You are on page 1of 8

International Conference on Research and Innovations in Computational Intelligence RICI 2019, 4th February, 2019

Digital Trends in Artificial Intelligence


T. Rakhitha, A. Neha Sharma and Dr. D. GayathriDevi

Abstract---Artificial intelligence has shown an upward trend of that will mark web pages as malicious or non- malicious in
growth in this digital era. The increase in trend of artificial real-time with the help of AI [11].
intelligence has advanced the development of human society in our
time, with dramatic revolutions shaped by both theories and
techniques Artificial Intelligence (AI) has a future tech reputation II. AI AND TRENDS
that can probably speak for itself. In this paper we have composed A. Pepper Robot
various applications of Artificial intelligence with real time projects.
In 2010, Japan’s Softbank telecom operations partnered
with French robotic manufacturer Aldebaran to develop
Keywords---AI, Deep Learning, Data Analytics, Natural
Language Processing, Robotic. Pepper (Fig.1), a humanoid robot that can interact with
customers and “perceive human emotions.” Pepper is already
I. INTRODUCTION popular in Japan, where it’s used as a customer service greeter
and representative in 140 Softbank mobile stores. According
URING 2018, Humans witnessed a dramatic rise in tools,
D platforms and applications based on Artificial
intelligence and Machine learning. These technologies
to Soft banks Robotics America, a pilot of the Pepper in
California’s b88ta stores in both Palo Alto and Santa Monica
yielded a 70% increase in foot traffic in Palo Alto, and 50% of
impacted many software and Internet industry. Artificial
Neo-pen sales in Santa Monica were attributed to Pepper.
Intelligence is reached in our day-to –day life. Moreover, with
Additionally, the AI creation spent time at hip apparel store
a breakneck speed. From 80’s to now [1],
the Ave, where the retailer experienced a 98% increase in
Artificial Intelligence is now part of our everyday lives it’s
customer interactions, a 20% increase in foot traffic and a
very hard to believe. But it is becoming more intelligent and
300% increase in revenue.
accepted every day. Also with lots of business Opportunities.
While not the only retail robot in use, in-store robots like
Many companies such as Amazon, Apple, Facebook, Google,
Pepper appear to at least initially boost store interest and sales.
IBM and Microsoft are investing in research and development
Whether this is a novel effect that will wear off once retail
of AI, which will benefit the ecosystem in bringing AI closer
robots become “the norm” remains to be determined.
to consumers. Artificial Intelligence consists of related
technologies that try to simulate and reproduce human thought
and behaviour. Includes thinking, speaking, feeling, and
reasoning. Artificial intelligence is possibly the most powerful
field in robotics. Robotics has made a lot of progress with
limited AI. Today's AI machines can replicate some specific
elements of intellectual ability. Some modern robots also have
the ability to learn in a limited capacity. Some robots
can interact socially. Robots will certainly play a larger role in Fig.1. Pepper-Semi-Humanoid Robot
our daily lives in the future. In the coming decades, robots will
gradually move out of the industrial and scientific worlds and B. Conversica
into daily life, in the same way that computers spread to the Conversica “sales assistant” software is designed to
home in the 1980s [6].Some of the Artificial intelligence’s automate and enhance sales operations processes by
successful projects such as Pepper bot, Conversica, Domino’s identifying and conversing with internet leads. The sales lead
Robotic Unit (DRU), Amazon Drones, Self-Driving Cars, and Management Company claims the authentic-sounding
Sophia robot have shown their innovation in science, messages result in an average engagement rate of 35%.
engineering and artistry. In this digital era the number of cyber In one case study, Star2Star Communications implemented
threats is increasing rapidly .Now a days internet has become a its Conversica-powered sales rep “Rachel” in 2016 and saw
part of our day to day life. The process of detecting the a 30% email response rate within hours. The customizable
malicious websites is done with the help of binary classifier sales assistant software is also used to cross-sell or re-engages
existing leads. New England-based Boch Automotive also
employed Conversica software, which it attributed to an
T. Rakhitha, Student, Department of Computer Science, Sri Ramakrishna
CAS for Women, Bharathiar University average 60-sale increase per month at one Toyota dealership.
A. Neha Sharma, Student, Department of Computer Science, Sri North Face has also adopted IBM Watson’s cognitive
Ramakrishna CAS for Women, Bharathiar University computing technology to help consumers determine what
Dr. D. GayathriDevi, Associate Professor, Department of Computer
Science, Sri Ramakrishna CAS for Women, Bharathiar University

ISBN 978-81-939960-1-0 © 2019 Published by Coimbatore Institute of Information Technology 20


International Conference on Research and Innovations in Computational Intelligence RICI 2019, 4th February, 2019

jacket is best for them, based on variables like location and F. Amazon Drones
gender preference. Amazon’s “Prime Air” is described as a future delivery
C. Brilliant Manufacturing system for safely transporting and delivering up to 5-pound
packages in less than 30 minutes.
General Electric’s (GE) Brilliant Manufacturing software,
The first 13-minute unmanned flight by Amazon took place
in part inspired by GE’s relationships with client
on December 2016, as seen in the video below. At present,
manufacturing companies over the past two decades, was
determining proper safety and reliability of operations and
designed to make the entire manufacturing process—from
systems is Amazon’s top priority. Amazon notes that it’s
design to distribution and services—more efficient and hence
working with regulators in “various countries”, though there
save big costs over time. The software includes a suite of
haven’t been any updates on forecasted dates for commercial
analytics and operational intelligence tools appropriate for a
use. Similar to Domino’s DRU concept, it seems possible that
range of manufacturers [4].
autonomous delivery of goods and food by air could be rolled
The WIP Manager software, for example, provides
out at scale within the next decade [12].
industrial and discrete manufacturers with plant-floor and
plant-wide collaborative visibility of all work in process. An G. Amazon Go
operational supervisor sitting behind a computer can now Amazon’s touted brick-and-mortar locations, known
identify in real-time a floor-based problem that arises in as Amazon Go, employ check-out-free technology that allow
workflow, rather than spending time making time-consuming customers to shop and leave Customers use the Amazon Go
walkthroughs of entire manufacturing facilities. app to check in, but thereafter the entire shopping experience
Toray Plastics is one example of a company that is using is designed to be automated. Sensors track which objects
GE’s Plant Applications product, which allows management customers pick up and put in their basket, and customers’
to collect granular-level data throughout production and Amazon accounts are automatically charged after exiting the
reduce defective products and wasted productivity. store.
D. Gakushu Learning Software The intended launch hasn’t been without its barriers, and at
the end of March 2017 sources close to the retail giant
Gakushu Learning software “Gakushu” means “learning”
announced that Amazon was delaying the opening of its
in Japanese embedded in manufacturing robots speeds up
convenience stores while it worked out “technology glitches”
“smart” operations on a specific task, originally designed
in the automated shopping and purchasing process.
for spot-welding and assembly lines. In 2016, Fanuc partnered
with Nvidia, with the goal of accelerating deep learning in H. PayPal
robots via Nvidia’s GPUs. Gakushu-endowed robots learn a Since 2013, PayPal has leveraged fraud detection
manufacturing task through use of a sensor that collects and algorithms to protect customer’s digital transactions. Over the
stores data. last few years, thousands of purchase patterns or “features”
The robots’ ability to adjust to real-time environmental have been learned by the security detection system, which can
conditions and adjust motion can (according to Fanuc) result now decipher between friends who are buying concert tickets
in up to 15 per cent cycle-time improvements in spot welding. simultaneously and a thief making the same kind of purchases
Once the robot’s learning process is complete (about 18 cycles with a list of stolen accounts [7].
later), the sensor is removed and the trained robots are then A referenced study by LexisNexis found PayPal’s deep
able to complete a task autonomously. learning approach to transaction security reduced fraud rate to
The robots learning is paired with vibration control in the 0.32% of revenue, which is 1% less than the average rate seen
form of an accelerometer that learns the robot’s motion and my most ecommerce merchants.
provides increased movement stability. Tesla has employed
about 600 Fanuc robots at its factory in Fremont, and I. Sophia
according to Bloomberg BusinessWeek put in a significant Sophia, a robot whose widespread appeal lies not in big,
order for more robots back in September 2016 in an effort to dramatic actions (her torso is often fixed to a rolling base), but
speed manufacturing efforts for the next slated delivery of its rather an unsettling human-like appearance (Fig .2),
Model 3 in July 2017[9]. compounded with the complex ability to express emotions.
Cameras within Sophia's eyes combined with computer
E. Domino’s Robotic Unit (DRU) algorithms allow her to see. It can follow faces, sustain eye
Domino’s claims that its prototype delivery robot can contact, and recognize individuals. It is able to process speech
keep food and drinks at the appropriate temperature, the and have conversations using a natural language subsystem
DRU’s sensors help it navigate a best travel path for delivery. [3]. Sophia did utilize AI methods including face
DRU integrates robotics technology previously used for tracking, emotion recognition, and robotic movements
military combat training. Domino’s doesn’t provide dates as to generated by deep neural networks. Sophia’s dialogue is
when the DRU might be rolled out on a commercial scale, but generated via a decision tree, but is integrated with these
it seems plausible that robotic delivery of food—and other outputs uniquely.
goods—could be a burgeoning reality within the next decade.

ISBN 978-81-939960-1-0 © 2019 Published by Coimbatore Institute of Information Technology 21


International Conference on Research and Innovations in Computational Intelligence RICI 2019, 4th February, 2019

done, whether that be making a dinner reservation or sending a


message.

III. PHISHING ATTACK DETECTION


Phishing continues to be a major concern, not only because
the rate of incidents is increasing, but also because attack
methods are becoming more sophisticatedas shown in figure
(Fig.4).

Fig.2.Sophia
J. Self-Driving Cars
A self-driving car which can also be called as a robot
Fig.4.Phishing Attack Rate
car, autonomous car, or driverless car, is a vehicle that is
capable of sensing its environment and moving with little or
no input. These cars combines a variety of sensors to perceive
Deep Learning is performed in an iterative fashion where a
their surroundings, such as radar, computer
cost function is optimized until acceptable convergence just
vision, Lidar, sonar, GPS, odometry and inertial measurement
like many other Machine Learning algorithms. The number of
units. Advanced control systems interpret sensory
training examples (here URLs) that are used at a time is one
information to identify appropriate navigation paths, as well as
important parameter in training a Deep Learning model [10].
obstacles and relevant signage [2].
Machine is trained using the pre-existing collection of data
K. Siri and it triggers when an error occurs. The process of detecting
Siri is Apple's voice-controlled personal assistant and she or the malicious websites is done with the help of binary
he has been around for several years now. Siri is based on the classifier that will mark web pages as malicious or non-
based on the fields of Artificial Intelligence and Natural malicious in real-time. Here we have assigned the value 0 to
Language Processing, and it is comprised of three components malicious websites and 1 to the non-malicious websites.
- a conversational interface, personal context awareness and Proposed software will give the solution to control the illegal
service delegation. The assistant first appeared on the iPhone access and strengthens the security system.
4S and it was described by Apple as the best thing on the
iPhone during the launch presentation as shown in figure IV. CONCLUSION
Fig.3. AI or artificial intelligence is the simulation of human
intelligence processes by machines, especially computer
systems. These processes include learning, reasoning and self-
correction. Some of the applications of AI include expert
systems, speech recognition and machine vision. Artificial
Intelligence is advancing dramatically [8]. It is already
transforming our world socially, economically and politically.
Artificial intelligence is an umbrella term that encompasses
everything from robotic process automation to actual robotics.
AI can perform tasks such as identifying patterns in the data
more efficiently than humans, enabling businesses to gain
more insight out of their data. With the help from AI, massive
amounts of data can be analysed to map poverty and climate
Fig.3.Siri in iPhone4S change, automate agricultural practices and irrigation,
individualize healthcare and learning, predict consumption
patterns, streamline energy-usage and waste-management.
As well as on iPhone, Siri is now also available on iPad, Phishing attack can be effectively detected and fixed by
iPod touch, Apple Watch, HomePod and the Mac As we training the machine with an already existing data set
mentioned, Siri is a built-in, voice-controlled personal (collection of URLs).
assistant available for Apple users. The idea is that you talk to In the future, predictive analytics and artificial intelligence
her as you would a friend and she aims to help you get things could play an even more fundamental role in content creation
and also in the software fields. Open source information and
artificial intelligence collection will provide opportunities for

ISBN 978-81-939960-1-0 © 2019 Published by Coimbatore Institute of Information Technology 22


International Conference on Research and Innovations in Computational Intelligence RICI 2019, 4th February, 2019

global technological parity and the technology of artificial can


become the future in all the domains of health, environment,
public safety and security.

REFERENCES
[1] AI, robotics, and automation: Put humans in the loop - 2018 Global
Human Capital Trends
https://www2.deloitte.com/insights/us/en/focus/human-capital-
trends/2018/ai-robotics-intelligent-machines.html
[2] ARTIFICIAL INTELLIGENCE THE NEXT DIGITAL FRONTIER? -
https://www.mckinsey.com/~/media/mckinsey/industries/advanced%20e
lectronics/our%20insights/how%20artificial%20intelligence%20can%20
deliver%20real%20value%20to%20companies/mgi-artificial-
intelligence-discussion-paper.ashx
[3] Blog.adext.com
[4] Conference Deep-Dive: Machine Learning, Data Science & Artificial
Intelligence - https://www.gartner.com/en/newsroom/press-
releases/2017-10-04-gartner-identifies-the-top-10-strategic-technology-
trends-for-2018
[5] Francis X. Govers "Artificial Intelligence for Robotics: Build intelligent
robots that perform human tasks using AI techniques", 30 Aug 2018
[6] J. lerk Maxwell, “Artificial intelligence the next digital frontier”,
unpublished
[7] K.Elissa,”Applying Artificial Intelligence Techniques to Prevent Cyber
Assaults”, unpublished
[8] Mick Benson "Artificial Intelligence: Concepts and Applications"
,Willford Press (May 16, 2018) , ISBN-10: 1682854094
[9] Scholar.google.co.in
[10] Terrence J. Sejnowski "The Deep Learning Revolution (The MIT
Press)", October 23, 2018
[11] Wilber Fankhauser "Artificial Intelligence Applications: Natural
Language Processing" November 11, 2015
[12] 2018 AI predictions 8 insights to shape business strategy -
https://www.pwc.es/es/publicaciones/tecnologia/assets/ai-predictions-
2018.pdf

ISBN 978-81-939960-1-0 © 2019 Published by Coimbatore Institute of Information Technology 23


International Conference on Research and Innovations in Computational Intelligence RICI 2019, 4th February, 2019

Amalgamation of Cloud Computing &


E-Government – New Approach
T. S. Benazir and Dr. D. Gayatri Devi

Abstract---In today’s era India being one among the developing bandwidth, security exposures and legal requirements is
countries is now facing revolution in e-government to serve smooth known to be a private cloud. In context, private cloud offer the
and simple services for their citizens. However, its quite challenging provider and the user greater control of the cloud
for the government sectors in adopting, implementing and using its e- infrastructure, improving security and resiliency because user
governments’ services. Few of the attributes of these challenges are
the infrastructure, refining present services or evolving innovative
access and the networks used are restricted and designated.
services; data and application accumulations, budget costs, software Community Cloud: A community cloud is cloud
licensing and support and difficulties in migration, integration and controlled and utilized by a gathering of associations that have
management for software and hardware. These encounters might lead shared interests, for example, explicit security prerequisites or
to the cause of failure in e-governments’ projects. a typical mission. The individuals from the network share
Therefore, a solution has to be defined to overcome these access to the information and applications in the cloud.
challenges. Cloud Computing paves a dynamic role as solution for
Hybrid Cloud: A hybrid cloud is a known to be the
these problems. This paper demonstrates the advantages of cloud
computing in solving e-government's challenges. This defined model combination of two or more clouds (private, community, or
could be categorised into three different patterns of cloud computing public) that remain unique entities but are bound together by
viz; Local Body Governmental Cloud “LBGC”, State Body standardized or proprietary technology that enables data and
Governmental Cloud “SBGC” and Central Body Governmental application portability.
Cloud “CBGC”. Henceforth the proposed model standardizes how
the IT infra bonds to each of three clouds. In addition, readiness III. APPLICABILITY ADOPTING CLOUD COMPUTING IN E-
assessment of the services needs to migrate into cloud. Finally, a set
GOVERNMENT
of recommended cloud aspects and their values for each of three
clouds are suggested that ensure implementation of the sorted Nonetheless, in light of our examination in related writing,
services. there are numerous inhibitors forestall using e-government; we
break down into specialized and nontechnical inhibitors:
I. INTRODUCTION Specialized inhibitors as: Duplication of utilizations and
N the most recent years the world has seen the wide information, lacking trade and logging subtleties of customer's
I propagation of e-governance in many nations considering its
advantages for the citizens and governments. For instance,
information, inhibitors as difficulties in migration, integration
and management for soft-ware and hardware, poor capabilities
e-governance helps in accessing holistic information of an with disaster recovery, auditing and logging, fragmentation of
individual, it also helps in upgrading to open administration resources and low asset utilization, software licensing and
conveyance and grow correspondence channels. For support, traditional infra-structure cannot scale, security and
governments, it builds efficiency, develops economy, remote privacy, and poor performance with rapidly changing in the
assessing and monitoring to the data. Though every one of system requirements.
these advantages for e-government, there are a considerable
lot of disadvantages for it. IV. OBSTACLES IN CLOUD E-GOVERNMENT
Although many previous benefits are found in utilizing
II. LITERATURE OVERVIEW cloud computing in e-government environment, there are still
Public Cloud: The services that are available to the clients many issues and challenges that need to be addressed. When
from a third party service provider through the internet is third parties are treating with and processing sensitive data
known as public cloud. By the name it doesn’t mean that especially in government sector, it is obvious that concerns
public cloud user's data is publically visible or free to use; related to trust would be there in the mind of e-government's
public cloud providers typically provide an access control stakeholders. Trust is an act of firm belief in reliability, con-
mechanism for their users. fidence, the capabilities and skills of others that you think you
Private Cloud: The data and processes that are managed can reasonably rely on them to care for your valuable assets
within the group without the constraints of network Trust is playing an important role in the success or failure of
e-government system that citizens should have confidence in
T. S. Benazir, Student, Department of Computer Science, Sri Ramakrishna it. Some of the challenges when adopting cloud computing in
College of Arts & Science for Women. E-Mail: benazir0607@gmail.com e-government are discussed below:
Dr. D. Gayatri Devi, Associate Professor, Department of Computer
Science, Sri Ramakrishna College of Arts & Science for Women. E-Mail:
gayathrics@srcw.ac.in

ISBN 978-81-939960-1-0 © 2019 Published by Coimbatore Institute of Information Technology 42


International Conference on Research and Innovations in Computational Intelligence RICI 2019, 4th February, 2019

A. Lack of Data Control V. PROPOSED HYBRID GOVERNMENTAL CLOUD


The first and obvious issue is the government losing control COMPUTING MODEL
and ownership of data. When we have less control over our A. Gathering the Services/Applications required to
assets then we trust the system less [41]. Since data are stored Migrate into Cloud
in the cloud, data will be located at third party data centers Firstly, we need to make many meetings with decision
where we have less control over data and the cloud computing makers in order to identify all departments and applications
providers have complete access to sensitive data. will be included in the new domain and to identify the project
B. Security and Privacy boundaries. In addition, collecting the services required to
In Cloud Computing data and information is not stored and migrate into cloud.
processed locally at the enterprise premises and the data are B. Classification the Services according to Some
accessed through an open network. In fact third parties are Domains (Functionality and Properties)
responsible for storing and processing of data at their own Before identifying which the services will be migrated to
sites [26]. In a situation like that individuals are concerned cloud and which will be delayed, we need to classify these
about the privacy of their personal data and information. services into number of main categories: Static services, dy-
When third parties are processing important data stored at namic services, costly services, cheap services, secret services,
remote ma-chines at various locations it is obvious people and fewer secret services.
would be worried about the privacy of their personal data There are many dependencies and overlaps between the
because it is a human right to secure their private and sensitive categories, such as the relations between the static services
information. and cheap services. In addition, there are relationships
C. System Failure between the categories of dynamic services and costly
Another potential issue is system failure, there are some services. Generally with perspective of IT professionals in
public services which should be available to citizens 24/7 but government and their possibilities and security considerations,
these services are unavailable to the citizens at some they can determine which service in which category.
times[35]. Also the performance issue, especially for data C. Services Readiness Assessment
intensive computation as client machines are geographically Governmental entity moves its e-services gradually from
distanced, which could be a thousand miles away from the traditional e-government into cloud technology. Therefore, we
cloud. Finally, internet speed will definitely affect the need to assess the readiness degree of all services required to
performance. The possibility of data transfer bottlenecks as the move into cloud. In this stage, we declare the categories of
intensity of data processing and transfer as well as the number services move to cloud firstly, which will be delayed some
of users accessing the data increase may complicate the time and which will not move and need to some substantial
performance and costs as data transfer consumes changes in the business and workflow, according to this pro-
communication bandwidth. posed model. Which identifying two dimensions impact and
D. Access Authorization resources availability for each service as shown below in
It is the responsibility of the cloud service provider to keep services with relatively high impact and high resource
the management interface secure from the unauthorized access availability are strong candidates to move to the cloud first
because the management functionality should be accessible by (area 1) then area 2 and finally the services in area 3;
few authorized administrators. Access authorization is For government: Cost saving to agencies in the form of
required in order to give access to authentic users through simpler and speedier transactions, helping reduce corruption,
claim base access control [29]. increases openness and trust in government, and thus
contributes to help in the reform economic and political
E. Data Leakage program, increasing effectiveness by productivity and grow
Data leakage can be also the main reason of discourage- economy, improving efficiency by making paper-work is so
ment for the government to use cloud based e-government simple, making daily processing tasks are easier and
system because it affects the trust of citizens and facilitation public administration operations, web-based
governmental organization in cloud based e-government applications can generate savings on efforts and time,
system [41]. E-government system contains sensitive data and providing data collection and transmission and pro-vision of
information about users and businesses therefore security of information and communication with customers, enhancing
the sensitive and secured data is important. accountability; ICT helps to increase information available for
people, make each one, each department and each
management judging himself and full support for IT staff,
concentration in the technical works only, more training and
experience and saving their time and effort.

ISBN 978-81-939960-1-0 © 2019 Published by Coimbatore Institute of Information Technology 43


International Conference on Research and Innovations in Computational Intelligence RICI 2019, 4th February, 2019

D. Governmental Cloud Implementation provides three basic delivery models of cloud computing
As, we proposes a conceptual hybrid model for adopting services SaaS, PaaS and IaaS. CBGC consists of three layers:
cloud computing in e-government consists of three computing 1) Front Layer: This layer is in the foreground of CBGC,
cloud; Local-Cloud computing, Regional-Cloud computing which is responsible for managing the users' registration,
and Wide-Cloud computing. The three cloud models are an- requirements, authentication, security, modification, pro-
alogs to the terms LAN (Local Area Network), MAN cessing, connecting with other layers and finally response
(Metropolitan Area Network) and WAN (Wide Area Network) the user. Front Layer consists of two types of users; entity
which are three types of the network designed to operate over (may be a provider or customer) and public user.
the area they cover in their functionality, operation and man- 2) Services Layer: This layer is responsible for provisioning,
agement. Each model allows devices to connect via any managing and automation all services users need. It con-
connector, integrate, communicate and collaborate applica- sists of three systems (Development, SaaS and GaaS); in
tions and data with different devices according to specifica- development system, user can use available tools and
tions, constraints and restrictions of each model. platforms to produce or customize any service he need,
Data mart and Knowledge management. In SaaS system,
Local Body Governmental Cloud (LBGC) user can use any available public service as email, change
LBGC is a classified cloud in which data and processes are management, ERP, virtualization management, Digital
managed within the organization or entity without the re- signature, Workflow, Web applications or any on the shelf
strictions of network bandwidth, security exposures and legal apps. In GaaS system, user can use the governmental
requirements because the users of this type are employees are service as voting, insurance, traffic or any other govern-
only located in the organization. In addition, LBGC provides mental system.
three basic delivery models of cloud computing services SaaS, 3) Physical Layer: This layer is base layer which represents
PaaS and IaaS, therefore it offers the provider and the user all physical elements/hardware users need on cloud ser-
greater control of the cloud infrastructure, applications, vice, including servers hosting, storage, network, and
improving security and resiliency because user access and the workstations.
networks used are restricted and designated. The links network
devices in such a way that connect workstations can share and E. Governmental Cloud Allocations
transmit data, tools and programs at a very fast rate as the This section determines recommended important aspects in
number of computers linked are limited. LBGC covers smaller cloud computing implementation. It identifies the most
geographical area and are privately owned by entity or e- appropriate proposed governmental cloud (LBGC, SBGC or
government organization which is easy to design and CBGC) for each e-service has a highly priority in (area 1).
maintain. Those practices are categorized into technical aspects, orga-
nizational aspects and environmental aspects. Each category
State Body Governmental Cloud (SBGC) contains a set of specifications with their recommended
SBGC is a combination cloud covers a larger geographical values.
area than that of a LBGC and smaller area as compared to
CBGC so the data transfer rate of SBGC is moderate therefore 1) Technical Aspects
the users of this cloud are external entities as customers, This category includes some specifications concentrate on
partners and suppliers. It connects two or more entities that technical view of services and their values for all three types
reside in the same or different cities; therefore it is controlled of governmental clouds. Services availability; it specifies the
and used by a group of organizations that have shared available boundaries of the end user can access the service.
interests, such as specific security requirements or a common Fragmentation of resources; it refers to the re-sources places
mission. It may serve a provider to another entity so it's hard required to deploy the service. Security; it indicates the
and costly to design and maintain and it may or may not be constrains and the techniques required to secure the service.
owned by a single organization. Finally, SBGC provides three Data scalability; it refers to ability of scaling in and out of the
basic delivery models of cloud computing services SaaS, PaaS data used in the service. Services customization; it refers to the
and IaaS. changes required in the service to be compatible with business
requirements. Disaster recovery; It is the manner and the cost
Central Body Governmental Cloud (CBGC) of the dealing with service in case of catastrophe. Applications
CBGC is a universal cloud allows all public users to utilize Integration; it refers to how the service can integrate with
its services. It extends over a large geographical area. Its legacy systems and other applications.
services are characterized as being available to clients from a
third party service provider via the internet. CBGC does not VI. CONCLUSION AND FUTURE WORK
mean that a user's data is publically visible or free to use; This paper reviewed some of e-government and cloud
public cloud vendors typically provide an access control computing specifications, discussed some obstacles may lead
mechanism for their users. Due to long distance transmission, to failure of e-governments' projects and how can cloud
the noise and error tend to be more in it. Propagation delay is computing overcome these difficulties. Also, it proposed an
one of the biggest problems faced here. Finally, WBGC abstract hybrid model to adapt cloud computing in e-govern-

ISBN 978-81-939960-1-0 © 2019 Published by Coimbatore Institute of Information Technology 44


International Conference on Research and Innovations in Computational Intelligence RICI 2019, 4th February, 2019

ment; which identifies and classifies e-services according to


specific domains. In addition, this proposed model identified
three types of governmental cloud computing; Local
BodyGovernmental Cloud “LBGC”, State Body
Governmental Cloud “SBGC” and Central BodyGovernmental
Cloud “CBGC”. It can deter-mine e-services readiness; which
e-service is ready now to migrate into cloud and which will be
delayed sometimes, therefore it prioritizes the e-services to be
migrated into pro-posed governmental clouds.

REFERENCES
[1] Singh H, A. P. S. N. Campus. Technology transfer model to migrate e-
governance to cloud computing. IJATER (Int J AdvTechnolEng Res)
2012;2(4):52e7.
[2] Conway G, Curry E. Managing cloud computing-A life cycle approach.
CLOSER; 2012. p. 198e207.
[3] Khajeh-Hosseini A, Greenwood D, Smith JW, Sommerville I. The cloud
adoption toolkit: supporting cloud adoption decisions in the enterprise.
Software PractExp 2012;42(4):447e65.
[4] Shimba F. Cloud computing:strategies for cloud computing adoption
[Masters dissertation]. Dublin: Dublin Institute of Technology; 2010.
[5] Tweneboah-Koduah S, Endicott-Popovsky B, Tsetse A. Barriers to
government cloud adoption: the ghanaian perspective. Int J
ManagInfTechnol 2014;6(3):1.
[6] Wyld DC. Moving to the cloud: an introduction to cloud computing in
government. IBM Center for the Business of Government; 2009.
[7] Gronlund A, Horan TA. Introducing e-GOV: history, definitions, and
issues. CommunAssocInfSyst 2005;15(1):713e29.
[8] Luna-Reyes LF, Pardo TA, Gil-Garcia JR, Navarrete C, Zhang J,
Mellouli S. Digital government in North America: a comparative
analysis of policy and program priorities in Canada, Mexico, and the
United States. In: Comparative e-government; 2010. p. 139e60.
https://doi.org/ 10.1007/978-1-4419-6536-3_7.
[9] Nations U. United Nations e-government survey 2014: E-government
for the future we want. United Nations Department of Economic and
Social Affairs; 2014.

ISBN 978-81-939960-1-0 © 2019 Published by Coimbatore Institute of Information Technology 45

You might also like