Enhancing E-Governance Security: The E-GovShield Model Integrating Advanced Cloud Technologies and Threat Mitigation Strategies
DOI:
https://doi.org/10.70162/mijarcse/2024/v10/i1/v10i101Keywords:
E-GovShield, e-governance, context-aware access control, quantum-resistant encryption, AI-based anomaly detection, compliance managementAbstract
In the contemporary digital era, e-governance has become essential for delivering government services, enhancing transparency, and fostering citizen engagement, yet integrating advanced security measures remains a challenge, particularly with cloud computing. This research introduces the E-GovShield model, an advanced e-governance framework that integrates robust cloud security technologies to ensure data protection, user privacy, and efficient service delivery. The model effectively mitigates various cyber-attacks, achieving success rates between 94% and 99%, with false positive rates below 3%, and rapid detection and mitigation times between 1 and 4 seconds. Under normal conditions, it handles document submissions, information retrievals, and transaction processes with response times of 150 ms, 100 ms, and 200 ms, respectively, and supports up to 10,000 concurrent users, demonstrating scalability and resilience even under peak loads. These findings significantly enhance the security and reliability of e-governance systems, fostering greater public trust and regulatory compliance, while providing a benchmark for integrating advanced cloud security measures in digital governance frameworks and other sectors seeking to secure their digital infrastructure.
References
D. Ferraiolo, J. Cugini, and D. R. Kuhn, "Role-based access control (RBAC): Features and motivations," in Proc. 11th Annu. Comput. Secur. Appl. Conf., Dec. 1995, pp. 241–248.
R. Sandhu and Q. Munawer, "How to do discretionary access control using roles," in Proc. 3rd ACM Workshop Role-Based Access Control, Oct. 1998, pp. 47–54.
H. Lindqvist, Mandatory access control, Master’s thesis, Dept. Comput. Sci., Umea Univ., Umea, Sweden, 2006.
Y. Zhu, R. Yu, D. Ma, and W. C. C. Chu, "Cryptographic attribute-based access control (ABAC) for secure decision making of dynamic policy with multiauthority attribute tokens," IEEE Trans. Rel., vol. 68, no. 4, pp. 1330–1346, Dec. 2019.
V. Kotwal, S. Parsheera, and A. Kak, "Open data & digital identity: Lessons for Aadhaar," in 2017 ITU Kaleidoscope: Challenges for a Data-Driven Society (ITU K), Nov. 2017, pp. 1–8.
F. Shahzad, "State-of-the-art survey on cloud computing security challenges, approaches and solutions," Procedia Comput. Sci., vol. 37, pp. 357–362, 2014.
R. M. Ramli, "E-government implementation challenges in Malaysia and South Korea: A comparative study," Electron. J. Inf. Syst. Dev. Ctries., vol. 80, no. 1, pp. 1–26, 2017.
M. Brundage et al., "The malicious use of artificial intelligence: Forecasting, prevention, and mitigation," arXiv:1802.07228, Feb. 2018.
Y. K. Dwivedi, N. P. Rana, M. Tajvidi, D. Dennehy, and K. K. Kapoor, "E-Government Adoption Research: Analysing Challenges and Critical Success Factors," in Public Administration Reformation, Routledge, 2017, pp. 154–174.
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Role-based access control models," Computer, vol. 29, no. 2, pp. 38–47, Feb. 1996.
S. S. Rao, "Aadhaar and the right to privacy: An analysis of Puttaswamy judgment," Int. J. Law Inf. Technol., vol. 26, no. 4, pp. 327–348, 2018.
W. Drechsler, "Path-dependence in government and administration: The Estonian e-government case," Telemat. Inform., vol. 35, no. 1, pp. 64–75, 2018.
F. Bannister and R. Connolly, "ICT, public values and transformative government: A framework and programme for research," Gov. Inf. Q., vol. 36, no. 2, p. 101388, 2019.
H. J. Scholl, K. Barzilai-Nahon, J. H. Ahn, O. Popova, and P. Re, E-Government: A Special Issue of the Public Administration and Information Technology Journal. Springer, 2020.
M. Armbrust et al., "A view of cloud computing," Commun. ACM, vol. 53, no. 4, pp. 50–58, Apr. 2010.
K. E. Kushida, J. Murray, and J. Zysman, "Cloud computing: From scarcity to abundance," J. Ind. Compet. Trade, vol. 15, no. 1, pp. 5–19, 2015.
R. K. Ko, P. Jagadpramana, and M. Mowbray, "The cloud data security challenge," in 2011 IEEE World Congr. Services, 2011, pp. 517–520.
R. Buyya, C. Vecchiola, and S. T. Selvi, Mastering Cloud Computing: Foundations and Applications Programming. Morgan Kaufmann, 2019.
V. Ndou, "E-government for developing countries: Opportunities and challenges," Electron. J. Inf. Syst. Dev. Ctries., vol. 18, no. 1, pp. 1–24, 2004.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License (CC BY-NC 4.0). You may share and adapt the work for non-commercial purposes with appropriate attribution. For more details, visit https://creativecommons.org/licenses/by-nc/4.0/.