Enhanced e-Government Process Model with Customer Centric Cloud

Authors

  • Sreekanth D.  Research Scholar, Department of Computer Science, Bharathiar University, Coimbatore, Tamilnadu, India
  • Gladston Raj S.  Assistant Professor, Department of Computer Science, Govt. College, Nedumangad- University of Kerala, Trivandrum, India

Keywords:

Cloud Computing, e-Government, LSGI, Cloud Security

Abstract

The adoption of perfect technologies in the area of e-governance improves service delivery in a cost effective and secured manner. The success of every e-governance projects fully depends upon the utilisation of the end user, so that the wide range of acceptability and security should be assured through the significant approach of system design. Every customer centric systems should provide better services, fast and reliable information to every citizen. A review of literature indicates that the majority of the e-governance projects again undergoes with the manual processing due to the insignificant design of the system. Here we propose an improved service delivery, secured, customer centric and multi tired authentication system by adopting cloud environment as a service. The architecture proposes service delivery at various levels and there will be no lack in providing the service even if the concerned person in the department is unavailable. Every validation processes of each service will be processed by the system with the available data sources, which is already available with other e-governing systems.

References

  1. John Steven, [email protected],Gunnar Peterson, [email protected], A Security   Architecture Stack for the Cloud- IEEE SECURITY & PRIVACY.
  2. A Method for Trust Management in Cloud Computing: Data Coloring by Cloud Watermarking Yu-Chao Liu1,Yu-Tao Ma , Hai-Su Zhang  De-Yi Li  Gui-Sheng Chen  - International Journal of Automation and Computing.
  3. A PACS archive architecture supported on cloud services - Luís A. Bastião Silva · Carlos Costa José Luis Oliveira,  Received: 10 January 2011 / Accepted: 20 May 2011 / Published online: 16 June 2011 © CARS 2011.
  4. Bertino, E., F. Paci and R. Ferrini, 2009. Privacy-Preserving Digital Identity Management for Cloud Computing. IEEE Data Eng. Bull., 32: 21-27.
  5. Bruening, P.J. and B.C. Treacy, 2009. Cloud Computing: Privacy, Security Challenges. Bureau of Nat’l Affairs.
  6. Catteddu, D. and G. Hogben, 2009. Cloud Computing: Benefits, Risks and Recommendations for Information Security. ENISA.
  7. Cong, W., W. Qian and R. Kui, 2009. Ensuring Data Security in Cloud Computing. IEEE.
  8. Ko, M., G.J. Ahn and M. Shehab, 2009. Privacy- Enhanced User-Centric Identity Management. Proceeding IEEE.
  9. William, S., 2005. Cryptography and Network Security Principles and Practices. 4th Edn., PHI.
  10. M. Bellare and S. Micali. How To Sign Given Any Trapdoor Function. In Crypto '88, LNCS 403, ages 200{215. Springer-Verlag, 1989.
  11. S. A. Brands. Untraceable Off-line Cash in Wallets with Observers. In Crypto '93, LNCS 773, pages 302{318. Springer-Verlag, 1994.
  12. D. Chaum. Blind Signatures for Untraceable Payments. In Crypto '82, pages 199{203. Plenum, NY, 1983.
  13. K.L et-al (1978) Local government and information technology in the United  States
  14. Caldow ,j (1999) ‘The quest for electronic  government: A defining Vision
  15. West D.M. (2004) e-government and the transformation of service delivery and citizen attitude.
  16. Lee (2005) e-government : key success factors for value discovery and realization
  17. Chen et-al (2006) e-government strategies in developed and developing countries: An implementation framework and Case study

Downloads

Published

2017-12-31

Issue

Section

Research Articles

How to Cite

[1]
Sreekanth D., Gladston Raj S., " Enhanced e-Government Process Model with Customer Centric Cloud, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.848-851, November-December-2017.