E-government cloud computing proposed model: Egyptian E_Government Cloud Computing

Cloud benefits are yet encountered by a vital difficulty; among them are security, privacy, reliability and performance. Additional important concern is the legal issues regarding the compliance with national and international regulatory framework. This paper proposes an abstract hybrid model to adapt e-government to cloud computing in Egypt that minimizes the risk associated with those concerns. The hybrid model consists of three types of cloud computing which are Intra-Cloud computing “IACC”, Extra-Cloud computing “EXCC” and Inter-Cloud computing “IECC”. The proposed model enables each of three clouds to set a number of constraints and restriction yet permits maximum integration, communication and collaboration among them. Finally, a set of recommended implementation practices and specification are suggested that ensure the risk minimization of the above concerns.

[1]  David C. Wyld,et al.  THE CLOUDY FUTURE OF GOVERNMENT IT: CLOUD COMPUTING AND THE PUBLIC SECTOR AROUND THE WORLD , 2010 .

[2]  Vasudeva Varma,et al.  Towards Analyzing Data Security Risks in Cloud Computing Environments , 2010, ICISTM.

[3]  Kuldeep Vats,et al.  A REVIEW OF CLOUD COMPUTING AND E- GOVERNANCE , 2012 .

[4]  G. Galal-Edeen,et al.  PROPOSED DEVELOPMENT MODEL OF E-GOVERNMENT TO APPROPRIATE CLOUD COMPUTING AKRAM , 2012 .

[5]  Bay Arinze,et al.  Factors that Determine the Adoption of Cloud Computing: A Global Perspective , 2010, Int. J. Enterp. Inf. Syst..

[6]  Udo Helmbrecht Data protection and legal compliance in cloud computing , 2010, Datenschutz und Datensicherheit - DuD.

[7]  Sakshi Kaushal,et al.  Security Concerns in Cloud Computing , 2011, Grid 2011.

[8]  Nabil Sultan,et al.  loud computing for education : A new dawn ? , 2009 .

[9]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[10]  Geng Yang,et al.  Secure Document Service for Cloud Computing , 2009, CloudCom.

[11]  Harit Shah,et al.  Security Issues on Cloud Computing , 2013, ArXiv.

[12]  Bhavani M. Thuraisingham,et al.  Security Issues for Cloud Computing , 2010, Int. J. Inf. Secur. Priv..

[13]  Graeme Philipson A Framework for Green Computing , 2011, Int. J. Green Comput..

[14]  Arvind Bhisikar,et al.  G-Cloud: New Paradigm Shift for Online Public Services , 2011 .

[15]  Kevin Curran,et al.  Cloud Computing Security , 2011, Int. J. Ambient Comput. Intell..

[16]  Hwan-Seung Yong,et al.  Ontology Matching Based on hypernym, hyponym, holonym, and meronym Sets in WordNet , 2010 .

[17]  Sakshi Kaushal,et al.  Cloud Computing Security Issues and Challenges: A Survey , 2011, ACC.

[18]  Hyokyung Chang,et al.  Challenges and Security in Cloud Computing , 2010, FGIT-FGCN.

[19]  Ashish Bhushan Khare,et al.  CLOUD COMPUTING BASED RURAL E-GOVERNANCE MODEL , 2012 .

[20]  Constantinos J. Stefanou,et al.  E-Government: Cloud solutions in Labor Regulatory Area in Greece , 2012 .

[21]  Gadadhar Sahoo,et al.  Cloud Computing: Future Framework for e-Governance , 2010 .

[22]  Christian Callegari,et al.  Advances in Computing, Communications and Informatics (ICACCI) , 2015 .

[23]  Taqwa Hariguna Prototype Cloud Computing for E-Government , 2012 .

[24]  Temkar Rohini Comparative Approach to Cloud Security Models , 2011 .

[25]  L. D. Dhinesh Babu,et al.  An Analysis of Security Related Issues in Cloud Computing , 2011, IC3.