Enhanced e-Government Process Model with Customer Centric Cloud
Keywords:
Cloud Computing, e-Government, LSGI, Cloud SecurityAbstract
The adoption of perfect technologies in the area of e-governance improves service delivery in a cost effective and secured manner. The success of every e-governance projects fully depends upon the utilisation of the end user, so that the wide range of acceptability and security should be assured through the significant approach of system design. Every customer centric systems should provide better services, fast and reliable information to every citizen. A review of literature indicates that the majority of the e-governance projects again undergoes with the manual processing due to the insignificant design of the system. Here we propose an improved service delivery, secured, customer centric and multi tired authentication system by adopting cloud environment as a service. The architecture proposes service delivery at various levels and there will be no lack in providing the service even if the concerned person in the department is unavailable. Every validation processes of each service will be processed by the system with the available data sources, which is already available with other e-governing systems.
References
- John Steven, jsteven@cigital.com,Gunnar Peterson, gunnar@arctecgroup.net, A Security Architecture Stack for the Cloud- IEEE SECURITY & PRIVACY.
- A Method for Trust Management in Cloud Computing: Data Coloring by Cloud Watermarking Yu-Chao Liu1,Yu-Tao Ma , Hai-Su Zhang De-Yi Li Gui-Sheng Chen - International Journal of Automation and Computing.
- A PACS archive architecture supported on cloud services - Luís A. Bastião Silva · Carlos Costa José Luis Oliveira, Received: 10 January 2011 / Accepted: 20 May 2011 / Published online: 16 June 2011 © CARS 2011.
- Bertino, E., F. Paci and R. Ferrini, 2009. Privacy-Preserving Digital Identity Management for Cloud Computing. IEEE Data Eng. Bull., 32: 21-27.
- Bruening, P.J. and B.C. Treacy, 2009. Cloud Computing: Privacy, Security Challenges. Bureau of Nat’l Affairs.
- Catteddu, D. and G. Hogben, 2009. Cloud Computing: Benefits, Risks and Recommendations for Information Security. ENISA.
- Cong, W., W. Qian and R. Kui, 2009. Ensuring Data Security in Cloud Computing. IEEE.
- Ko, M., G.J. Ahn and M. Shehab, 2009. Privacy- Enhanced User-Centric Identity Management. Proceeding IEEE.
- William, S., 2005. Cryptography and Network Security Principles and Practices. 4th Edn., PHI.
- M. Bellare and S. Micali. How To Sign Given Any Trapdoor Function. In Crypto '88, LNCS 403, ages 200{215. Springer-Verlag, 1989.
- S. A. Brands. Untraceable Off-line Cash in Wallets with Observers. In Crypto '93, LNCS 773, pages 302{318. Springer-Verlag, 1994.
- D. Chaum. Blind Signatures for Untraceable Payments. In Crypto '82, pages 199{203. Plenum, NY, 1983.
- K.L et-al (1978) Local government and information technology in the United States
- Caldow ,j (1999) ‘The quest for electronic government: A defining Vision
- West D.M. (2004) e-government and the transformation of service delivery and citizen attitude.
- Lee (2005) e-government : key success factors for value discovery and realization
- Chen et-al (2006) e-government strategies in developed and developing countries: An implementation framework and Case study
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.