Call for Paper - July 2022 Edition
IJCA solicits original research papers for the July 2022 Edition. Last date of manuscript submission is June 20, 2022. Read More

Security of Data in Cloud based E-Governance System

Print
PDF
IJCA Special Issue on Advanced Computing and Communication Technologies for HPC Applications
© 2012 by IJCA Journal
ACCTHPCA - Number 2
Year of Publication: 2012
Authors:
Smitha K K
Chitharanjan K

Smitha K K and Chitharanjan K. Article: Security of Data in Cloud based E-Governance System. IJCA Special Issue on Advanced Computing and Communication Technologies for HPC Applications ACCTHPCA(2):1-6, July 2012. Full text available. BibTeX

@article{key:article,
	author = {Smitha K K and Chitharanjan K},
	title = {Article: Security of Data in Cloud based E-Governance System},
	journal = {IJCA Special Issue on Advanced Computing and Communication Technologies for HPC Applications},
	year = {2012},
	volume = {ACCTHPCA},
	number = {2},
	pages = {1-6},
	month = {July},
	note = {Full text available}
}

Abstract

The overwhelming success and the rapid growth of the Internet change our lives; the way we interact, learn and work. Now a day's most of the organizations including government deliver their services through internet. E-governance is the application of information and communication technologies to exchange information between government and the citizens, government and business organizations and between government organizations. Cloud computing is a new way of accepting and providing services over internet. Cloud based e-governance system provides many benefits to Government like reduced cost, distributed storage of data, availability of resources at lower cost ,manages security, scalability, accountability and modifiability. Security is the one of the crucial issue in Cloud based E-governance system. As the number of services provided by the E-governance system to the users increases a high level of E-Government security is required. Security of information is concerned with the properties like confidentiality, integrity, authentication, availability and reliability. In an E-governance system databases contain all the government information so that it should keep very confidentially. The government databases deployed to the cloud contain critical and private information. The databases are uploaded to the storage facility provided by the cloud service provider, who has higher priority to access the data. Since data are exposed to a third party, several security threats may occur. For ensuring confidentiality of government data they are encrypted before storing in to cloud. This paper proposes a new mechanism for database encryption with flexible data granularity and safe key management for high security and better performance for database access.

References

  • Mrinalini Shah,"E-Governance in India: Dream or reality?" , International Journal of Education and Development using Information and Communication Technology (IJEDICT), 2007, Vol. 3, Issue 2, pp. 125-137. .
  • S. A Ashan Rajon and Ali Zaman, "Implementation of E-governance : only way to build a Corruption-Free Bangladesh, Proceedings of 11th International Conference on Computer and Information Technology (ICCIT 2008), 25-27 December, 2008,
  • Grossman, R. L. The case of cloud computing, proc. of IEEE ,Educational Activities Department, Piscataway, NJ, USA vol. 11, Issue 2, pp. 23-37, March, 2009.
  • "Cloud Computing for E-Governance" A white paper, IIIT Hyderabad, India.
  • M. Pokharel, and J. S. Park, "Cloud Computing: Future solution for e- Governance," Proceedings of the 3rd International Conference on Theory and Practice of Electronic Governance, ACM Press, New York, NY, 2009, pp. 409–410.
  • K. Mukherjee, G. Sahoo, Cloud Computing: Future Framework for e-Governance, International Journal of Computer Applications (0975 – 8887) Volume 7– No. 7, October 2010
  • M. K. Sharma, M. P. Thapliyal G-cloud (e-Governance in cloud), Int J Engg Techsci Vol 2(2) 2011,134-137.
  • W. Cellary, and S. Strykowski, "E-Government Based on Cloud Computing and Service-Oriented Architecture," Proceedings of the 3rd International Conference on Theory and Practice of Electronic Governance, ACM Press, New York, NY, 2009, pp. 5–10.
  • Chihyi Yeh, Yiying Zhou, Hao Yu, Haiyan Wang, Analysis of E-Government Service Platform Based on Cloud Computing, 978-1-4244- 7618-3 /10/$26. 00 ©2010 IEEE.
  • Aprna Tripathi, Bhawana Parihar, "E-governance challenges and cloud benefits" , 978-1-4244-8728-8/11 ©2011 IEEE.
  • Ajay Prasad ,Sandeep Chaurasia, Arjun Singh, Deepak Gour "Mapping Cloud Computing onto Useful e-Governance" (IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 5, 2010.
  • Anttiroiko, A. V. (Ed. ) Electronic Government: concepts,Methodologies, Tools, and Applications. Information Science Reference, Hershey, PA, 2008.
  • Coursey, D. and Norris, D. "Models of e-Government; Are they correct? An empirical assessment" , Public Administration, Review, volume 68, Number 3, pp 523-536, 2008
  • D. C. Wyld, The cloudy future of government it:Cloud computing and the public sector around the world, International Journal of Web & Semantic Technology (IJWesT), Vol 1, Num 1, January 2010.
  • D. C. Wyld, Moving to the cloud: An introduction to cloud computing in government. Washington, DC: IBM Center for the Business of Government, November 2009.
  • Grant, G. , and Chau, D. , "Developing a Generic Framework for E-Government", Journal of Global Information Management, Volume 13, Number 1, pp 1-30, year 2005
  • R. Hicks, "The future of government in the cloud," FutureGov, 6(3), pp. 58-62, May 2009.
  • P. Sumathi, Punithavalli M, "Constructing a grid simulation for e-governance applications using GridSim" Journal of Computer Science 4 (8): 674-679, 2008
  • K. Mukherjee, G. Sahoo, "Security mechanism for C-Governance using Hadamard matrices" Proceedings of 2nd International Conference on Computer and Communication Technology (ICCCT), 2011
  • Lianzhong Liu and Jingfen Gai, "A New Lightweight Database Encryption Scheme Transparent to Applications" , The IEEE international conference on Industrial Informatics ,DCC Daejeon, korea, july 2008
  • R. Agrawal, J. Kiernan, R. Srikant, and Yirong Xu, "Order Preserving Encryption for Numeric Data," In the Proceedings of the ACM SIGMOD, pp. 563-574, 2004.
  • H. Hacigumus, B. Iyer, Chen Li, and S. Mehrotra, "Executing SQL over encrypted data in the database service provider model," In ACM SIGMOD Conference, pp. 216-227, 2002.
  • Tingjian. Ge and S. Zdonik, "Fast, Secure encryption for indexing in a column-oriented DBMS," IEEE 23rd International Conference on Data Engineering, pp. 676-685, 2007
  • Jamil T, "The Rijndael algorithm" , potentials, IEEE Volume: 23, Issue :2, 2004.
  • Microsoft windows Azure. Http://www. microsoft. com/azure/