Preview

Secure E-Governance on Open Cloud

Powerful Essays
Open Document
Open Document
3364 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Secure E-Governance on Open Cloud
Secure e-Governance on open Cloud
Dr.Sarat Chandra Babu4, Neeraja Atri 2, Savitha Gowda1, and Sonu Gupta3

Abstract:
Security in cloud environment involves review of the management domain of the cloud and also who owns the rights assignments to the Meta data. Real concerns over who controls the management domain and the meta data rights matters, thus the provider of cloud must be able to not only just technically address the issues but be reviewed from a trust standpoint that is not typical of most Internet relationships. Government departments can save on the overall cost by using cloud infrastructure in maintaining and managing eservices. However the concern is elevated when open source tools play a major role. How secure is e-governance on open cloud?? The objective of this paper is to discuss how e
Governance services can be economically deployed on the cloud, the Cloud advantage and also seeks clearance for the undying doubts on the information security.
Key words: Cloud computing, e-Governance, Open Source Software, Service oriented
Architecture (SOA), Open Cloud; Information Security
____________________________________
4

C-DAC-KP, Bangalore, email id: sarat@cdac.in
DIT, MIT email id: natri@mit.gov.in
1
C-DAC-KP, Bangalore, email id: savitha@cdac.in
3
C-DAC, Delhi, email id: sgupta@cdac.in
2

I. Introduction
Government provides numerous services to the public round the clock, a Service oriented
Web based framework designed to enable Smart integrated Services to facilitate effective e-Governance by development and deployment of Cloud as the backbone, enabling the
Government processes and procedures to achieve an integrated system and also provide an elaborate connectivity between G2G, G2B, G2C and C2C Services is the need of the hour.
The Central Government and a number of State Governments have implemented a variety of IT enabled solutions for improving effectiveness of Government services vis-à-vis its citizens. With

You May Also Find These Documents Helpful

  • Best Essays

    With the unprecedented growth and spread of information, there is no wonder why large Information Technology companies have been investing in the “cloud”. To expand, when referring to Cloud Computing, this means to access and store information not stored with in your computer whether it be public, private, or hybrid cloud computing. In technological terms, the server you are accessing is somewhere else and therefore, the information and tools you are using are “up in the clouds” but more so stored in another server space. However, whether you are paying for services through software, total usage, or free usage (hence the types of cloud services) Cloud Computing seems to be everywhere. Yet, it is important to recognize what is to gain by using cloud computing from big businesses to individual users and what are some risky moves when utilizing cloud storage over the Internet. Hence, the content of this paper will discuss the pros and cons of cloud computing and where cloud computing is headed in todays online society.…

    • 1307 Words
    • 6 Pages
    Best Essays
  • Good Essays

    Evaluate why the cloud-based solution you have selected is the best solution for your problem.…

    • 658 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Cloud computing is a fast growing information technology trend that many companies including Google, Microsoft, and IBM are currently looking to get a stake in as demand for the service grows. Cloud computing is the concept of allowing both individuals and businesses to store data and applications on remote servers (owned and operated by a third party company), rather than on their own hard drives and data centers. The service boasts the ability to securely access data and applications from just about any device with an internet connection, allowing for such services as streaming music from a personal collection from multiple devices, and even to business development and storage of applications on remote servers. For the past few years, cloud computing has quickly grown in popularity, and as such, has come with its own set of risks and security concerns. As use of this service grows by both consumers and businesses, it will no doubt continue to attract the attention of hackers and cyber criminals, as it offers a central repository of data that can contain everything from financial statements, to company intellectual property. On 7/11/2011, eweek.com posted an article called “Cloud Computing Security: 10 Ways to Enforce It”, which attempts to give several suggestions on the best way to ensure that cloud computing is as safe as it is convenient.…

    • 1626 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Sci/412 7980 Case Study 1

    • 622 Words
    • 3 Pages

    The following is a case study of the benefits of utilizing cloud computing in the public sector. "Cloud computing has the potential to greatly reduce waste, increase data center efficiency and utilization rates, and lower operating costs."(Kundra, 2010) Using the CIO Council 's 2010 document titled State of Public Sector Cloud Computing, this case study will match 10 of its case study examples with the nine benefits from the Federal Cloud Computing Strategy (Cloud First Policy). In further detail the case study of the Social Security Administration - Online Answers Knowledgebase and its benefits will be discussed.…

    • 622 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Cis 500- Cloud Computing

    • 1078 Words
    • 5 Pages

    Technology has taken great leaps of advancement. Some of the new technology that companies and consumers are taking advantage of to store and process data is cloud computing. Cloud computing was derived from virtualization. Virtualization allows companies to separate business applications from hardware. Doing this gives the company the capability of assigning applications as needed. The option to manage applications is a great benefit to companies. Resulting from the virtualization error, cloud computing has emerged to provide flexible IT infrastructures. This has not only enhanced the options companies now have, but it is also proven to be more cost efficient. This has increasingly become a preferred method of companies and consumers alike. (Turban, & Volonino, 2011, p.47)…

    • 1078 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Cloud Security Report

    • 9993 Words
    • 40 Pages

    [31] Badger, L., Grance, T., Patt-Comer, R., Voas, J. (2012) ‘Cloud Computing Synopsis and Recommendations: Recommendations of the National Institute of Standards and Technology’ NIST Special Publication.…

    • 9993 Words
    • 40 Pages
    Powerful Essays
  • Satisfactory Essays

    In this article, Patrick Thibodeau comments on Federal CIO Vivek Kundra’s claim that cloud computing concerns are exaggerated. Thibodeau explains clearly the claims made by Kundra about the overall security with cloud computing. Thibodeau blames the scare of cloud computing to IT developers belief of a status quo. Thibodeau concludes the article with a few success stories of basic cloud computing services working in the U.S. Government.…

    • 659 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Cloud Computing

    • 1296 Words
    • 6 Pages

    The author will explain in this case study how Ericsson benefitted from using Amazon Web Services (AWS) in terms of cost reduction, automated software updates, remote access, and on-demand availability. The study will also evaluate the scalability, dependability, manageability, and adaptability of Amazon Elastic Compute Cloud (Amazon EC2), Amazon Simple Storage Services (Amazon S3), and RightScale. The author will also discuss the security concerns of cloud-based services and make suggestions to cope with these concerns. Lastly, the author will assess possible scalability, reliability, and cost issues associated with cloud computing, and make suggestions to overcome each of these issues.…

    • 1296 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    institutions across the country. In doing so, these government agencies will be able to better…

    • 732 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Cloud Computing Security Threats and Responses Farzad Sabahi Faculty of Computer Engineering Azad University Iran fsabahi@ieee.org Abstract-Cloud Hybrid clouds. A public cloud is standard model which providers make several resources, such as applications and storage, available to the public.…

    • 3527 Words
    • 15 Pages
    Best Essays
  • Powerful Essays

    • • • • Organizations that have IT risk assessment capabilities and controls for externally sourced services should apply them to the appropriate aspects of cloud computing. Legal, regulatory and audit issues associated with location independence and service subcontracting should be assessed before cloud-based services are used. Demand transparency. Don 't contract for IT services with a vendor that refuses to provide detailed information on its security and continuity management programs. Develop a strategy for the controlled and secure use of…

    • 2907 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    One of the top concerns of cloud skeptics is the fear of sacrificing data security when allowing company data to exist outside the internal firewall. Well according to SuccessFactors, security is actually increased when using cloud solutions due to strict ISO security standards that cloud providers must adhere to, in addition to the regular security audits. This means no more worrying about lost laptops with confidential data and treacherous hacking threats.…

    • 393 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this new emerging technology, users' fears of losing control of their own data (particularly, financial and health data) can become a significant barrier to the wide adoption of cloud services. To address this problem, in this project, we propose a novel highly decentralized information accountability framework to keep track of the actual usage of the users' data in the cloud. Our proposed CIA framework provides end-toend accountability in a highly distributed fashion. One of the main innovative features of the CIA framework lies in its ability of maintaining lightweight and powerful accountability that combines aspects of access control, usage control and authentication In particular, we propose an object-centered approach that enables enclosing our logging mechanism together with users' data and policies. By means of the CIA, data owners can track not only whether or not the service-level agreements are being honored, but also enforce access and usage control rules as needed. Associated with the accountability feature, We leverage the JAR programmable capabilities to both create a dynamic and traveling object, and to ensure that any access to users' data will trigger authentication and automated logging local to the JARs. To strengthen user's control, we also provide distributed auditing mechanisms. We provide extensive experimental studies that demonstrate the efficiency and effectiveness of the proposed approaches.Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis.…

    • 300 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Cloud computing is a term that describes the development of many existing technologies and approaches to computing into something different. “Clouds are a large pool of easily usable and accessible virtualized resources ( hardware, development platforms and/or services). Cloud service delivery is divided among three models. “SPI Model,”where ‘SPI’ refers to Software, Platform or Infrastructure (as a Service),. The trusted virtual data center (TVDc) is a technology developed to address the need for strong isolation and integrity guarantees in virtualized environments. TVDc by implementing controlled access to networked storage based on security labels and by implementing management prototypes that demonstrate the enforcement of isolation constraints and integrity checking. For intrusion detection in cloud computing the solution consists of two kinds of analysis behavioral and knowledge analysis. In behavioral analysis, data mining techniques were used and in knowledge analysis security policy violations and attack patterns were analyzed to detect or prevent intrusion. There are different authentication mechanisms for different services. The most commonly used mechanisms are Open Id, Open Auth, and User Request Token. The organizations using cloud computing should maintain their own data backups to continuous access to their data even at the extreme situations such as disaster at data center etc ( M. and S. Pearson (2009) has proposed client based privacy manager to eliminate the fear of data leakage and loss of privacy in cloud computing. Benefit is that communication between the cloud and local machine is encrypted so that man in middle cannot intercept the traffic. This would be a huge cost saving for the company. Keywords-Cloud Computing,virtulized,prototypes,integrity checking,intrusion detection,database backups,request…

    • 290 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Cloud Computing

    • 2265 Words
    • 10 Pages

    References: Armbrust M., Fox A. et al; Above the Clouds: A Berkeley View of Cloud Computing; http://radlab.cs.berkeley.edu/; Feb 10, 2009…

    • 2265 Words
    • 10 Pages
    Powerful Essays

Related Topics