使用Hadamard矩阵的c -治理安全机制

K. Mukherjee, Gadadhar Sahoo
{"title":"使用Hadamard矩阵的c -治理安全机制","authors":"K. Mukherjee, Gadadhar Sahoo","doi":"10.1109/ICCCT.2011.6075133","DOIUrl":null,"url":null,"abstract":"Cloud Computing has started an era of “shared based IT infrastructure”, in which large pools of computer systems are linked together to provide IT services on “pay per user basis”. It uses virtual resources and hence is not limited by the power and capabilities of local or remote computers. It transforms computer processing, data storage, and software applications, allowing them to be delivered as a utility to end users. But the overall technology is in its nascent stage of progression. There are lots of key issues like security, job scheduling, availability etc; which are to be addressed in order to make it a “mature technology”. Again we observe that for running Government machinery smoothly and transparently, e-Governance plays a significant role in it. But establishment of e-Governance is a costly affair. So, we propose a cloud computing based e-Governance i.e. C-Governance, for better execution of Government machinery at a lower cost compared to traditional e-Governance architecture. But the implementation of C-Governance needs strong security mechanism because the sensitive data goes beyond the boundary of Government organization. In this endeavor, we intend to throw light on security aspect of C-Governance using Hadamard matrices.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"30 5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Security mechanism for C-Governance using Hadamard matrices\",\"authors\":\"K. Mukherjee, Gadadhar Sahoo\",\"doi\":\"10.1109/ICCCT.2011.6075133\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud Computing has started an era of “shared based IT infrastructure”, in which large pools of computer systems are linked together to provide IT services on “pay per user basis”. It uses virtual resources and hence is not limited by the power and capabilities of local or remote computers. It transforms computer processing, data storage, and software applications, allowing them to be delivered as a utility to end users. But the overall technology is in its nascent stage of progression. There are lots of key issues like security, job scheduling, availability etc; which are to be addressed in order to make it a “mature technology”. Again we observe that for running Government machinery smoothly and transparently, e-Governance plays a significant role in it. But establishment of e-Governance is a costly affair. So, we propose a cloud computing based e-Governance i.e. C-Governance, for better execution of Government machinery at a lower cost compared to traditional e-Governance architecture. But the implementation of C-Governance needs strong security mechanism because the sensitive data goes beyond the boundary of Government organization. In this endeavor, we intend to throw light on security aspect of C-Governance using Hadamard matrices.\",\"PeriodicalId\":285986,\"journal\":{\"name\":\"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)\",\"volume\":\"30 5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-11-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCT.2011.6075133\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCT.2011.6075133","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

云计算开启了一个“基于共享的IT基础设施”时代,在这个时代,大量的计算机系统被连接在一起,以“按用户付费”的方式提供IT服务。它使用虚拟资源,因此不受本地或远程计算机的功能和能力的限制。它转换了计算机处理、数据存储和软件应用程序,使它们能够作为实用程序交付给最终用户。但整体技术仍处于发展的初级阶段。有很多关键问题,如安全性、作业调度、可用性等;为了使其成为一项“成熟的技术”,这些问题都需要加以解决。我们再次观察到,要使政府机构运作顺利和透明,电子政务在其中扮演重要角色。但是建立电子政务是一件昂贵的事情。因此,我们提出了一种基于云计算的电子政务,即c -治理,与传统的电子政务架构相比,它可以以更低的成本更好地执行政府机器。但由于敏感数据超出了政府组织的边界,C-Governance的实施需要强大的安全机制。在这一努力中,我们打算使用Hadamard矩阵来阐明C-Governance的安全方面。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Security mechanism for C-Governance using Hadamard matrices
Cloud Computing has started an era of “shared based IT infrastructure”, in which large pools of computer systems are linked together to provide IT services on “pay per user basis”. It uses virtual resources and hence is not limited by the power and capabilities of local or remote computers. It transforms computer processing, data storage, and software applications, allowing them to be delivered as a utility to end users. But the overall technology is in its nascent stage of progression. There are lots of key issues like security, job scheduling, availability etc; which are to be addressed in order to make it a “mature technology”. Again we observe that for running Government machinery smoothly and transparently, e-Governance plays a significant role in it. But establishment of e-Governance is a costly affair. So, we propose a cloud computing based e-Governance i.e. C-Governance, for better execution of Government machinery at a lower cost compared to traditional e-Governance architecture. But the implementation of C-Governance needs strong security mechanism because the sensitive data goes beyond the boundary of Government organization. In this endeavor, we intend to throw light on security aspect of C-Governance using Hadamard matrices.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信