Article Preview
TopIntroduction
The cloud system allows cloud users to create and store information (or data) to cloud service providers, and also it provides an ability to develop and execute cloud applications using cloud infrastructure as a service. A report published by allcloud the Cloud infrastructure report 2020, out of the world’s total organization, 85% of the organization will migrate their traditional system from physical infrastructure to cloud infrastructure to minimize Capex and Opex, maximize the return on investment (ROI), and performance. The published report shows, 49.3% of the organization more comfortable with Microsoft Azure, 40.1% of the organization primarily associated with the Google cloud platform, IBM Cloud, and Oracle cloud collaboratively shared 52.6% of the organizations (AllCloud, 2020). The fortune business insights estimated that the global Cloud market will reach $199.01 billion at the end of 2020, and surpass $760.98 billion by 2027, unveiling a compound annual growth rate (CAGR) of 18.6% (Fortune, 2020). The global survey of internet system consortium states that 1012 million active hosts are connected to the domain name system (ISC, 2019). Data security is a major concern in information security which can be achieved through the method of encoding information into unreadable form. The ciphertext is again decrypted using a decryption algorithm to regain the original plain text information. (Shannon, 1949; Stallings, 2010).
The National e-Governance Plan (NeGP) takes a comprehensive assessment of e-governance initiatives in the entire country. It aims to upgrade the distribution of Government services to businesses and citizens. Within e-governance, there is Government 2 Government (G2G), Government 2 Business (G2B), Government 2 Employees (G2E), Government 2 Citizen (G2C) services are available as well (Dash & Pani, 2016). In most of these cases, sensitive data is being transmitted over the wired or wireless medium through the internet. Thus, security is a major concern to any organization and to resist the system against known cryptanalytic outbreaks to secure data over the world wide web (Belwal & Sharma, 2017; Planning Commission & Government of India, 1985).
This article is purely based on open distributed infrastructure which encompasses various government bodies. MODI 2.0 is a framework for incorporating government schemes, policies, and services on a digital platform using cloud-based technology and secure infrastructure. The implementation of the proposed system is purely based on open distributed infrastructure which encompasses various government bodies like District level, State level, and Central level services into a secure centralized system. This work proposes three new approaches: a progressive e-governance approach for the Government of India, an energy-efficient process for optimizing virtual machines, and enable smart security framework for the proposed system. Therefore, the main contributions of this paper are summarized as follows:
- •
A multi-layered E-governance model to fulfill the innovative "Digital India" Plan of the Government of India for providing digital services from metro to village.
- •
Proposed an energy-efficient algorithm for optimizing power consumption in virtual machines at data centers.
- •
Enable energy-efficient security framework to minimize security threats and vulnerabilities at low-cost implementation to achieve high performance.
The following article is systematized as follows: the next section presents the background study and related work on the technology involved in setting up the E-governance system. Section 3 outline the proposed model and secure framework implementation of the E-governance system in India. Section 4 outlines the implementation and results in which the authors have introduced an energy-efficient algorithm for power optimization in the allocation of virtual machines for cloud users by cloud service providers. Finally, this paper ends with the conclusion and future work.