Article Preview
TopIntroduction
Cloud Computing: The hottest buzzword on the internet and fastest growing technology of the decade were coined somewhere two decades back. This Paradigm came in the picture when major giants like Google and Amazon wanted to describe a model where people will use more of internet and web for their IT related tasks. While backtrack from this period you can also trace coinage of this term in the mid-'90s when Netscape Navigators was in use. Cloud Computing has been searched around 50 million times on the internet and one of the most searched topics on Google scholar as well (Regalado, 2011). This new fancy term is actually based on some few old technologies. Precursors of this technology are Time-sharing, Peer to Peer and client-server technology, Grid Computing, Utility Computing, Virtualization, SOA, etc (Lee-Post & Pakath 2014). Cloud Computing gained popularity among masses because of its features like no upfront investments, low cost, scalable as per needs, easy to use and no maintenance. (Zhang, Cheng, & Boutaba May 2010). Not only features make it's better, in comparison with other technologies but it offers services for almost every IT requirement; like IAAS for infrastructure related requirements, SAAS offers software solution, PAAS can offer various platforms as per the need of applications (Takabi, Joshi, & Ahn 2010). Except for service, other comforts that technology offers are: various deployment models as per requirements of the customers. Like; for extremely sensitive data: Private Deployment model, for normal data: Public deployment model. Combination of both(Public & Private) can also be used in the hybrid deployment Model (Jadeja & Modi 2012). These positive impact of technology is being hampered due to data breach incidences. Despite an increase in the security budget for cloud services, a sharp rise can be seen in data breach cases in the last year and the same trend will be followed in next few years (Data Breach In The Cloud – 2018 Trends That IT Pros Must Think n.d.) (Lewis, 2018). This upward trend of data breach cases is now living a mark on Trust.
Trust is considered a very important aspect for cloud services because of the architecture of the technology. This technology delivered the services from some remote locations that are under the control of the cloud service provider and practically not event known to the cloud service consumer when confidential data is in the hands of some unknown administrators, the concern of TRUST automatically arises. How much trustworthy is the provider who is taking care of data? How consistent is there working methodology? How reliable are there employees? How secure are their network boundaries and their internal procedures? All these questions go round and round in the mind of the cloud consumers. A survey result has deduced that 88% of the potential cloud consumers are concern about whom all can have access to their data (Khan & Malluhi 2010)?
There comes the need of a legal system that can safeguard the concerns of consumers who want to use the technology and contribute to the digital growth of the country. Being the most popular technology not only legal system but there are many private bodies that work for the betterment of the technology like CSCC (Cloud Security Customer Council), CSIG (Cloud Select Industry), STAR (Security Trust and Assurance Registry) and many more. These private bodies in concern with regional legal system issue guidelines, standards or certifications to protect consumers concern. It's is the responsibility of the consumers to be updated about such guidelines and keep them on the check before availing services from any provider. The objective of the author explores this angle and develop a tool base on the above-mentioned phenomenon and try to evaluate the trustworthiness of the cloud provider.