Secure E-Governance System To Preserve Justice And Right Decision Making Using Cloud Computing

S. Gomathi, Delphia. I, J. Vijayalakshmi
{"title":"Secure E-Governance System To Preserve Justice And Right Decision Making Using Cloud Computing","authors":"S. Gomathi, Delphia. I, J. Vijayalakshmi","doi":"10.1109/ICCCT53315.2021.9711821","DOIUrl":null,"url":null,"abstract":"Nowadays in several criminal cases the progress makes us to think whether justice persists. In existing system, many news, and articles state that the victim data is manipulated, and records are changed by the officials. To address this issue, this paper proposes a secure system rendering justice with transparency which makes the court decision making easy. In the proposed Justice Secure Model, the victim voice data and records are prevented from data tampering using security policies. The criminal voice data are transformed into text using Hidden Markov Model (HMM). The voice data and records are secured by encrypting using Secured Hash Algorithm (SHA 256). To validate the access request, each victim records are embedded with private key. These private keys are securely transmitted by encrypting using modified AES algorithm. The above steps would avoid the internal data tampering and manipulating the victim case data. To address the external intrusion, our proposed methodology detects and prevent SQL injection attacks. Finally, to provide security of data at the server level, we have integrated multiple cloud storage system. The proposed system provide security at the application and server levels, thus making the unauthorized data access, intrusion, and data manipulation impossible.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCT53315.2021.9711821","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Nowadays in several criminal cases the progress makes us to think whether justice persists. In existing system, many news, and articles state that the victim data is manipulated, and records are changed by the officials. To address this issue, this paper proposes a secure system rendering justice with transparency which makes the court decision making easy. In the proposed Justice Secure Model, the victim voice data and records are prevented from data tampering using security policies. The criminal voice data are transformed into text using Hidden Markov Model (HMM). The voice data and records are secured by encrypting using Secured Hash Algorithm (SHA 256). To validate the access request, each victim records are embedded with private key. These private keys are securely transmitted by encrypting using modified AES algorithm. The above steps would avoid the internal data tampering and manipulating the victim case data. To address the external intrusion, our proposed methodology detects and prevent SQL injection attacks. Finally, to provide security of data at the server level, we have integrated multiple cloud storage system. The proposed system provide security at the application and server levels, thus making the unauthorized data access, intrusion, and data manipulation impossible.
使用云计算的安全电子政务系统维护正义和正确决策
目前在几起刑事案件中的进展使我们思考正义是否持久。在现有的制度中,许多新闻和文章都说受害者数据被操纵,记录被官员更改。为了解决这一问题,本文提出了一个安全的制度,使司法透明,使法院决策容易。在提出的司法安全模型中,使用安全策略防止受害者的语音数据和记录被篡改。利用隐马尔可夫模型(HMM)将犯罪语音数据转换为文本。语音数据和记录采用安全哈希算法(SHA 256)加密保护。为了验证访问请求,每个受害者记录都嵌入了私钥。这些私钥通过使用改进的AES算法加密来安全传输。上述步骤将避免内部数据篡改和操纵受害者案件数据。为了解决外部入侵,我们提出的方法检测和防止SQL注入攻击。最后,为了提供服务器层面的数据安全,我们集成了多个云存储系统。所建议的系统在应用程序和服务器级别提供安全性,从而使未经授权的数据访问、入侵和数据操纵成为不可能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信