Open Access
Subscription Access
Open Access
Subscription Access
Assessment of Cloud Computing Security Risks for E-Governance Infrastructure
Subscribe/Renew Journal
The advances in web-based technologies is changing the way we work and interact. These changes are also stirring the approach government interacts and associates with citizens, businesses, employees and keeping affiliations with other local or federal governments. Governments have strained and still incessantly pondering on the methodologies to improve these interactions and deploy services (called e-services), though, faced numerous challenges in developing and implementing web-based technologies. Apart, these technologies were expensive in terms of labor cost and consumes enormous capital investments. Advent of cloud computing helped the governments sought the issues, as usage of cloud computing reduces IT labor cost by 50% and improves capital utilization by 75%. Even after spotting the benefits of using and deploying services in cloud, governments have been slower in appreciating the profits of cloud computing. The main causes for this cynical approach are security and data protection. The paper conducts the risk valuation for employing e-services in cloud computing architecture and ascertains the types of risks allied. The study will assist as guideline for government departments to implement e-services on cloud models.
Keywords
Cloud Computing Risks, E-Governance Infrastructure, Slave Data Center, Master Data Center.
Subscription
Login to verify subscription
User
Font Size
Information
- M. A. K. Badri, “A Path analytic model and measurement of the business value of e-government: An international perspective,” International Journal of Information Management, pp. 524-535, 2008.
- J. Rowley, “E-government stakeholders: Who are they and what do they want?,” International Journal of Information Management, pp. 53-62, 2011.
- L. P. V. B. Torres, “E-government developments on delivering public services among EU cities,” Government Information Quarterly, pp. 217-238, 2005.
- H. S. Chourabi, “E-government: Integrated services framework,” In Proceedings of the 12th Annual International Digital Government Research Conference: Digital Government Innovation in Challenging Times, 2011.
- L. P. V. A. B. Torres, “E-government developments on delivering public services among EU cities,” Government Information Quarterly, pp. 217-238, 2005.
- H. Qian, “Global perspectives on e-governance:from government-driven to citizen-centric public service delivery,” UN, 25-28 October 2010. [Online]. Available at http://unpan1.un.org/intradoc/groups/public/documents/UN/UNPAN040614.pdf. [Accessed 11 December 2016].
- V. Varma, “Cloud computing for e-governance,” The Financial Express, India, 2013.
- KPMG, “From hype to future: KPMG’s 2010 cloud computing survey,” 2010. [Online]. Available: www.kpmg.com.
- T.-S. Chou, “Security threats on cloud computing vulnerabilities,” International Journal of Computer Science & Information Technology, vol. 5, no. 3, pp. 79-88, 2013.
- K. S. L. Mather T, Cloud Security and Privacy, Sebastopol,CA: O’Reilly Media, Inc., 2009.
- L. P. Wenjuan Li, “Trust Model to enhance security and interoperability of cloud environment,” In First International Conference, CloudCom 2009, December 1-4, 2009. Proceedings, Beijing, China, 2009.
- IIITHydWhitePaper, “Cloud Computing for E-Governance,” 01 01 2010. [Online]. Available: http://search.iiit.ac.in/uploads/CloudComputingForEGovernance.pdf.
- S. M. Reddy, E. Mruthyunjaya, and J. Srikanth, “Cloud computing architecture supporting e-governance,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, no. 8, pp. 370-375, 2012.
- V. Winkler, Securing the Cloud Computer Security Techniques and Tactics, Waltham, MA: Elsevier Inc., 2011.
- W. Dawoud, I. Takouna, and C. Meinel, “Infrastructure as a service security: Challenges and solutions,” In 7th International Conference on Informatics and Systems (INFOS), Postdam, Germany, 2010.
- R. M. Garfinkel T, “When virtual is harder than real: Security Challenges in virtual machine based Computing environment,” In 10th Conference on Hot Topics in Operating Systems, Santa Fe, NM, USA, 2005.
- Rittinghouse, J. W., & Ransome, J. F. Security in the Cloud, Cloud Computing: Implementation, Management and Security, CRC Press, 2009.
- T. Ristanpart, E. Tromer, H. Sacham, and S. Savage, “Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds,” In 16th ACM conference on Computer and Communication security, Illinois, USA, 2009.
- M. A. Morsy, J. Grundy, and I. Müller, “An analysis of the cloud computing security problem,” In APSEC 2010 Cloud Workshop, Sydney, Australia, 2010.
- H. Wu, Y. Ding, C. Winer, and L. Yao, “Network security for virtual machine in cloud computing,” In 5th International Conference on Computer Sciences and Convergence Information Technology, Washington, USA, 2010.
- C. Shaffer, “Identifying load balancers in penetration testing,” The SANS Institute, 2010.
- C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring data storage security in cloud computing,” In 17th International Workshop on Quality of Service, Washington DC, USA, 2009.
- J. S. Reuben, “A survey on virtual machine security,” Helsinki University of Technology, Helsinki, 2007.
- Grobauer B, Walloschek T, Stocker E, “Understanding the cloud computing vulnerabilities,” IEEE Security Privacy, vol. 9, no. 2, pp. 50-57, 2011.
- A. Jasti, P. Shah, R. Nagraj, and R. Pendse, “Security in multi-tenancy cloud,” In IEEE International Carnahan Conference on Security Technology, Washington DC, 2010.
- Symantec White Paper, Web Based Attacks, Symantec, 2009.
- P. P. Ramgonda, and R. R. Mudholkar, “Cloud market cogitation and techniques to averting SQL injection for univers,” International Journal of Computer Technology and Applications, vol. 3, no. 3, pp. 1217-1224, 2012.
- M. McIntosh, and P. Austel, “XML signature element wrapping attacks and countermeasures,” In Workshop on Secure Web Services, New York, 2005.
- A. Ahmad, “Type of security threats and it’s prevention,” Int. J. Computer Technology and Applications, vol. 3, no. 2, pp. 750-752, 2012.
- N. Reeshil, “Different types of network attacks and security threats and counter measures,” Hub Pages, 08 02 2013. [Online]. Available at http://hubpages.com/technology/Types-of-Network-Attacks. [Accessed 03 04 2016].
- L. Ertaul, S. Singhal, and S. Gokay, “Security challenges in cloud computing,” In International Conference on Security and Management, SAM’10, Las Vegas, USA, 2010.
- J. Viega, “Cloud computing and the common man,” Computer, vol. 42, no. 8, pp. 106-108, 2009.
- M. Townsend, “Managing a security program in a cloud computing environment,” In Information Security Curriculum Development Conference, New York, 2009.
- W. A. Jansen “Cloud hooks: Security and privacy issues in cloud computing,” In Proceedings of the 44th Hawaii International Conference on System Sciences, Washigton, USA, 2011.
- “Top threats to cloud computing V1.0,” Cloud Security Alliance, 2010.
- C. Babcock, “9 worst cloud security threats,” Information Week. Available at http://www.information-week.com/cloud/, 2013.
- D. Lukan, “The top cloud computing threats and vulnerabilities in an enterprise environment,” Cloud Tech. Available at http://www.cloudcomputing-news.net/news/2014/nov/21/top-cloud-computing-threats-and-vulnerabilities-enterprise-environment/), 2014.
Abstract Views: 324
PDF Views: 5