Security Quantification of Container-Technology-Driven E-Government Systems
-
Published:2023-03-04
Issue:5
Volume:12
Page:1238
-
ISSN:2079-9292
-
Container-title:Electronics
-
language:en
-
Short-container-title:Electronics
Author:
Mondal Subrota Kumar1ORCID, Tan Tian1, Khanam Sadia2, Kumar Keshav3ORCID, Kabir Hussain Mohammed Dipu4, Ni Kan1
Affiliation:
1. School of Computer Science and Engineering, Macau University of Science and Technology, Taipa, Macao 999078, China 2. Dhaka Dental College, University of Dhaka, Dhaka 1206, Bangladesh 3. University Institute of Computing, Chandigarh University, Mohali 140413, Punjab, India 4. Institute for Intelligent Systems Research and Innovation (IISRI), Deakin University, Geelong, VIC 3216, Australia
Abstract
With the rapidly increasing demands of e-government systems in smart cities, a myriad of challenges and issues are required to be addressed. Among them, security is one of the prime concerns. To this end, we analyze different e-government systems and find that an e-government system built with container-based technology is endowed with many features. In addition, overhauling the architecture of container-technology-driven e-government systems, we observe that securing an e-government system demands quantifying security issues (vulnerabilities, threats, attacks, and risks) and the related countermeasures. Notably, we find that the Attack Tree and Attack–Defense Tree methods are state-of-the-art approaches in these aspects. Consequently, in this paper, we work on quantifying the security attributes, measures, and metrics of an e-government system using Attack Trees and Attack–Defense Trees—in this context, we build a working prototype of an e-government system aligned with the United Kingdom (UK) government portal, which is in line with our research scope. In particular, we propose a novel measure to quantify the probability of attack success using a risk matrix and normal distribution. The probabilistic analysis distinguishes the attack and defense levels more intuitively in e-government systems. Moreover, it infers the importance of enhancing security in e-government systems. In particular, the analysis shows that an e-government system is fairly unsafe with a 99% probability of being subject to attacks, and even with a defense mechanism, the probability of attack lies around 97%, which directs us to pay close attention to e-government security. In sum, our implications can serve as a benchmark for evaluation for governments to determine the next steps in consolidating e-government system security.
Funder
Science and Technology Development Fund of Macao, Macao SAR, China Faculty Research Grant Projects of Macau University of Science and Technology, Macao SAR, China
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference111 articles.
1. Yang, L., Elisa, N., and Eliot, N. (2019). Smart Cities Cybersecurity and Privacy, Elsevier. 2. Jadhav, B., and Patankar, A.B. (2018, January 22–24). A Novel Solution for Cloud Enabled E-Governance Using Openstack: Opportunities and Challenges. Proceedings of the International Conference on Communication, Networks and Computing, Gwalior, India. 3. The Smart City and its citizens: Governance and citizen participation in Amsterdam Smart City;Capra;Int. J. E-Plan. Res.,2016 4. Mora, L., and Bolici, R. (2015, January 19–20). How to become a smart city: Learning from Amsterdam. Proceedings of the International Conference on Smart and Sustainable Planning for Cities and Regions, Bolzano, Italy. 5. Anthopoulos, L., and Sirakoulis, K. (2015). Public Affairs and Administration: Concepts, Methodologies, Tools, and Applications, IGI Global.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|