Enhancing the Security and Performance of Cloud for E-Governance Infrastructure: Secure E-MODI.
Hemraj Shobharam LamkucheVijaya Bhaskar KondaveetyVijaya Lakshmi SapparamShruti SinghRaj Deepak RajpurkarPublished in: Int. J. Cloud Appl. Comput. (2022)
Keyphrases
- security issues
- security services
- cloud computing
- security requirements
- security architecture
- computing infrastructure
- cloud services
- security level
- security mechanisms
- identity management
- security measures
- key management
- cloud storage
- security management
- information security
- private cloud
- data encryption
- security protocols
- public key infrastructure
- trusted computing
- computing platform
- stream cipher
- cryptographic protocols
- security model
- security analysis
- data security
- access control
- key exchange
- authentication mechanism
- security properties
- authentication protocol
- key exchange protocol
- key agreement protocol
- digital signature scheme
- public key encryption
- key agreement
- security patterns
- sensitive data
- integrity verification
- data management
- key distribution
- security policies
- encryption scheme
- mobile agent system
- electronic voting
- access control mechanism
- public key
- network security
- factors influencing
- public key cryptography
- diffie hellman
- user authentication
- virtual machine
- key establishment
- private key
- elliptic curve
- digital signature
- ad hoc networks
- smart card
- intrusion detection
- secure communication
- factor authentication
- e government
- wireless sensor networks