{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T08:26:32Z","timestamp":1761294392751},"reference-count":68,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,5]]},"abstract":"<p>E-Governance is getting momentous in India. Over the years, e-Governance has played a major part in every sphere of the economy. In this paper, we have proposed E-MODI (E-governance model for open distributed infrastructure) a centralized e-Governance system for government of India, the implementation of this system is technically based on open distributed infrastructure which comprises of various government bodies in one single centralized unit. Our proposed model identifies three different patterns of cloud computing which are DGC, SGC and CGC. In addition, readiness assessment of the services needs to migrate into cloud. In this paper, we propose energy efficient VM allocation algorithm to achieve higher energy efficiency in large scale cloud data centers when system on optimum mode. Our objectives have been explained in details and experiments were designed to demonstrate the robustness of the multi-layered security which is an integration of High secure lightweight block cipher CSL along with Ultra powerful BLAKE3 hashing function in order to maintain information security triad.<\/p>","DOI":"10.4018\/ijcac.2022010108","type":"journal-article","created":{"date-parts":[[2021,11,5]],"date-time":"2021-11-05T16:44:21Z","timestamp":1636130661000},"page":"1-23","source":"Crossref","is-referenced-by-count":15,"title":["Enhancing the Security and Performance of Cloud for E-Governance Infrastructure"],"prefix":"10.4018","volume":"12","author":[{"given":"Hemraj Shobharam","family":"Lamkuche","sequence":"first","affiliation":[{"name":"Symbiosis Centre for Information Technology, Symbiosis International University (Deemed), India"}]},{"given":"Vijaya Bhaskar","family":"Kondaveety","sequence":"additional","affiliation":[{"name":"Symbiosis Centre for Information Technology, Symbiosis International University (Deemed), India"}]},{"given":"Vijaya Lakshmi","family":"Sapparam","sequence":"additional","affiliation":[{"name":"Symbiosis Centre for Information Technology, Symbiosis International University (Deemed), India"}]},{"given":"Shruti","family":"Singh","sequence":"additional","affiliation":[{"name":"Symbiosis Centre for Information Technology, Symbiosis International University (Deemed), India"}]},{"given":"Raj Deepak","family":"Rajpurkar","sequence":"additional","affiliation":[{"name":"Symbiosis Centre for Information Technology, Symbiosis International University (Deemed), India"}]}],"member":"2432","reference":[{"key":"IJCAC.2022010108-0","doi-asserted-by":"publisher","DOI":"10.1145\/2428736.2428788"},{"key":"IJCAC.2022010108-1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-41411-9_3"},{"key":"IJCAC.2022010108-2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-2209-8"},{"key":"IJCAC.2022010108-3","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-1082-7.ch008"},{"issue":"1492","key":"IJCAC.2022010108-4","first-page":"1","article-title":"Too Much Crypto. IACR Cryptol","volume":"2019","author":"J.Aumasson","year":"2019","journal-title":"Cryptology EPrint Archive"},{"key":"IJCAC.2022010108-5","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2003.1261225"},{"key":"IJCAC.2022010108-6","doi-asserted-by":"publisher","DOI":"10.4018\/ijssci.2017010102"},{"key":"IJCAC.2022010108-7","unstructured":"Badger, L., Patt-corner, R., & Voas, J. (2012). Cloud Computing Synopsis and Recommendations Recommendations of the National Institute of Standards and Technology. National Institute of Standards and Technology - Special Publication - NIST-SP-800-146, 800(146), 1\u201381. 2012"},{"issue":"3","key":"IJCAC.2022010108-8","first-page":"167","article-title":"Improved Boomerang Attacks on Round-Reduced SM3 and BLAKE-256.","volume":"9","author":"D.Bai","year":"2013","journal-title":"IACR Cryptology EPrint Archive"},{"key":"IJCAC.2022010108-9","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2013.0380"},{"issue":"1","key":"IJCAC.2022010108-10","first-page":"619","article-title":"Cloud Computing for e-Governance","volume":"8","author":"H.Belwal","year":"2017","journal-title":"Indian Perspective."},{"key":"IJCAC.2022010108-11","unstructured":"Bernstein, D. J. (2008). ChaCha, a variant of Salsa20. Workshop Record of SASC, 8(1), 3\u20135."},{"issue":"4","key":"IJCAC.2022010108-12","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/BF00203965","article-title":"New types of cryptanalytic attacks using related keys.","volume":"7","author":"E.Biham","year":"1994","journal-title":"Journal of Cryptology"},{"key":"IJCAC.2022010108-13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10366-7_1"},{"key":"IJCAC.2022010108-14","doi-asserted-by":"publisher","DOI":"10.1109\/HPCSIM.2009.5192685"},{"key":"IJCAC.2022010108-15","doi-asserted-by":"crossref","unstructured":"Canright, D. (2005). A Very Compact S-Box for AES. Cryptographic Hardware and Embedded Systems \u2013 CHES 2005, 3659, 441\u2013455.","DOI":"10.1007\/11545262_32"},{"key":"IJCAC.2022010108-16","unstructured":"Connor, Aumasson, Neves, & Wilcox-O\u2019Hearn. (2020). BLAKE3: One Function, Fast Everywhere. https:\/\/github.com\/BLAKE3-team\/BLAKE3-specs\/blob\/master\/blake3.pdf"},{"key":"IJCAC.2022010108-17","doi-asserted-by":"publisher","DOI":"10.4018\/ijcac.2020070105"},{"key":"IJCAC.2022010108-18","unstructured":"Daemen, J. (1995). Cipher and Hash Function Design Strategies Based on Linear and Differential Cryptanalysis [Doctoral dissertation]. Radboud University. http:\/\/jda.noekeon.org\/JDA_Thesis_1995.pdf"},{"key":"IJCAC.2022010108-19","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.05.274"},{"key":"IJCAC.2022010108-20","doi-asserted-by":"publisher","DOI":"10.4018\/ijcac.2020040104"},{"key":"IJCAC.2022010108-21","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.02.016"},{"key":"IJCAC.2022010108-22","unstructured":"FIPS. (2001). FIPS-197: Advanced Encryption Standard (AES). Federal Information Processing Standards, 197(441), 1\u201351."},{"key":"IJCAC.2022010108-23","unstructured":"Fortune, B. (2020). Cloud Computing Market Size - Report ID: FBI102697. Business Fortune Insights. https:\/\/www.fortunebusinessinsights.com\/cloud-computing-market-102697"},{"key":"IJCAC.2022010108-24","doi-asserted-by":"publisher","DOI":"10.1007\/11915034_71"},{"key":"IJCAC.2022010108-25","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2012.06.412"},{"key":"IJCAC.2022010108-26","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2013.6637286"},{"key":"IJCAC.2022010108-27","unstructured":"Hemraj, L., Vijaya, B., Vijaya, L., Shruti, S., & Raj, R. (2019). E-MODI: E-Governance Model using Open Distributed Infrastructure. The 3rd International Research Conference on Emerging Information Technology and Engineering Solutions - EITES 2019, 1(1), 1\u20137."},{"key":"IJCAC.2022010108-28","unstructured":"ISC. (2019). Internet Systems Consortium, Internet Domain Survey. Internet Domain Survey. http:\/\/ftp.isc.org\/www\/survey\/reports\/current\/"},{"key":"IJCAC.2022010108-29","doi-asserted-by":"publisher","DOI":"10.1109\/ICEETS.2013.6533519"},{"key":"IJCAC.2022010108-30","doi-asserted-by":"publisher","DOI":"10.4018\/ijcac.2019010105"},{"key":"IJCAC.2022010108-31","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2644"},{"key":"IJCAC.2022010108-32","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.208"},{"key":"IJCAC.2022010108-33","doi-asserted-by":"publisher","DOI":"10.4018\/ijcac.2019100102"},{"issue":"January","key":"IJCAC.2022010108-34","first-page":"161","article-title":"La cryptographie militaire (\u201cMilitary Cryptography\u201d).","volume":"9","author":"A.Kerckhoffs","year":"1883","journal-title":"Journal Des Sciences Militaires"},{"issue":"12","key":"IJCAC.2022010108-35","doi-asserted-by":"crossref","first-page":"60","DOI":"10.5815\/ijcnis.2015.12.07","article-title":"FPGA Implementation of Secure Force (64-Bit) Low Complexity Encryption Algorithm.","volume":"7","author":"S.Khan","year":"2015","journal-title":"International Journal of Computer Network and Information Security"},{"key":"IJCAC.2022010108-36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17342-4_5"},{"key":"IJCAC.2022010108-37","doi-asserted-by":"crossref","unstructured":"Kohl, J., & Neuman, C. (1993). The Kerberos Network Authentication Service. In The Kerberos network authentication service (V5). RFC 1510.","DOI":"10.17487\/rfc1510"},{"key":"IJCAC.2022010108-38","doi-asserted-by":"crossref","unstructured":"Kopal, N., Kieselmann, O., Wacker, A., & Esslinger, B. (2014). CrypTool 2.0. Datenschutz Und Datensicherheit - DuD, 38(10), 701\u2013708.","DOI":"10.1007\/s11623-014-0274-7"},{"key":"IJCAC.2022010108-39","first-page":"171","article-title":"An E Governance model using cloud computing technology for Developing Countries.","author":"M.Kumar","year":"2013","journal-title":"Proceedings of the International Conference on E-Learning, e-Business, Enterprise Information Systems, and e-Government (EEE),"},{"key":"IJCAC.2022010108-40","doi-asserted-by":"publisher","DOI":"10.5120\/12858-9577"},{"key":"IJCAC.2022010108-41","doi-asserted-by":"publisher","DOI":"10.1504\/IJICS.2020.105185"},{"key":"IJCAC.2022010108-42","doi-asserted-by":"publisher","DOI":"10.35940\/ijitee.K1088.09811S19"},{"key":"IJCAC.2022010108-43","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMM.411-414.2157"},{"key":"IJCAC.2022010108-44","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.02.034"},{"key":"IJCAC.2022010108-45","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-8632-8.ch047"},{"key":"IJCAC.2022010108-46","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"IJCAC.2022010108-47","doi-asserted-by":"publisher","DOI":"10.1108\/JSIT-01-2016-0001"},{"key":"IJCAC.2022010108-48","doi-asserted-by":"publisher","DOI":"10.4018\/ijcac.2020070103"},{"key":"IJCAC.2022010108-49","doi-asserted-by":"publisher","DOI":"10.6633\/IJNS.201711.19(6).22"},{"key":"IJCAC.2022010108-50","doi-asserted-by":"publisher","DOI":"10.4018\/ijcac.2018010106"},{"key":"IJCAC.2022010108-51","unstructured":"Planning Commission & Government of India. (1985). National e-governance plan. Seventh Five Year Plan 1985-1990. Author."},{"key":"IJCAC.2022010108-52","unstructured":"Portal, V. (2020). e-Governance in India. Centre for Development of Advanced Computing (C-DAC). https:\/\/vikaspedia.in\/e-governance\/national-e-governance-plan"},{"key":"IJCAC.2022010108-53","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.55"},{"issue":"6","key":"IJCAC.2022010108-54","first-page":"1093","article-title":"An efficient privacy preserving public auditing mechanism for secure cloud storage.","volume":"12","author":"M. Z.Salem","year":"2017","journal-title":"International Journal of Applied Engineering Research: IJAER"},{"issue":"1","key":"IJCAC.2022010108-55","doi-asserted-by":"crossref","first-page":"30","DOI":"10.17687\/JEB.0301.03","article-title":"Factors influencing cloud computing adoption in the public sector: An empirical analysis.","volume":"3","author":"H.Sallehudin","year":"2015","journal-title":"Journal of Entrepreneurship and Business"},{"key":"IJCAC.2022010108-56","doi-asserted-by":"publisher","DOI":"10.4018\/ijcac.2020010104"},{"key":"IJCAC.2022010108-57","doi-asserted-by":"crossref","unstructured":"Satoh, A., Morioka, S., Takano, K., & Munetoh, S. (2001). A Compact Rijndael Hardware Architecture with S-Box Optimization. Advances in Cryptology \u2014 ASIACRYPT 2001, 2248, 239\u2013254.","DOI":"10.1007\/3-540-45682-1_15"},{"issue":"4","key":"IJCAC.2022010108-58","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","article-title":"Communication Theory of Secrecy Systems.","volume":"28","author":"C. E.Shannon","year":"1949","journal-title":"The Bell System Technical Journal"},{"issue":"12","key":"IJCAC.2022010108-59","first-page":"410","article-title":"Green Computing: Protect Our Environment from Computer and its Devices. COMPUSOFT","volume":"2","author":"J.Siddiqui","year":"2013","journal-title":"International Journal of Advancements in Computing Technology"},{"issue":"4","key":"IJCAC.2022010108-60","first-page":"2278","article-title":"Evolving E-Governance through Cloud Computing based environment.","volume":"3","author":"V. J.Singh","year":"2014","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering"},{"issue":"2","key":"IJCAC.2022010108-61","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1080\/01611190903185401","article-title":"NIST block cipher modes of operation for confidentiality.","volume":"34","author":"W.Stallings","year":"2010","journal-title":"Cryptologia"},{"issue":"Winter","key":"IJCAC.2022010108-62","first-page":"191","article-title":"Kerberos: An Authentication Service for Open Network Systems.","author":"J.Steiner","year":"1988","journal-title":"USENIX"},{"key":"IJCAC.2022010108-63","doi-asserted-by":"publisher","DOI":"10.4018\/ijcac.2018100104"},{"key":"IJCAC.2022010108-64","doi-asserted-by":"publisher","DOI":"10.4018\/ijcac.2018010101"},{"key":"IJCAC.2022010108-65","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2458273"},{"key":"IJCAC.2022010108-66","doi-asserted-by":"publisher","DOI":"10.1109\/MMIT.2010.186"},{"key":"IJCAC.2022010108-67","doi-asserted-by":"publisher","DOI":"10.4018\/ijcac.2017040105"}],"container-title":["International Journal of Cloud Applications and Computing"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=284499","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,28]],"date-time":"2023-04-28T16:22:14Z","timestamp":1682698934000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJCAC.2022010108"}},"subtitle":["Secure E-MODI"],"short-title":[],"issued":{"date-parts":[[2021,11,5]]},"references-count":68,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcac.2022010108","relation":{},"ISSN":["2156-1834","2156-1826"],"issn-type":[{"value":"2156-1834","type":"print"},{"value":"2156-1826","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,5]]}}}