commonly known as Electronic procurement. Figure 2: e-Procurement Cycle e-Procurement is the business-to-business or business-to-consumer or business-to-Government purchase and sale of Supplies, Works and Services using the Internet. e-Procurement caters to the online tendering process from online tender creation to award of contract(AOC). Using e-Tendering the Departments can create the tender, publish the tender, receive bids, open the tenders, evaluate tenders and finally publish award of contract. Using e-Tendering, the bidders can search tenders, submit bids online and track the status of their bids. Timely and efficient delivery of e-Governance services is an important aspect. Indian IT-Act 2000 has mandated the usage of Digital Signature Certificate (DSC) for e-Procurement. e-Tendering Process : Tender Creation Tender Publish Participation of Bids by Bidder Technical Bid Opening Technical Evaluation Financial Bid Opening Financial Evaluation Award of Contract (AOC) Shaikh Imtiyaj Figure 3: e-Tendering Process e-Procurement: Responsibilities
  • 3. An Indepth Understanding of e-Procurement: A Case Study Approach DOI: 10.9790/0661-17652024 www.iosrjournals.org 22 | Page  Creater of the Tender: - The Tender will be created by the officer by using his/her Digital Signature Certificate, as per approved by the Department Nodal Officer.  Publisher of the Tender:- He will be normally the Head of the Dept (HOD) of the concerned technical department and will be the responsible person for timely and accurately hosting of tender on the portal  Opener of the Tender: - The tender will be decrypted and opened with the Digital Signature Certificates of each opener as identified during publishing the tender. Each opener will have to access one by one for bid opening. The Tender technical core committee members will be normally the openers of tender as decided by the Nodal Officer.  Evaluator of the Tender: - The Evaluator is the person who will evaluate the tenders and upload the final decision of the Tender Evaluation Committee.  Auditor: He will be given privileged access to audit tendering process. Benefits of e-Procurement: For data encryption and security purposes, the Digital Signature Certificate is essential to operate in e- Procurement.  Healthy competition in participation  Bidding possible: 24X7 Availability  Any time, Any where Bid Submission  Paper less Environment  Process Efficiency in entire tendering process  Real time monitoring  Cost Reduction  Reduced Tender related Crime  Transparency Shaikh Imtiyaj Figure 4: Benefits of e-Procurement e-Procurement Risk : Digital Signature Certificates (DSC) can be presented electronically to prove the identity, to access information or services on the Internet or to sign certain documents digitally. DSC provides Authorization, Authentication, Privacy, Non repudiation and Integrity. IT Act 2000 in Government of India gives legal validity to electronic transactions that are digitally signed. A DSC provides high level of security for online transactions. You can use certificates to encrypt information such that only the intended recipient can read it. You can digitally sign information to provide assurance to the recipient that it has not been altered in transit, and enable verification that you actually sent the message.
  • 4. An Indepth Understanding of e-Procurement: A Case Study Approach DOI: 10.9790/0661-17652024 www.iosrjournals.org 23 | Page e-Procurement Trends in India :  Shaikh Imtiyaj Figure 5: e-Procurement Trends in India Algorithm Implementation: DSC is based on MD5 algorithm from Cryptography. MD5 is Message Digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "message digest" of the input. MD5 is more secure than MD4. import java.security.*; class Md5FeeduDemoTest { public static void main(String[] a) { try { MessageDigest md = MessageDigest.getInstance("MD5"); System.out.println("Message Digest5 information: "); System.out.println(" Algorithm = "+md.getAlgorithm()); System.out.println(" Provider = "+md.getProvider()); System.out.println(" toString = "+md.toString()); String input = ""; md.update(input.getBytes()); byte[] output = md.digest(); System.out.println(); System.out.println("MD5(""+input+"") ="); System.out.println(" "+bytesToHex(output)); input = "xyz"; md.update(input.getBytes()); output = md.digest(); System.out.println(); System.out.println("MD5(""+input+"") ="); System.out.println(" "+bytesToHex(output)); input = "abcdefghijklmnopqrstuvwxyz"; md.update(input.getBytes()); output = md.digest();
  • 5. An Indepth Understanding of e-Procurement: A Case Study Approach DOI: 10.9790/0661-17652024 www.iosrjournals.org 24 | Page System.out.println(); System.out.println("MD5(""+input+"") ="); System.out.println(" "+bytesToHex(output)); } catch (Exception e) { System.out.println("Exception: "+e); } } public static String bytesToHex(byte[] b) { char hexDigit[] = {'0', '1', '2', '3', '4', '5', '6', '7', '8', '9', 'A', 'B', 'C', 'D', 'E', 'F'}; StringBuffer buf = new StringBuffer(); for (int j=0; j<b.length; j++) { buf.append(hexDigit[(b[j] >> 4) & 0x0f]); buf.append(hexDigit[b[j] & 0x0f]); } return buf.toString(); } } Conclusion and Future Work: e-Procurement reduces the tender related crimes is certainly a significant achievement on the way to a better, cleaner, honest and developed nation. This study focuses on different opportunities of G2B initiatives in India. The basic objective of research is to provide a model for better implementation of e-Governance application. References [1]. Shaikh Imtiyaj, N.R Biswal, T.P Ray, Dr A.K Hota , “Digital Signature Certificate: A blessing for e-Governance Application in Human Development”, International Journal of Advanced Research in Science, Engineering and Technology,Vol. 2, Issue 1 , pp 350-355,January 2015 [2]. William S.,” Cryptography and Network Security, Principles and Practice”, Prentice Hall of India, 2005. [3]. Dhiren R. Patel ,”Information Security Theory and Practice” , 2008 Edition [4]. Atul Kahate, “Cryptography and Network Security”, Second Edition [5]. Cryptography Engineering: Design Principles and Practical Applications by Niels Ferguson, Bruce Schneier, Tadayoshi Kohno [6]. www.eprocure.gov.in/eprocure/app, last visited 07th Dec 2015 [7]. https://tendersodisha.gov.in/nicgep/app , last visited 07th Dec 2015 [8]. “Digital Signature,” available at: http:// http://nicca.nic.in , last visited 05th Feb 2015 [9]. “e-Governance,” available at http:// india.gov.in , last visited 07th Dec 2015 [10]. “e-Procurement,” available at http:// demoeproc.nic.in , last visited 07th Dec 2015