Preview

Secure E-Governance on Open Cloud

Powerful Essays
Open Document
Open Document
3364 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Secure E-Governance on Open Cloud
Secure e-Governance on open Cloud
Dr.Sarat Chandra Babu4, Neeraja Atri 2, Savitha Gowda1, and Sonu Gupta3

Abstract:
Security in cloud environment involves review of the management domain of the cloud and also who owns the rights assignments to the Meta data. Real concerns over who controls the management domain and the meta data rights matters, thus the provider of cloud must be able to not only just technically address the issues but be reviewed from a trust standpoint that is not typical of most Internet relationships. Government departments can save on the overall cost by using cloud infrastructure in maintaining and managing eservices. However the concern is elevated when open source tools play a major role. How secure is e-governance on open cloud?? The objective of this paper is to discuss how e
Governance services can be economically deployed on the cloud, the Cloud advantage and also seeks clearance for the undying doubts on the information security.
Key words: Cloud computing, e-Governance, Open Source Software, Service oriented
Architecture (SOA), Open Cloud; Information Security
____________________________________
4

C-DAC-KP, Bangalore, email id: sarat@cdac.in
DIT, MIT email id: natri@mit.gov.in
1
C-DAC-KP, Bangalore, email id: savitha@cdac.in
3
C-DAC, Delhi, email id: sgupta@cdac.in
2

I. Introduction
Government provides numerous services to the public round the clock, a Service oriented
Web based framework designed to enable Smart integrated Services to facilitate effective e-Governance by development and deployment of Cloud as the backbone, enabling the
Government processes and procedures to achieve an integrated system and also provide an elaborate connectivity between G2G, G2B, G2C and C2C Services is the need of the hour.
The Central Government and a number of State Governments have implemented a variety of IT enabled solutions for improving effectiveness of Government services vis-à-vis its citizens. With

You May Also Find These Documents Helpful

  • Good Essays

    The term paper will consist of a cloud-based solution of your own choosing. Imagine that you are the CIO of a company and you are moving your organization’s locally hosted technology environment to cloud-based models.…

    • 658 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Cis 500- Cloud Computing

    • 1078 Words
    • 5 Pages

    Technology has taken great leaps of advancement. Some of the new technology that companies and consumers are taking advantage of to store and process data is cloud computing. Cloud computing was derived from virtualization. Virtualization allows companies to separate business applications from hardware. Doing this gives the company the capability of assigning applications as needed. The option to manage applications is a great benefit to companies. Resulting from the virtualization error, cloud computing has emerged to provide flexible IT infrastructures. This has not only enhanced the options companies now have, but it is also proven to be more cost efficient. This has increasingly become a preferred method of companies and consumers alike. (Turban, & Volonino, 2011, p.47)…

    • 1078 Words
    • 5 Pages
    Better Essays
  • Good Essays

    institutions across the country. In doing so, these government agencies will be able to better…

    • 732 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    In this article, Patrick Thibodeau comments on Federal CIO Vivek Kundra’s claim that cloud computing concerns are exaggerated. Thibodeau explains clearly the claims made by Kundra about the overall security with cloud computing. Thibodeau blames the scare of cloud computing to IT developers belief of a status quo. Thibodeau concludes the article with a few success stories of basic cloud computing services working in the U.S. Government.…

    • 659 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Cloud Security Report

    • 9993 Words
    • 40 Pages

    Cloud Computing is the result of a rapid evolution of computing technologies and a response to the new world business requirements. The adoption of the technology is widely accepted and its future is promising. However the cloud computing phenomena does not come without a risk. There are many issues of concerns that might slow the adoption of the cloud computing; most notably are the security concerns which come as a result of the complexity of cloud technologies and the wide parties involved with them. Issues such as cloud computing compliance and governance, cloud computing deployment and architectural models, virtualization, cloud computing applications, cloud operations, standards, guidelines, frameworks and contracting for cloud service provisioning are all necessary for any business to understand before adopting the technology. This report will explain the top security risks of using cloud service providers for essential business applications and how they can be identified using the cloud risk assessment process. It will also explore various topics related to cloud computing, including concepts and terminologies of cloud security, risk assessment, frameworks and standards. It will conclude with a scenario of a case study to explain the process of analyzing a cloud service provider services security; and to show some of the most common cloud computing risks that exist in the world.…

    • 9993 Words
    • 40 Pages
    Powerful Essays
  • Powerful Essays

    Cloud computing is a new name for an old concept: the delivery of computing services from a remote location, analogous to the way electricity, water, and other utilities are provided to most customers. Cloud computing services are delivered through a network, usually the Internet. Some cloud services are adaptations of familiar applications, such as e-mail and word processing. Others are new applications that never existed as a local application, such as online maps and social networks. Since 2009, the federal government has been shifting its data storage needs to cloud-based services and away from agency-owned data centers. This shift is intended to reduce the total investment by the federal government in information technology (IT) (data centers), as well as realize other stated advantages of cloud adoption: efficiency, accessibility, collaboration, rapidity of innovation, reliability, and security. In December 2010, the U.S. Chief Information Officer (CIO) released “A 25-Point Implementation Plan to Reform Federal IT Management” as part of a comprehensive effort to increase the operational efficiency of federal technology assets. One element of the 25-Point Plan is for agencies to shift to a “Cloud First” policy, which is being implemented through the Federal Cloud Computing Strategy. The Cloud First policy means that federal agencies must (1) implement cloud-based solutions whenever a secure, reliable, and cost-effective cloud option…

    • 13907 Words
    • 56 Pages
    Powerful Essays
  • Powerful Essays

    Cloud Computing

    • 1296 Words
    • 6 Pages

    The author will explain in this case study how Ericsson benefitted from using Amazon Web Services (AWS) in terms of cost reduction, automated software updates, remote access, and on-demand availability. The study will also evaluate the scalability, dependability, manageability, and adaptability of Amazon Elastic Compute Cloud (Amazon EC2), Amazon Simple Storage Services (Amazon S3), and RightScale. The author will also discuss the security concerns of cloud-based services and make suggestions to cope with these concerns. Lastly, the author will assess possible scalability, reliability, and cost issues associated with cloud computing, and make suggestions to overcome each of these issues.…

    • 1296 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Cloud services have recently become one of the most popular topics in the tech industry. It is a new area of development with unlimited…

    • 3413 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    assignment IST309

    • 1030 Words
    • 3 Pages

    The best definition of cloud computing provide by (Brandl, 2010) as “ collections of IT resources, (servers, databases, and applications) which are available on an on-demand basis, provided by a service company, available through the Internet, and provide resource pooling among multiple users.” Since the service is provided by specific company and…

    • 1030 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Cloud Computing Security Threats and Responses Farzad Sabahi Faculty of Computer Engineering Azad University Iran fsabahi@ieee.org Abstract-Cloud Hybrid clouds. A public cloud is standard model which providers make several resources, such as applications and storage, available to the public.…

    • 3527 Words
    • 15 Pages
    Best Essays
  • Powerful Essays

    • • • • Organizations that have IT risk assessment capabilities and controls for externally sourced services should apply them to the appropriate aspects of cloud computing. Legal, regulatory and audit issues associated with location independence and service subcontracting should be assessed before cloud-based services are used. Demand transparency. Don 't contract for IT services with a vendor that refuses to provide detailed information on its security and continuity management programs. Develop a strategy for the controlled and secure use of…

    • 2907 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this new emerging technology, users' fears of losing control of their own data (particularly, financial and health data) can become a significant barrier to the wide adoption of cloud services. To address this problem, in this project, we propose a novel highly decentralized information accountability framework to keep track of the actual usage of the users' data in the cloud. Our proposed CIA framework provides end-toend accountability in a highly distributed fashion. One of the main innovative features of the CIA framework lies in its ability of maintaining lightweight and powerful accountability that combines aspects of access control, usage control and authentication In particular, we propose an object-centered approach that enables enclosing our logging mechanism together with users' data and policies. By means of the CIA, data owners can track not only whether or not the service-level agreements are being honored, but also enforce access and usage control rules as needed. Associated with the accountability feature, We leverage the JAR programmable capabilities to both create a dynamic and traveling object, and to ensure that any access to users' data will trigger authentication and automated logging local to the JARs. To strengthen user's control, we also provide distributed auditing mechanisms. We provide extensive experimental studies that demonstrate the efficiency and effectiveness of the proposed approaches.Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis.…

    • 300 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Time to value with cloud solutions is significantly lower than with on-premise applications. A “go live” for cloud solutions takes typically 2-3 quarters, whereas on-premise solutions require 2-3 years to implement. Not only is implementation time reduced, but the IT resources required to roll-out cloud solutions are much less.…

    • 393 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Cloud Computing

    • 2265 Words
    • 10 Pages

    References: Armbrust M., Fox A. et al; Above the Clouds: A Berkeley View of Cloud Computing; http://radlab.cs.berkeley.edu/; Feb 10, 2009…

    • 2265 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Cloud computing is a term that describes the development of many existing technologies and approaches to computing into something different. “Clouds are a large pool of easily usable and accessible virtualized resources ( hardware, development platforms and/or services). Cloud service delivery is divided among three models. “SPI Model,”where ‘SPI’ refers to Software, Platform or Infrastructure (as a Service),. The trusted virtual data center (TVDc) is a technology developed to address the need for strong isolation and integrity guarantees in virtualized environments. TVDc by implementing controlled access to networked storage based on security labels and by implementing management prototypes that demonstrate the enforcement of isolation constraints and integrity checking. For intrusion detection in cloud computing the solution consists of two kinds of analysis behavioral and knowledge analysis. In behavioral analysis, data mining techniques were used and in knowledge analysis security policy violations and attack patterns were analyzed to detect or prevent intrusion. There are different authentication mechanisms for different services. The most commonly used mechanisms are Open Id, Open Auth, and User Request Token. The organizations using cloud computing should maintain their own data backups to continuous access to their data even at the extreme situations such as disaster at data center etc ( M. and S. Pearson (2009) has proposed client based privacy manager to eliminate the fear of data leakage and loss of privacy in cloud computing. Benefit is that communication between the cloud and local machine is encrypted so that man in middle cannot intercept the traffic. This would be a huge cost saving for the company. Keywords-Cloud Computing,virtulized,prototypes,integrity checking,intrusion detection,database backups,request…

    • 290 Words
    • 2 Pages
    Satisfactory Essays

Related Topics