A novel methodology for security and privacy of cloud computing and its use in e-Governance

Cloud computing has opened a new door for both corporate and Government sectors. This new era of Information technology is similar to the invention of electrification in industrial age. Government sectors can also adopt this cutting edge technology as e-Governance to smoothen its working process. But this new technology needs to be matured in context of security, scalability, availability etc. In this regard, this manuscript has emphasized on security aspect of cloud computing and its subsequent impact on e-Governance as cloud-Governance. Here, an effective frame work for cloud-Governance has been proposed and then Hadamard matrix concept has been used for the development of encryption and decryption algorithms in order to enhance the security mechanism for cloud-Governance. Further, an experimental set up and results have been presented in order to lay bare the effectiveness of the proposed algorithms.

[1]  S. Agaian Hadamard Matrices and Their Applications , 1985 .

[2]  Jennifer Seberry,et al.  Product of Four Hadamard Matrices , 1992, J. Comb. Theory, Ser. A.

[3]  Balachandra Reddy Kandukuri,et al.  Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.

[4]  Jie Qiu,et al.  The Method and Tool of Cost Analysis for Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.

[5]  Jemal H. Abawajy,et al.  A Layered Security Approach for Cloud Computing Infrastructure , 2009, 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks.

[6]  Chris Rose,et al.  A Break in the Clouds: Towards a Cloud Definition , 2011 .

[7]  Siani Pearson,et al.  Privacy, Security and Trust Issues Arising from Cloud Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.

[8]  S. Agaian,et al.  Parametric Slant-Hadamard transforms with applications , 2002, IEEE Signal Processing Letters.

[9]  Giuseppe Di Battista,et al.  26 Computer Networks , 2004 .

[10]  Trent Jaeger,et al.  Outlook: Cloudy with a Chance of Security Challenges and Improvements , 2010, IEEE Security & Privacy.

[11]  Jennifer Seberry,et al.  On the Existence of Hadamard Matrices , 1976, J. Comb. Theory, Ser. A.

[12]  Leonard Kleinrock,et al.  An Internet vision: the invisible global infrastructure , 2003, Ad Hoc Networks.

[13]  Lakshmi Sobhana Kalli,et al.  Market-Oriented Cloud Computing : Vision , Hype , and Reality for Delivering IT Services as Computing , 2013 .