{"title":"使用Hadamard矩阵的c -治理安全机制","authors":"K. Mukherjee, Gadadhar Sahoo","doi":"10.1109/ICCCT.2011.6075133","DOIUrl":null,"url":null,"abstract":"Cloud Computing has started an era of “shared based IT infrastructure”, in which large pools of computer systems are linked together to provide IT services on “pay per user basis”. It uses virtual resources and hence is not limited by the power and capabilities of local or remote computers. It transforms computer processing, data storage, and software applications, allowing them to be delivered as a utility to end users. But the overall technology is in its nascent stage of progression. There are lots of key issues like security, job scheduling, availability etc; which are to be addressed in order to make it a “mature technology”. Again we observe that for running Government machinery smoothly and transparently, e-Governance plays a significant role in it. But establishment of e-Governance is a costly affair. So, we propose a cloud computing based e-Governance i.e. C-Governance, for better execution of Government machinery at a lower cost compared to traditional e-Governance architecture. But the implementation of C-Governance needs strong security mechanism because the sensitive data goes beyond the boundary of Government organization. In this endeavor, we intend to throw light on security aspect of C-Governance using Hadamard matrices.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"30 5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Security mechanism for C-Governance using Hadamard matrices\",\"authors\":\"K. Mukherjee, Gadadhar Sahoo\",\"doi\":\"10.1109/ICCCT.2011.6075133\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud Computing has started an era of “shared based IT infrastructure”, in which large pools of computer systems are linked together to provide IT services on “pay per user basis”. It uses virtual resources and hence is not limited by the power and capabilities of local or remote computers. It transforms computer processing, data storage, and software applications, allowing them to be delivered as a utility to end users. But the overall technology is in its nascent stage of progression. There are lots of key issues like security, job scheduling, availability etc; which are to be addressed in order to make it a “mature technology”. Again we observe that for running Government machinery smoothly and transparently, e-Governance plays a significant role in it. But establishment of e-Governance is a costly affair. So, we propose a cloud computing based e-Governance i.e. C-Governance, for better execution of Government machinery at a lower cost compared to traditional e-Governance architecture. But the implementation of C-Governance needs strong security mechanism because the sensitive data goes beyond the boundary of Government organization. In this endeavor, we intend to throw light on security aspect of C-Governance using Hadamard matrices.\",\"PeriodicalId\":285986,\"journal\":{\"name\":\"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)\",\"volume\":\"30 5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-11-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCT.2011.6075133\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCT.2011.6075133","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security mechanism for C-Governance using Hadamard matrices
Cloud Computing has started an era of “shared based IT infrastructure”, in which large pools of computer systems are linked together to provide IT services on “pay per user basis”. It uses virtual resources and hence is not limited by the power and capabilities of local or remote computers. It transforms computer processing, data storage, and software applications, allowing them to be delivered as a utility to end users. But the overall technology is in its nascent stage of progression. There are lots of key issues like security, job scheduling, availability etc; which are to be addressed in order to make it a “mature technology”. Again we observe that for running Government machinery smoothly and transparently, e-Governance plays a significant role in it. But establishment of e-Governance is a costly affair. So, we propose a cloud computing based e-Governance i.e. C-Governance, for better execution of Government machinery at a lower cost compared to traditional e-Governance architecture. But the implementation of C-Governance needs strong security mechanism because the sensitive data goes beyond the boundary of Government organization. In this endeavor, we intend to throw light on security aspect of C-Governance using Hadamard matrices.