Cloud Computing for Secure Services in E-Government Architecture

被引:2
|
作者
Hashemi, Sajjad [1 ,2 ]
Monfaredi, Khalil [3 ]
Hashemi, Seyyed Yasser [3 ]
机构
[1] Islamic Azad Univ, Sama Tech & Vocat Training Coll, Dept Comp Engn, Miandoab Branch, Miandoab, Iran
[2] Islamic Azad Univ, Sama Tech & Vocat Training Coll, Dept Comp Engn, Sci & Res Branch,Miandoab Branch, West Azerbaijan, Iran
[3] Islamic Azad Univ, Dept Commun Engn, Miandoab Branch, Miandoab, Iran
关键词
Cloud Computing; E-Government; Secure Services;
D O I
10.4018/JITR.2015010104
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
E-government tries to take advantage of new technology to provide better service to citizens. Some of the main challenges in the face of E-government are query processing high volume applications, data center management, data security and E-government services. Cloud computing can be a good option for responding to these issues and fixing them, and guarantee the realization of E-government, with maximum efficiency and maximum safety. In this paper, the authors propose a novel architecture for E-government by using Cloud computing architecture which can largely increase the integrity and security service in E-government, and also increase users' confidence in the system and may lead to increased participation.
引用
收藏
页码:43 / 61
页数:19
相关论文
共 50 条
  • [41] Proposed Design for an E-government Web Portal Application using Cloud Computing
    Kurdi, Rabea
    Randles, Martin
    2013 SIXTH INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE), 2014, : 317 - 322
  • [42] The Adoption of Cloud Computing for e-Government Initiative in Regional Governments in Developing Countries
    Shareef, Shareef
    PROCEEDINGS OF THE 13TH EUROPEAN CONFERENCE ON EGOVERNMENT, 2013, : 453 - 461
  • [43] Policy and Legal Environment Analysis for e-Government Services Migration to the Public Cloud
    Kotka, Taavi
    Kask, Laura
    Raudsepp, Karoliina
    Starch, Tyson
    Radloff, Rebecca
    Liiv, Innar
    9TH INTERNATIONAL CONFERENCE ON THEORY AND PRACTICE OF ELECTRONIC GOVERNANCE (ICEGOV 2016), 2016, : 103 - 108
  • [44] Using Honeypots to Secure E-Government Networks
    Nikkhahan, Bahman
    Sohrabi, Sahar
    Mohammadi, Shahriar
    ADVANCES IN SECURITY TECHNOLOGY, 2009, 29 : 79 - 88
  • [45] Assessing Maturity for e-Government Services
    Ostasius, Egidijus
    COLLABORATIVE NETWORKS IN THE INTERNET OF SERVICES, 2012, 380 : 301 - 309
  • [46] DATA PROTECTION IN E-GOVERNMENT SERVICES
    Aced-Felez, Emilio
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2011, 3 (03): : 35 - 44
  • [47] AN INVESTIGATION OF E-GOVERNMENT SERVICES IN CHINA
    Tan, Margaret
    Deng Xiaoai
    Yang Qiushi
    Chen, Cheng
    ELECTRONIC JOURNAL OF INFORMATION SYSTEMS IN DEVELOPING COUNTRIES, 2013, 57 (01):
  • [48] INTEROPERABILITY SOLUTIONS FOR E-GOVERNMENT SERVICES
    Constantinescu, Radu
    INTERNATIONAL CONFERENCE ON INFORMATICS IN ECONOMY, 2013, : 295 - 301
  • [49] On the Origin of Intermediary E-Government Services
    Arendsen, Rex
    ter Hedde, Marc J.
    ELECTRONIC GOVERNMENT, PROCEEDINGS, 2009, 5693 : 270 - +
  • [50] Reference modelling for E-Government services
    Hinkelmann, K
    Thönssen, B
    Probst, F
    WIRTSCHAFTSINFORMATIK, 2005, 47 (05): : 356 - 366