Secure Data Mobility in Cloud Computing for e-Governance Application

2021 ◽  
Vol 2 (1) ◽  
pp. 1-14
Author(s):  
Ramesh Paudyal ◽  
Subarna Shakya

Due to the rapid technological advancement, traditional e-government systems are getting obsolete because of their inherent limitation of interoperability and accessibility to the highly secured and flexible e-governance services. Migration of such systems into highly secured cloud governance architecture will be a long-term viable solution. However, the adoption of distributed cloud computing has created operational and security challenges. This research work aims to bridge the gap between traditional and cloud-based e-Government systems in terms of data security based on confidentiality, interoperability, and mobility of data among distributed databases of cloud computing environments. In this work, we have created two organization databases by the use of AWS EC2 instances and classified the data based on the Risk Impact Level (RIL) of data by the use of the Metadata Attribute Value (MAV) function. To enhance further security on classified data, we take appropriate security action based on the sensitivity of the data. For the analysis purpose, we implemented different security algorithms, i.e. AES, DES, and RSA in the mobility of data between two distributed cloud databases. We measured the encryption and decryption time along with the file size of data before and after classification. AES performed better while considering the encryption time and file size, but the overall performance of RSA was better for smaller file sizes. Finally, the performance of the data mobility between two distributed clouds databases was analyzed while maintaining the sensitivity level of the data.

Author(s):  
Akashdeep Bhardwaj

This article describes how the rise of fog computing to improve cloud computing performance and the acceptance of smart devices is slowly but surely changing our future and shaping the computing environment around us. IoT integrated with advances in low cost computing, storage and power, along with high speed networks and big data, supports distributed computing. However, much like cloud computing, which are under constant security attacks and issues, distributed computing also faces similar challenges and security threats. This can be mitigated to a great extent using fog computing, which extends the limits of Cloud services to the last mile edge near to the nodes and networks, thereby increasing the performance and security levels. Fog computing also helps increase the reach and comes across as a viable solution for distributed computing. This article presents a review of the academic literature research work on the Fog Computing. The authors discuss the challenges in Fog environment and propose a new taxonomy.


Recent advances in multi cloud technologies and multi-party computations have improved State of art usage of Cloud computing in real time scenarios. Primary reason behind using any service offered by others is ease of use with lesser economics. Cloud Computing is technological advancement which is in usage for last two decades because of its Pay-per-Usage policy offering enormous benefits across the user community. In spite of its enormous benefits, single factor which is stepping it back from its wider adoption throughout the digital society is its Security. Tremendous research work was done across industry and academia in association with cloud security. This paper focuses on brief history, real time deployment of cloud, usage, benefits, risks associated and Surveys various studies done by national and international organizations related to cloud security concerns and dwell upon the advantages of integrating multi clouds and multi-party computation techniques and emphasizes on recent research done across multi cloud environment and give a short note of future work to enhance security paradigm.


2018 ◽  
Vol 1 (1) ◽  
pp. 35-49 ◽  
Author(s):  
Akashdeep Bhardwaj

This article describes how the rise of fog computing to improve cloud computing performance and the acceptance of smart devices is slowly but surely changing our future and shaping the computing environment around us. IoT integrated with advances in low cost computing, storage and power, along with high speed networks and big data, supports distributed computing. However, much like cloud computing, which are under constant security attacks and issues, distributed computing also faces similar challenges and security threats. This can be mitigated to a great extent using fog computing, which extends the limits of Cloud services to the last mile edge near to the nodes and networks, thereby increasing the performance and security levels. Fog computing also helps increase the reach and comes across as a viable solution for distributed computing. This article presents a review of the academic literature research work on the Fog Computing. The authors discuss the challenges in Fog environment and propose a new taxonomy.


Author(s):  
Jens Kohler ◽  
Kiril Simov ◽  
Thomas Specht

Cloud Computing becomes interesting for enterprises across all branches. Renting computing capabilities from external providers avoids initial investments, as only those resources have to be paid that were used eventually. Especially in the context of “Big Data” this pay-as-you-go accounting model is particularly important. The dynamically scalable resources from the Cloud enable enterprises to store or analyze these huge amounts of unstructured data without using their own hardware infrastructure. However, Cloud Computing is currently facing severe data security and protection issues. These challenges require new ways to store and analyze data, especially when huge data volumes with sensitive data are stored at external locations. The presented approach separates data on database table level into independent chunks and distributes them across several clouds. Hence, this work is a contribution to a more secure and resilient cloud architecture as multiple public and private cloud providers can be used independently to store data without losing data security and privacy constraints.


Author(s):  
Ikechukwu Nwobodo ◽  
Hossein Jahankhani ◽  
Aloysius Edoh

Author(s):  
Priyanshu Srivastava ◽  
Rizwan Khan

Today is the era of Cloud Computing Technology in IT Industries. Cloud computing which is based on Internet has the most powerful architecture of computation. It reckons in of a compilation of integrated and networked hardware, software and internet infrastructure. It has various avails atop grid computing and other computing. In this paper, I have given a brief of evaluation of cloud computing by reviewing more than 30 articles on cloud computing. The outcome of this review signalizes the face of the IT industries before and after the cloud computing.


Author(s):  
Eter Basar ◽  
Ankur Pan Saikia ◽  
L. P. Saikia

Data Technology industry has been utilizing the customary social databases for around 40 years. Be that as it may, in the latest years, there was a generous transformation in the IT business as far as business applications. Remain solitary applications have been supplanted with electronic applications, conferred servers with different proper servers and committed stockpiling with framework stockpiling. Lower expense, adaptability, the model of pay-as-you-go are the fundamental reasons, which caused the conveyed processing are transformed into reality. This is a standout amongst the hugest upsets in Information Technology, after the development of the Internet. Cloud databases, Big Table, Sherpa, and SimpleDB are getting the opportunity to be more natural to groups. They featured the hindrances of current social databases as far as convenience, adaptability, and provisioning. Cloud databases are basically utilized for data raised applications, for example, stockpiling and mining of gigantic information or business information. These applications are adaptable and multipurpose in nature. Various esteem based data organization applications, such as managing an account, online reservation, e-exchange and stock organization, and so on are delivered. Databases with the help of these sorts of uses need to incorporate four essential highlights: Atomicity, Consistency, Isolation, and Durability (ACID), in spite of the fact that utilizing these databases isn't basic for utilizing as a part of the cloud. The objective of this paper is to discover the points of interest and disservices of databases generally utilized in cloud frameworks and to survey the difficulties in creating cloud databases


Author(s):  
Gurpreet Singh ◽  
Manish Mahajan ◽  
Rajni Mohana

BACKGROUND: Cloud computing is considered as an on-demand service resource with the applications towards data center on pay per user basis. For allocating the resources appropriately for the satisfaction of user needs, an effective and reliable resource allocation method is required. Because of the enhanced user demand, the allocation of resources has now considered as a complex and challenging task when a physical machine is overloaded, Virtual Machines share its load by utilizing the physical machine resources. Previous studies lack in energy consumption and time management while keeping the Virtual Machine at the different server in turned on state. AIM AND OBJECTIVE: The main aim of this research work is to propose an effective resource allocation scheme for allocating the Virtual Machine from an ad hoc sub server with Virtual Machines. EXECUTION MODEL: The execution of the research has been carried out into two sections, initially, the location of Virtual Machines and Physical Machine with the server has been taken place and subsequently, the cross-validation of allocation is addressed. For the sorting of Virtual Machines, Modified Best Fit Decreasing algorithm is used and Multi-Machine Job Scheduling is used while the placement process of jobs to an appropriate host. Artificial Neural Network as a classifier, has allocated jobs to the hosts. Measures, viz. Service Level Agreement violation and energy consumption are considered and fruitful results have been obtained with a 37.7 of reduction in energy consumption and 15% improvement in Service Level Agreement violation.


Author(s):  
Mahmoud M. Allam ◽  
Hatem A. Almasry ◽  
Sandra M. Ahmed ◽  
Youssuf G. Taha ◽  
Mohammed I. Oraby

Abstract Background Idiopathic intracranial hypertension (IIH) is a disorder of increased intracranial pressure without a clear cause and can have serious visual effects. Previous research work suggests that transcranial Doppler measurements of pulsatility index correlate accurately with elevated intracranial pressure. Objective To assess the cerebrovascular hemodynamic changes in patients with IIH using transcranial Doppler before and after lumbar puncture and CSF withdrawal. Methods An interventional study conducted on 40 patients (31 females and 9 males) fulfilling the modified Dandy criteria for diagnosis of idiopathic intracranial hypertension, MRI brain, and MRV was done to the patients. Lumbar puncture was done for all included patients to measure intracranial pressure and CSF withdrawal. Transcranial Doppler was performed for all included before and after lumbar puncture and CSF withdrawal and the following parameters were measured: peak systolic velocity (PSV), end diastolic velocity (EDV), resistivity index (RI), and pulsatility index (PI). Results Significant relation was found between grades of papilledema and PSV, RI, and PI (p value 0.012, 0.025, 0.016) but no significant relation was found between grades of papilledema and EDV (0.102). Significant changes occurred in parameters of TCD pre- and post-CSF withdrawal including PSV, EDV, and PI (p value 0.001, 0.015, 0.019) denoting a significant change in cerebral hemodynamics after CSF withdrawal which denotes a decrease in intracranial pressure. Conclusion Increased intracranial pressure significantly affects cerebral blood flow. A normalization of transcranial Doppler parameters occurs following lowering of intracranial pressure through lumbar puncture and CSF withdrawal.


Sign in / Sign up

Export Citation Format

Share Document