Secure and Trustworthy Cloud: Need of Digital India, an e-Governance Project

  • Archana B. SaxenaEmail author
  • Meenu Dave
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 922)


Role of cloud computing in the execution of e-governance services has led to an ever-growing need for secure and trustworthy cloud services. Cloud Computing brings IT services in form of utilities that can be consumed as per demand. Cloud computing uses the internet to deliver differential services through geographically apart data centers. These data centers offer pooled infrastructure resources that can be utilized on pay as per use basis. All these properties of the cloud make it a perfect solution for E-Governance. The only concern that is making current users vigilant and future users dubious about this service is “Security”. Due to augmented security lapse incidences in recent years, consumers are apprehensive about adopting it and continuously losing trust in this computing paradigm. The prime concern of this research to find ways to overcome these challenges. The key intent of this research is to find a framework that can compute the trustworthiness of cloud provider based on security coverage. The framework evaluates trust value for a provider, on the basis of standards & certification attainment related to security components required for the services offered by him.


E-Governance Digital India Security Trust Framework Trustworthiness OTF Overall Trust Factor 


  1. 1.
    Vats, D., Kumar, B.: Digital India: an initiative to transform India into a digitally empowered society. Int. J. Sci. Technol. Manag. 543–547 (2017)Google Scholar
  2. 2.
    Lakshmi, A., Vijayalakshmi, S.M., Ugrappa, E.: Evaluation of digital India programme. KHOJ: J. Indian Manag. Res. Pract. 277–282 (2016)Google Scholar
  3. 3.
    Armbrust, M., et al.: A view of cloud computing. Commun. ACM 53, 50–58 (2010)CrossRefGoogle Scholar
  4. 4.
    Cloud computing crucial to Digital India, need safe practices’, say, experts. Accessed 11 Sept 2018
  5. 5.
    IIT Kharagpur graduate hacked Aadhaar data through Digital India app: Police. Accessed 20 Aug 2018
  6. 6.
    Yadav, J.: Digital India: a roadmap for the development of rural India. Int. J. Commer. Manag. Res. 2, 77–80 (2015)Google Scholar
  7. 7.
    Kulkarni, V.: Contribution of Cloud towards Digital India (2015). Accessed 4 July 2018
  8. 8.
    Lee-Post, A., Pakath, R.: Cloud computing: a comprehensive introduction. In: Security, Trust and Regulatory Aspects of Cloud Computing in Business Environment, pp. 1–23. IGI Global, Texas (2014)Google Scholar
  9. 9.
    Manuel, P.: A trust model of cloud computing based on quality of services. Ann. Oper. Res. 233, 281–292 (2013)CrossRefGoogle Scholar
  10. 10.
    Alhamad, M., Dillon, T., Chang, E.: SLA-based trust model for cloud computing. In International Conference on Network-Based Information System, Takayama (2010)Google Scholar
  11. 11.
    Li, W., Ping, L.: Trust model to enhance security and interoperability of cloud environment. In: First International Conference Cloud Com-2009, China, Beijing (2009)Google Scholar
  12. 12.
    Almulla, S., Yeun, C.Y.: Cloud computing security management. In: 2nd Engineering Systems Management and Its Applications (ICESMA), Sharjah, United Arab Emirates (2010)Google Scholar
  13. 13.
    Takabi, H., Joshi, J.B.D., Ahn, G.J.: Secure cloud: towards a comprehensive security framework for cloud computing environments. In: 34th Annual IEEE Computer Software and Applications Conference Workshops, Seoul, South Korea (2010)Google Scholar
  14. 14.
    Jadeja, Y., Modi, K.: Cloud computing - concepts, architecture and challenges. In: ICCEET- International Conference on Computing, Electronics and Electrical Technologies, Kumaracoil, India (2012)Google Scholar
  15. 15.
    Robinson, N., et al.: The Cloud: Understanding the Security, Privacy and Trust Challenges, Cambridge, United Kingdom (2010)Google Scholar
  16. 16.
    Dawe, D.M., Saxena, B.A.: Loss of trust at IAAS: causing factor and mitigation techniques. In: International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN 2017), Gurgaon, Haryana (2017)Google Scholar
  17. 17.
    Baudoin, C., Devlin, R.: Cloud Security Standards: What to Expect and what to Negotiate Version 2.0. Cloud Standards Customers Council (2016)Google Scholar
  18. 18.
    Baudoin, C., Cohen, E., Dotson, C., Gershater, J., Harris, D., Iyer, S.: Security for Cloud Computing Ten Steps to Ensure Success Version 3. Cloud Standards Customers Council (2017)Google Scholar
  19. 19.
    Cloud Service Level Agreement Standardisation Guidelines. CSIG Members, Brussels (2014)Google Scholar
  20. 20.
  21. 21.
    Qian, L., Luo, Z., Du, Y., Guo, L.: Cloud computing: an overview. In: Conference on Cloud Computing, Beijing, China (2009)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Jagan Institute of Management Studies (JIMS)RohiniIndia
  2. 2.JaganNath UniversityJaipurIndia

Personalised recommendations