Academia.eduAcademia.edu

Outline

Impacts of Cloud Computing (STOA Cloud Computing Del.3)

2014

https://doi.org/10.1553/ITA-PB-A65-3

Abstract

This report focuses on the impacts of Cloud Computing and the resulting challenges. It is based on an evaluation of the available scientific and industry literature, as well as on expert interviews. It should be mentioned that statements regarding Cloud Computing in reports and media on this are often contradictory. One reason for this is that various definitions are used. Some authors apply "cloud washing" and rename traditional outsourcing or web services. Based on the previous deliverable we focus on common used definitions such as the one from NIST. A second issue is that statements often are based on experts estimation due to lack of reliable time series of data. This explains the great bandwidth of results, which have to be taken with care. Socioeconomic impacts In the chapter on socioeconomic Impacts we present some typical cases of such Cloud Computing, e.g. elastic hosting services by Amazon and Google. We observed that there are several such companies, mostly US-based, which earned revenues between a few hundred million and about US-$ 2 billion, in 2012. Positive impacts which we observed comprise: Cost savings of services of, e.g., 10-20%. Convenience of using services, e.g. by private consumers, but also by employees and small companies. Flexibility, e.g. for hosting a mobile app. Professional security management, relevant for consumers or SMEs. But at the same time there are costs and risks, e.g.: Loss of control over data, loss of confidentiality, and a potential loss of availability. For consumers, costs of mobile roaming, costs of backups in the cloud, etc. Need to control using the Cloud, e.g. dealing with contracts, deletion, and migration. We also observed limits to Cloud Computing. For example, for certain operations, such as in telecommunications or manufacturing control, latency requirements are so high that using remote servers does not appear to be an option. Also, many large corporations already use outsourcing and/or internal load balancing and therefore cannot reap additional benefits. Accordingly, we observed no large layoffs, due to migrating computing services into the cloud. It has been anticipated that using Cloud Computing will lead to general savings of 10%-30% of IT costs. However, it has not been possible to identify empirical studies supporting this. Consequently the significant productivity growth, as estimated by some authors based on this, have to be taken with care. However, this may change in future. Currently, there is a widespread fear that Cloud Computing providers and foreign governments abuse data, that providers go out of business, or suffer from severe outages.

References (186)

  1. ANNEX: LIST OF RESPONDENTS AND EVENTS VISITED Within the project and related activities a number of workshops and conferences were attended, respectively organised, by the contractors. This includes: Cloudzone, Karlsruhe 10.-11.05.2012
  2. Intel European Research and Innovation Conference, Barcelona 22. -23.10.2012 19th ITS Biennial Conference, Bangkok 2012
  3. CloudConf, München 26.-27.11.2012
  4. KA-IT-Sicherheitsinitiative: "Cloud kommt von Klauen. Oder?", " Karlsruhe 5.10.2012 ETTIS project: "Scenarios for the future cyber security in Europe", Frankfurt 27.- 28.11.2012* The Computers, Privacy and Data Protection (CPDP): Data protection reloaded, Brussels, 23.-25-01.2013* KA-IT-Sicherheitsinitiative: "Cloud, aber sicher!! Karlsruhe 15.5.2013 IFIP Summer School 2013: "Privacy and Identity Management for Emerging Services and Technologies, Nijmegen 17.-21.06.2013 CAST Forum SOA und Cloud Security, Darmstadt 27.06.2013
  5. Roadmap for Cloud Computing for the Beijing Academy of Science and Technology, Karlsruhe, 22.-23.07.2013* Workshop and conferences marked (*) were carried out by one of the contractors. Individuals communicated with (f.e. explorative interviews, consultation via mail etc.) include: Eli Noam, Columbia University Philip Schmolling, Yunicon Matthias Schunter, Intel Tobias Voss, Viadee Gertjan Boulet, CEPS Michael Waidner, Fraunhofer SIT Stephan Engberg, Priway Søren Duus Østergaard, Duus Communications Henrik Hasselbach, IBM Denmark Nina Nørregaard, IBM Denmark Michael Friedewald, Fraunhofer ISI Bernd Carsten Stahl, De Montfort University * Gino Brunetti, Softwarespitzencluster Anna Fielder, Civic Consulting* Niels Madelung, Danish Standard / ISO-DK* Carsten Kestermann, Software AG Marnix Dekker, ENISA* Ken Ducatel, DG Connect* Henning Mortensen, The Danish Industry Association* Bernhard Löwe, KIT-IKS REFERENCES
  6. Abboud/Sandle (2013): European cloud computing firms see silver lining in PRISM scandal. Retrieved from http://news.yahoo.com/analysis-european-cloud-computing- firms-see-silver-lining-125322771.html, Reuters 06/17/2013.
  7. Aiken, K., Boush, D. (2006): "Trustmarks, objective-source ratings, and implied investments in advertising: investigating online trust and the context-specific nature of internet signals." In Journal of the Academy of Marketing Science, vol. 34(3), pp 308- 323. Alleweldt, F., Kara, S. (2011): Consumer market study on the functioning of e- commerce and Internet marketing and selling techniques in the retail of goods. Retrieved from http://ec.europa.eu/consumers/consumer_research/market_studies/docs/study_ecomm erce_goods_en.pdf, 07/23/2013.
  8. Amazon (2013): AWS CloudHSM.http://aws.amazon.com/de/cloudhsm/07/14/2013
  9. Amazon (2013a): Price of external harddrive. http://www.amazon.de/gp/product/B0034G51XS/ref=noref?ie=UTF8&psc=1&s=comput ers, 07/23/2013. Amazon (2013b): Case Studies. Retrieved from https://aws.amazon.com/en/solutions/case-studies/, 07/23/2013.
  10. Arthur, C. (2012): Google privacy policy slammed by EU data protection chiefs, Guardian, 10/16/2012. Article 29 Data Protection Working Party (2007): Opinion 4/2007 on the concept of personal data: WP 136. Article 29 Data Protection Working Party (2012): Opinion 05/2012 on Cloud Computing: WP 196. Article 29 Data Protection Working Party (2013): Explanatory Document on the Processor Binding Corporate Rules: WP 204. Article 29 Data Protection Working Party: Opinion 05/2012 on Cloud Computing. 2012. http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion- recommendation/files/2012/wp196_en.pdf, 07/23/2013.
  11. Ashford, W. (2013a): Technology companies call for more transparency over data requests. ComputerWeekly.com, Wednesday 12. June 2013
  12. Ashford, W. (2013b): Yahoo wants FISA objections revealed. ComputerWeekly.com, Thursday 11. July 2013.
  13. Aumasson, A., Bonneau, V., Leimbach, T., & Gödel, M. (2010): Economic and Social Impact of Software & Software-Based Services. D5-Final Report. Retrieved from http://www.cros- portal.eu/sites/default/files/25_Study%20on%20Economic%20and%20social%20impac t%20of%20Software.pdf, 07/23/2013.
  14. Aumasson, Arnold/Bonneau, Vincent/Leimbach, Timo/Gödel, Moritz (2010): Economic and Social Impact of Software & Software-Based Services. D5 -Final Report, Paris (Smart 2009/0041) (http://cordis.europa.eu/fp7/ict/ssai/docs/study-sw-report- final.pdf).
  15. Babcock, C. (2013): Amazon's Cloud Revenues, Examined. Retrieved from http://www.informationweek.com/cloud-computing/infrastructure/amazons-cloud- revenues-examined/240145741, 07/23/2013.
  16. Barret, Victoria (2011): Dropbox: The Inside Story Of Tech's Hottest Startup, in: Forbes online, October 18,2011, (http://www.forbes.com/sites/victoriabarret/2011/10/18/dropbox-the-inside-story-of- techs-hottest-startup/).
  17. Berry, R., & Reisman, M. (2012): Policy Challenges of Cross-Border Cloud Computing. Retrieved from http://serviceorientedarchitecturesoa.net/goto/http://www.usitc.gov/journals/policy_ch allenges_of_cross-border_cloud_computing.pdf, 07/23/2013.
  18. Berry, R., Reisman, M. (2012): Policy Challenges of Cross-Border Cloud Computing.http://www.usitc.gov/journals/policy_challenges_of_cross- border_cloud_computing.pdf, 07/23/2013.
  19. BGPmon (2010): Chinese IPS hijacks the Internet.http://bgpmon.net/?p=282, 07/23/2013.
  20. Bigo et. al. (2012): Fighting cybercrime and protecting privacy in the cloud. Study for the European Parliament's Policy Deparment C: Citizens' Rights and Constitutional Affairs. PE 462.509.
  21. Bigo, D., Boulet, G., Bowden, C., Carrera, S., Jeandesboz, J. and Scherrer, A. (2012): Fighting cyber crime and protecting privacy in the cloud: Report for the European Parliament.
  22. Bigo, Didier et al.(2012): Fighting cyber crime and protecting privacy in the cloud. Study on behalf of the European Parliament. http://www.europarl.europa.eu/committees/en/studiesdownload.html?languageDocume nt=EN&file=79050, Bruessels 07/23/2013.
  23. Blodget, H. (2011): Amazon's Cloud Crash Disaster Permanently Destroyed Many Customers' Data. Retrieved from http://articles.businessinsider.com/2011-04- 28/tech/29958976_1_amazon-customer-customers-data-data-loss, 07/23/2013. Bloomberg (2012): Coke Gets Hacked And Doesn't Tell Anyone. http://www.bloomberg.com/news/2012-11-04/coke-hacked-and-doesn-t-tell.html, 07/23/2013.
  24. Bloomberg (2013): Microsoft Azure Sales Top $1 Billion Challenging Amazon. April 30, 2013. http://www.bloomberg.com/news/2013-04-29/microsoft-azure-sales-top-1- billion-challenging-amazon.html, 07/23/2013.
  25. Bloomfield A. (2013): ACLU NSA Lawsuit: PRISM Violates the First and Fourth Amendments of the Constitution. Policymic. Retrieved from http://www.policymic.com/articles/48195/aclu-nsa-lawsuit-prism-violates-the-first-and- fourth-amendments-of-the-constitution, 07/30/2013.
  26. Borgmann, M., Hahn, T., Herfert, M., Kunz, T., Richter, M., Viebeg, U., & Vowé, S. (2012): On The Security of Cloud Storage Services. Retrieved from https://www.sit.fraunhofer.de/fileadmin/dokumente/studien_und_technical_reports/Clo ud-Storage-Security_a4.pdf, 07/23/2013.
  27. Borgmann, M., Hahn, T., Herfert, M., Kunz, T., Richter, M., Viebeg, U., Vowe, S. (2012): On the Security of Cloud Storage Services. https://www.sit.fraunhofer.de/de/angebote/projekte/cloud-studie/, Darmstadt 07/23/2013.
  28. Boritz, J. (2005): "IS practitioners' views on core concepts of information integrity." In International Journal of Accounting Information Systems, vol. 6(4), pp 260-279.
  29. Bradshaw et. al. (2012): Quantitative Estimates of the Demand for Cloud Computing in Europe and the Likely Barriers to Uptake, IDC.
  30. Bradshaw, D., Folco, G., Cattaneo, G., & Kolding, M. (2012): Quantitative Estimates of the Demand for Cloud Computing in Europe and the Likely Barriers to Up-take SMART 2011/0045 D4 -Final Report. EC. Retrieved from http://ec.europa.eu/information_society/activities/cloudcomputing/docs/quantitative_es timates.pdf, 07/23/2013.
  31. Bradshaw, S., Millard, C., Walden, I. (2011): "Contracts for clouds: comparison and analysis of the Terms and Conditions of cloud computing services." In International Journal of Law and Information Technology, vol. 19, pp 187-223.
  32. Breznitz, D. (2006): The Israeli Software Industry, in: Arora, A; Gambardella, A. (2006): From Underdogs to Tigers: The Rise and Grow of the Software Industry in Brazil, China, India, Ireland, and Israel. Oxford: OUP, 72-98.
  33. Breznitz, D. (2007): Innovation and the State, New Haven: Yale University Press.
  34. Brodies (2012): Data Protection: What price harmonization? Brodies.com, 07/30/2013.
  35. Brynjolfsson, E. Paul Hofmann, John Jordan( 2010): Cloud Computing and Electricity: Beyond the Utility Model, Communications of the ACM, Vol. 53, No. 5, 32-34.
  36. Brynjolfsson, Erik, McAfee, Andrew (2011): Race against the machine, Lexington.
  37. Bugiel, S., Nürnberger, S., Sadeghi, A.-R., Schneider, T. (2011): "TwinClouds -Secure Cloud Computing with Low Latency". Communications and Multimedia Security (CMS'11). http://www.infsec.cs.uni-saarland.de/~bugiel/publications/pdfs/bugiel11- cms.pdf, 07/23/2013.
  38. Cachin, C., Schunter, M. (2011): A Cloud You Can Trust - How to ensure that cloud computing's problems-data breaches, leaks, service outages-don't obscure its virtues, IEEE Spectrum, pp 28-51. http://spectrum.ieee.org/computing/networks/a-cloud-you-can-trust/0, 07/23/2013.
  39. Carr, Nicolas G. (2003): IT doesn't matter, in: Harvard Business Review, 5 (2003), 41- 49. Carr, Nicolas G. (2004): Does IT matter?, Boston.
  40. Carr, Nicolas G. (2009): The Big Switch: Our New Digital Destiny, New York.
  41. Cattaneo, G., Kolding, M., Bradshaw, D., & Folco, G. (2012): Quantitative Estimates of the Demand for Cloud Computing in Europe and the Likely Barriers to Take-up SMART 2011/0045 D2 -Interim Report -Statistical Annex. EC. Retrieved from http://cordis.europa.eu/fp7/ict/ssai/docs/study45-d2-interim-statisticalannex.pdf, 07/23/2013.
  42. Cattedu (2011): Security and Resilience in Governmental Clouds. Making an informed decision. ENISA. Cattedu and Hogben (2009a): Cloud Computing. Benefits, risks and recommendations for information security. ENISA. Cattedu and Hogben (2009b): An SME perspective on Cloud Computing -Survey. ENISA Cattedu and Hogben (2009c): Cloud Computing. Information Assurance Framework. ENISA. Cellan-Jones, R. (2009): The Sidekick Cloud Disaster. Retrieved from http://www.bbc.co.uk/blogs/technology/2009/10/the_sidekick_cloud_disaster.html, 07/23/2013.
  43. Cincera, M./ Veugelers, R. (2010): Young leading innovators and the EU's R&D Intensity Gap (Breughel Policy Brief 2010/09), Brussels.
  44. Constine, J. (2012): Soleio, Veteran Facebook Designer Behind The Like Button, Joins Dropbox Team. Retrieved from http://techcrunch.com/2012/12/06/soleio-dropbox/, 07/23/2013.
  45. Cook, G., & Van Horn, J. (2010): How Dirty is your data? A Look at the Energy Choices That Power Cloud Computing. Retrieved from http://www.greenpeace.org/international/Global/international/publications/climate/201
  46. /Cool%20IT/dirty-data-report-greenpeace.pdf, 07/23/2013.
  47. Cook, J. (2012): Outage at Amazon Web Services takes down Netflix on Christmas Eve. Retrieved from http://www.geekwire.com/2012/amazon-web-services-outage-takes- netflix-christmas-eve/, 07/23/2013.
  48. CSA (2013): The Notorious Nine. Cloud Computing Top Threats in 2013. Cloud Security Alliance, Top Threats Working Group. CSA: Quick Guide to the Reference Architecture. 2011. https://cloudsecurityalliance.org/wp-content/uploads/2011/10/TCI_Whitepaper.pdf Curry, Sam et al (2010): Infrastructure security: Getting to the bottom of compliance in the cloud. RSA Security Brief. http://www.rsa.com/innovation/docs/CCOM_BRF_0310.pdf, 07/23/2013.
  49. Cusumano, M. (2004): The business of software, Cambridge/Mass. DARPA (2013): Information Innovation Office. http://www.darpa.mil/Our_Work/I2O/Programs/Clean- slate_design_of_Resilient_Adaptive_Secure_Hosts_%28CRASH%29.aspx, access 17.3.2013.
  50. De Busser, E. (2012): The Adequacy of an EU-US Partnership, in: Gurthwirth et. al. (Eds.): European Data Protection: In Good Health? Springer Science+Business Media 2012. De Hert, P. (2009): Citizens' Data and Technology: An optimistic perspective: Dutch Data Protection Authority, The Hague.
  51. Dekker, M.A.C. (2012): Critical Cloud Computing. A CIIP perspective on cloud computing services. Version 1.0, December 2012. ENISA Dignan, L. (2011): Cloud Computing's real creative destruction may be the IT workforce. Retrieved from http://www.zdnet.com/blog/btl/cloud-computings-real- creative-destruction-may-be-the-it-workforce/61581, 07/23/2013.
  52. Duisberg, A. (2011): Gelöste und ungelöste Rechtsfragen im IT-Outsourcing und Cloud Computing, in: Picot, A. et al. (Eds.): Trust in IT, Heidelberg, 49-70.
  53. Ecorys (2010): The competiveness of EU SME's in the ICT service sector. Rotterdam Ecorys. (2009): FWC Sector Competitiveness Studies -Competitiveness of the EU SMEs in the ICT services industry_final report. Retrieved from http://www.pedz.uni- mannheim.de/daten/edz-h/gdb/09/study_report_ict_services_en.pdf, 07/23/2013.
  54. Edler, J. (2010): Demand Oriented Innovation Policy, in: Smits, R./Kuhlmann, S/Shapira, P. (Eds.): The Co-Evolution of Innovation Policy -Innovation Policy Dynamics, Systems and Governance, Cheltenham.
  55. EDRI (2013): European Court of Justice Data Retention Cases To Be Heard On 9 July. http://www.edri.org/edrigram/number11.13/ecj-data-retention-case-9-july-2013, EDRi- gram newsletter, No. 11, 07/03/2013.
  56. EFI (2011): Gutachten zu Forschung, Innovation und technologischer Leistungsfähigkeit Deutschlands 2011, Berlin.
  57. Endeshaw, A. (2001): "The Legal Significance of Trustmarks." In Information & Communications Technology Law, vol. 10(2), pp 203-230.
  58. EP (2013): ENISA: A new mandate to face the challenges of network and information security. European Parliament. Europarl.Europa.EU, REF: 20130416IPR07353.
  59. Erlanger, S. (2012): Fighting Terrorism, French-Style, New York Times, 03/30/2012. ESA (2009) European Software Industry: looking for a competitive advantage. European Software Association. Brussels. (Phillipon/Veron 2009)
  60. ESA (2009): European Software Industry: looking for a competitive advantage. European Software Association. Brussels.
  61. Etro, F. (2009): The economic impact of Cloud Computing on business creation, employment and output in Europe. Retrieved from http://www.uitgeverijacco.be/download/nl/23707917/file/rbe-2009-2-web-4- the_economic_impact_of_cloud_computing_on_business_creation__employment_and_o utput_in_europe.pdf, 07/23/2013.
  62. Etro, F. (2009): The Economic Impact of Cloud Computing on Business Creation, Employment and Output in Europe. Draft version, May 2009.
  63. Etro, F. (2010): The economic consequences of the diffusion of Cloud Computing. the Global Information Technology Report, 2010, 107-112. Retrieve from http://networkedreadiness.com/gitr/main/fullreport/files/Chap1/1.9.pdf, 07/23/2013.
  64. Etro, F. (2011): The Economics of Cloud Computing. Paper presented at the Annual Conference on Anti-trust Law 2011: The Future of European Competition Law in High- tech Industries.
  65. Etro, Federico (2011): The Economics of Cloud Computing, IUP Journal of Managerial Economics, Vol. IX, 2, pp. 7-22, http://www.intertic.org/Policy%20Papers/Report.pdf, 07/23/2013.
  66. European Commission (2007): Pre-commercial Procurement: Driving innovation to ensure sustainable high quality public services in Europe : COM 2007/799/EC European Commission (2008): "Think Small First". A "Small Business Act" for Europe :COM 2008/349/EC European Commission (2010): A comprehensive approach on personal data protection in the European Union: COM (2010) 609 final.
  67. European Commission (2010): Europe 2020 Flagship Initiative Innovation Union: COM 2010/546/EC.
  68. European Commission (2010): Towards interoperability for European public services: COM 2010/744/EC.
  69. European Commission (2011): A coherent framework for building trust in the Digital Single Market for e-commerce and online services: COM 2011/942/EC. European Commission (2011): Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on public procurement: COM 2011/896/EC European Commission (2011): Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on a Common European Sales Law: COM 2011/635/EC.
  70. European Commission (2011): Recommendations on the review of directive 95/46/EC. Annex 1. Retrieved from http://ec.europa.eu/information_society/activities/cloudcomputing/docs/annex- industryrecommendations-ccstrategy-nov2011.pdf, 07/23/2013.
  71. European Commission (2012): A European Consumer Agenda -Boosting confidence and growth. Retrieved from http://ec.europa.eu/consumers/strategy/docs/consumer_agenda_2012_en.pdf, 07/23/2013.
  72. European Commission (2012): Impact Assessment Accompanying the General Data Protection Regulation: SEC (2012) 72 final. European Commission (2012): Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation): COM 2012/0011 (COD).
  73. European Commission (2012): Unleashing the Potential of Cloud Computing in Europe: COM(2012) 529 final. European Commission (2013): Digital Agenda Scoreboard 2013, Brussels. European Data Protection Supervisor (2012): Opinion of the European Data Protection Supervisor on the Commission's Communication on "Unleashing the potential of Cloud Computing in Europe. European Parliament & European Council (1993): On unfair terms in consumer con- tracts: Directive 93/13/EEC.
  74. European Parliament & European Council (1995): On the Protection of individuals with regard to the processing of personal data and on the free movement of such data: Directive 95/46/EC.
  75. European Parliament & European Council (1995): On the protection of individuals with regard to the processing of personal data and on the free movement of such data: Directive 95/46/EC.
  76. European Parliament & European Council (1996): On the legal protection of data-bases: Directive 96/9/EC.
  77. European Parliament & European Council (2000): On certain legal aspects of infor- mation society services, in particular electronic commerce, in the Internal Market: Directive 2000/31/EC.
  78. European Parliament & European Council (2002): Concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications): 2002/58/EC.
  79. European Parliament & European Council (2006): on the retention of data processed in connection with the provision of public electronic communication services: Di-rective 2006/24/EC.
  80. European Parliament & European Council (2006): On the term of protection of copy- right and certain related rights: Directive 2006/116/EC.
  81. European Parliament & European Council (2008): On the law ap-plicable to contractual obligations: Regulation 593/2008/EC.
  82. European Parliament & European Council (2009): On the legal protection of computer programs: Directive 2009/24/EC.
  83. European Parliament & European Council (2011): On consumer rights: Directive 2011/83/EC.
  84. European Parliament & European Council (2012): On European standardisation: Regulation 2012/1052/EC.
  85. European Parliament (2001): Report on the existence of a global system for the interception of private and commercial communications (ECHELON interception system) (2001/2098(INI)). 07/11/2001. http://www.europarl.europa.eu/sides/getDoc.do?pubRef=- //EP//NONSGML+REPORT+A5-2001-0264+0+DOC+PDF+V0//EN&language=EN European Patent Office (1973): European Patent Convention (EPC 1973).
  86. European Union (2002): Charter of Fundamental Rights of the European Union: Official Journal of the European Communities: 2000/C 364/01.
  87. Falliere, Nicolas; O Murchu, Liam; and Chien, Eric (2011): W32.Stuxnet Dossier, Version 1.4, Symantec Security Response, available at http://securityresponse.symantec.com/en/id/content/en/us/enterprise/media/security_r esponse/whitepapers/w32_stuxnet_dossier.pdf, 07/23/2013. Fenn and Raskino (2012): Gartner's Hype Cycle Special Report for 2012. Gartner Research. FI3P (2011): The European internet industry and market. Deliverable 2. Retrieved from http://www.fi3p.eu/assets/pdf/FI3P%20D2%20- %20EU%20Internet%20Industry%20and%20Market_Final.pdf, 07/23/2013.
  88. Fielder et al. (2012): Cloud Computing Study. For the European Parliament's Committee on Internal Market and Consumer Protection. IP/A/IMCO/ST/2011-18.
  89. Fielder, A., & Brown, I. (2012): Cloud Computing. Study. EC. Retrieved from http://www.europarl.europa.eu/committees/en/studiesdownload.html?languageDocume nt=EN&file=73411, 07/23/2013.
  90. Forbes (2012): NSA's New Data Center And Supercomputer Aim To Crack World's Strongest Encryption. http://www.forbes.com/sites/andygreenberg/2012/03/16/nsas- new-data-center-and-ultra-fast-supercomputer-aim-to-crack-worlds-strongest-crypto/, 07/23/2013.
  91. Fransman, M. (2011): The evolving ICT industry in Asia and the implications for Europe, Sevilla. Gartenberg and Ekholm (2012): Market insight: Consumer Apps and Services Will Become More Aware and Less Visible. Gartner.
  92. Gartner (2012): Gartner Says Worldwide Cloud Services Market to Surpass $109 Billion in 2012, Stamford (http://www.gartner.com/it/page.jsp?id=2163616).
  93. Gartner Inc. (2010): Gartner Says Worldwide Cloud Services Market to Surpass $68 Billion in 2010. Retrieved from http://www.gartner.com/newsroom/id/1389313, 07/23/2013.
  94. Gentry, C. (2009): Fully homomorphic encryption using ideal lattices. Proceedings of the 41st annual ACM symposium on Theory of computing. http://www.cs.cmu.edu/~odonnell/hits09/gentry-homomorphic-encryption.pdf, 07/30/2013.
  95. Giron, Frederic et al. (2009): The European Software and Software Based Services Industry, Brüssel. Global Access Partners (2011): Task Force on Cloud Computing Final Report: http://www.globalaccesspartners.org/Cloud-Computing-GAP-Task-Force-Report-May- 2011.pdf, 07/23/2013.
  96. Goldsmith, B. (2013): Yahoo memo sparks debate on pros and cons of working at home. Reuters. London. Retrieved from http://www.reuters.com/article/2013/02/26/us- workplace-flexibility-idUSBRE91P0S720130226, 07/23/2013. Google 1 (2013): http://www.google.com/enterprise/apps/education/customers.html, 07/23/2013.
  97. Greenwald and MacAskill (2013): NSA Prism program taps in to user data of Apple, Google and others. The Guardian, 07/07/2013.
  98. Greenwald, G (2013): NSA collecting phone records of millions of Verizon customers daily. The Guardian, 06/06/2013.
  99. Greif, B. (2012): Reporter ohne Grenzen stuft zwölf Staaten als Feinde des Internets ein. Gutwirth, S., Gellert, R., Bellanova, R., Friedewald, M., Schütz, P., Wright, D., Mordini, E. and Venier, S. (2011): Legal, social, economic and ethical conceptualisations of privacy and data protection: Prescient Project, Deliverable 1. Hecking and Schulz (2013): Spying "Out of Control": EU Official Questions Trade Negotiations. Spiegel International, 06/30/2013.
  100. Heiser, Gernot (2013): Protecting eGovernment Against Attacks. White Paper presented at STOA conference on eGovernment security. http://www.europarl.europa.eu/stoa/cms/home/events/workshops/egovernment, Brussels, 02/19/2013.
  101. Heng, S. (2011), " Netzneutralität. Innovation und Differenzierung keine Antipoden" Deutsche Bank Research Paper, Frankfurt.
  102. Henrich, Christian (2012): Statement at Karlsruher IT-Sicherheitsinitiative 5/10/2012. Hoffmann et. al. (2008): Towards Semantic Resolution of Security in Ambient Environments in: Mana and Rudolph (Eds.): Developing Ambient Intelligence. Proceedings of the International Conference on Ambient Intelligence Developments (AmI.d'07). Springer Verlag, Berlin, 2008.
  103. Hofmann, P., & Woods, D. (2010): Cloud Computing: The limits of public clouds for business applications. Internet Computing, IEEE, 14(6), 90-93.
  104. Hogan, O., Mohamed, S., McWilliams, D., & Greenwood, R. (2010): The Cloud Dividend Part One. The economic benefits of Cloud Computing to business and the wider EMEA economy. Retrieved from http://uk.emc.com/collateral/microsites/2010/cloud- dividend/cloud-dividend-report.pdf, 07/23/2013.
  105. Hon, W., Millard, C., Walden, I. (2012): "Negotiating Cloud Contracts: Looking at Clouds from Both Sides Now." In Stanford Law Review, vol. 16, pp 79-125.
  106. IDC (2012): IDC Forecasts Public IT Cloud Services Spending Will Approach $100 Billion in 2016, Generating 41% of Growth in Five Key IT Categories, Framingham, (http://www.idc.com/getdoc.jsp?containerId=prUS23684912#.UPVtJ_IWnCc). International Association of Microsoft Channel Partners (2011): "'Trustmark' Proposal for Cloud Service Providers". Presentation at 5th Call for Proposals. ITTL (2011): Cloud audit & assurance. The Danish Internet and Telecommunication Agency (IT & Telestyrelsen). Retrieved January 2013 from: digitaliser.dk/resource/703330
  107. Jansen, W., Grance, T. (2011): "Guidelines on Security and Privacy in Public Cloud Computing. Special Publication." National Institute of Standards and Technology, U.S. Department of Commerce.
  108. Kalenda, F. (2013): Amazon Web Services macht 2013 etwa 3,8 Millarden Dollar Umsatz. Retrieved from http://www.zdnet.de/88138507/analyst-amazon-web-services- macht-2013-38-mrd-dollar-umsatz/, 07/23/2013.
  109. Kaminiski, M. (2013): PRISM's legal basis: How we got here, and what we can do to get back. The Atlantic, June 7th. Korff and Brown (2010): New Challenges To Data Protection. Study commissioned by the European Commission's DG JFS.
  110. Korte, Werner B. et al. (2009): Anticipating the development of the supply and demand for e-Skills in Europe 2010-2015, Brussels.
  111. KPMG (2012): Exploring the Cloud. A Global Study of Governments' Adoption of Cloud. KPMG International.
  112. KPMG (2013): The Cloud Takes Shape. Global Cloud Survey -The Implementation Challenge. KMPG International. Retrieved May 2012 from http://www.google.dk/url?sa=t&rct=j&q=&esrc=s&source=web&cd=2&cad=rja&ved=0
  113. CDkQFjAB&url=http%3A%2F%2Fwww.kpmg.com%2FFR%2Ffr%2FIssuesAndInsights% 2FArticlesPublications%2FDocuments%2Fthe-cloud-takes- shape.pdf&ei=DRb1UbTYNcSQ4gTWh4CgAQ&usg=AFQjCNEwrTqhruWts9hq0TeNYk0SYZ
  114. A_5A&sig2=Rnr40bfxw9-DT-TRFuig6g&bvm=bv.49784469,d.bGE.
  115. Kraus, M. (2012): Cloud Computing und Consumerization of IT in Deutschland 2012. IDC. Retrieved from http://www.microsoft.com/germany/msdn/aktuell/news/show.mspx?id=msdn_de_4593 4, 07/23/2013.
  116. Kraus, M., & Zacher, M. (2012): Cloud Computing in Deutschland 2012. Deployment- Modelle und Management, Integration, Security und Compliance im Fokus. IDC. Retrieved from http://www.kaspersky.com/de/downloads/pdf/idc_executive_brief_mc_cloud_computin g_2012_kaspersky.pdf, 07/23/2013.
  117. Kuan Hon, W., Millard, C., & Walden, I. (2012): Who is responsible for 'personal data' in cloud computing? -The cloud of unknowing, Part 2: International Data Privacy Law, vol. 2 no. 2, pp. 3-18.
  118. Kucharik, A. (2003): Vendor lock-in, part 1 Proprietary and lock-in not necessarily synonymous. Retrieved June 15, 2013, from Search Open Source: http://searchenterpriselinux.techtarget.com/news/913129/Vendor-lock-in-part- 1Proprietary-and-lock-in-not-necessarily-synonymous, 07/23/2013.
  119. Kuner et. al. (2013): The extraterritoriality of data privacy laws -an explisve issue yet to detonate in: International Data Privacy Law, 2013, Vol. 3, No. 3.
  120. Lanier, J. (2013): You are not a gadget… An interview with Jaron Lanier. Jaronlanier.com/polecongadgetqa.html, 07/30/2013.
  121. Lardinois, F. (2012): Apple's iCloud Now Has Over 190M Users, Up From 150M Last Quarter And Seeing Steady Growth. Retrieved from http://techcrunch.com/2012/10/25/apples-icloud-now-has-190-million-users/, 07/23/2013.
  122. Lardinois, F. (2012): Gmail Now Has 425 Million Users, Google Apps Used By 5 Million Businesses And 66 Of The Top 100 Universities. Retrieved from http://techcrunch.com/2012/06/28/gmail-now-has-425-million-users-google-apps- used-by-5-million-businesses-and-66-of-the-top-100-universities/, 07/23/2013.
  123. Laugesen, Nicolai S.(2011): Cloud Computing, Cyber Security and Green IT. The impact on e-Skills requirements, Copenhagen.
  124. Leclerque, K. (2012): Public Cloud-Nutzung in Deutschland -Fallstudie Airport Nürmberg Infopark. PAC.
  125. Leimbach, T. et. al (2012): Foundations of Cloud Computing, Karlsruhe.
  126. Leimeister, S./Riedl, C./Böhm, M./ Krcmar, H. (2010): The Business Perspective of Cloud Computing: Actors, Roles, and Value Networks, in: Proceedings of 18th European Conference on Information Systems (ECIS 2010) Paper 56. (http://aisel.aisnet.org/ecis2010/56).
  127. Liebenau et. al. (2012): Modeling the Cloud. Employment effects in two exemplary sectors in the United States, the United Kingdom, Gemany and Italy. LSE Enterprise.
  128. Lo, P. (2013): Cloud computing is about to get personal , Network World June 06, 2013 10:32 AM ET.
  129. Lynn, T., Healy, P., McClatchey, R., Morrison, J., Pahl, C., Lee, B. (2013): "The case for cloud service trustmarks and assurance-as-a-service". In: International Conference on Cloud Computing and Services Science 8-10 May 2013, Aachen, Germany: http://doras.dcu.ie/18357/1/CLOSER_2013_Paper_Case_for_Cloud_Service_Trustmarks _and_Assurance_as_a_service_115_10-03-13b.pdf, 07/23/2013.
  130. MacAskill et. al. (2013): GCHQ taps fibre-optic cables for secret access to world's communication. The Guardian, 07/21/2013.
  131. Marnau, N., Schirmer, N., Schlehahn, E., Schunter, M. (2011): TClouds. Herausforderungen und erste Schritte zur sicheren und datenschutzkonformen Cloud. Datenschutz und Datensicherheit; Volume 35; Number 5; 333-337. http://www.springerlink.com/content/3664g67412449j52/fulltext.pdf, 07/23/2013. Maxwell and Wolf (2012): A Global Reality: Governmental Access to Data in the Cloud. A comparative study of ten international jurisdictions. A Hogan Loells White Paper.
  132. Maxwell, W., Wolf, W. (2012): A global reality: Governmental Access to Data in the Cloud. Maxwell_Revised Government Access to Cloud Data Paper. http://www.hoganlovells.com/hogan-lovells-revealing-study-about-governmental- access-to-data-in-the-cloud-detailed-in-white-paper-released-at-brussels-program-05- 23-2012/ RP-online: Hackerangriff: Bayer hält stand (2011): http://www.rp- online.de/bergisches-land/leverkusen/nachrichten/hackerangriff-bayer-haelt-stand- 1.1322513, 07/05/2013.
  133. Mayer-Schönberger, V. (1997): Generational Development of Data Protection in Europe in: Technology and Privacy, Agre, P. and Rotenberg, M. (eds.), MIT Press, Cambridge, MA, pp. 219-242.
  134. McDonagh, M. (2012): "Review of the Regulatory and Legal Environment for Cloud Computing in the EU" Irish Centre for Cloud Computing and Commerce.
  135. McGee, K. (2011): The 2011 Gartner Scenario: Current States and Future Directions of the IT Industry. Gartner Inc. Retrieved from https://noppa.tkk.fi/noppa/kurssi/t- 128.5300/luennot/T-128_5300_gartner.pdf, 07/23/2013.
  136. Meyer, D. (2013): Privacy activists sue UK government over PRISM and Tempora. Gigaom. Retrieved from http://gigaom.com/2013/07/08/privacy-activists-sue-uk- government-over-prism-and-tempora/, 07/30/2013.
  137. Meyer, T., Simsek-Graf, C., & Sanna, D. (2012): Heiter statt wolkig. Softwaretest in der Cloud. Retrieved from http://www.sigs- datacom.de/fileadmin/user_upload/zeitschriften/os/2012/Testing/meyer_simsek_sanna _OS_Testing_2012_kj7r.pdf, 07/23/2013.
  138. Miller, C.C. (2013): Tech Companies Concede To Surveillance Program. New York Times, 07/07/2013.
  139. Morgan, T. P. (2012): Amazon's S3 object count kisses 1 trillion. Retrieved from http://www.theregister.co.uk/2012/04/09/amazon_aws_s3_objects/, 07/23/2013.
  140. Mowery, David (1996) (Hrsg.): The international Computer Software Industry, Oxford. Nessi (2008): A NESSI Position Paper: European Software Strategy. Brussels.
  141. Nielsen, N. (2013): EU questions decade-old US data agreement, EUObserver.com. http://euobserver.com/justice/120919, 07/22/2013.
  142. Nightlabs (2013): http://www.cumulus4j.org/latest-stable/de/, 06/21/2013. Nordic Council of Ministers (2011): Nordic Public Sector Cloud Computing -a discussion paper. TemaNord 2011:566.
  143. Nuno Santos, Krishna P. Gummadi, and Rodrigo Rodrigues: Towards Trusted Cloud Computing,Proceedings of the Workshop On Hot Topics in Cloud Computing (HotCloud), San Diego, CA, June 2009. http://www.mpi- sws.org/~gummadi/papers/trusted_cloud.pdf OECD (2011): Demand Side Innovation Policy: Theory and Practice in OECD Countries", Paris. Open Hypervisor (2011): Isolating Spears. http://www.open- hypervisor.org/index.php/HPvisor/news/, 07/28/2011.
  144. Panettieri, J. (2013): Google Apps, Enterprise Cloud Revenues $1B In 2013. Retrieved from http://talkincloud.com/cloud-services-providers/google-apps-enterprise-cloud- revenues-1b-2013, 07/23/2013.
  145. Pepitone, J. (2012): Instagram can now sell your photos for ads. Retrieved from http://money.cnn.com/2012/12/18/technology/social/instagram-sell- photos/index.html?iid=s_mpm#comments, 07/23/2013. Poitras et. al. (2013): How the NSA Targets Germany and Europe. Spiegel International, July 1 st 2013.
  146. Rader, D. (2012): Case -How cloud computing maximizes growth opportunities for a firm challenging established rivals in: Strategy and Leadership, Vol. 40, No. 3. pp. 36- 43. Emerald Group Publishing Ltd. Rannenberg et al. (Eds.) (2009): The Future of Identity in the Information Society. Challenges and Opportunities. Springer Verlag, Berlin. Rauhofer and Bowden (2013): Protecting their own: Fundamental rights implications for EU data sovereignty in the cloud. Paper presented at the Berkeley Center for Law and Technology Privacly Law Scholars Conference, 6-7 June 2013. Retrieved from http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2283175
  147. Reed, C. (2010): "Information 'Ownership' in the Cloud." Queen Mary University of London, School of Law Legal Studies Research Paper No 45/2010.
  148. Reichmann, A. (2011): File Storage Costs Less In The Cloud Than In-House. Forrester.
  149. Ristenpart, T., Tromer, E., Shacham, H., Savage, S. (2009): Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. ACM Conference on Computer and Communications Security: 199-212.
  150. Robinson et. al. (2010): The Cloud. Understanding the Security, Privacy and Trust Challenges. RAND Europe for the European Commission, DG InfSo.
  151. Robinson, N., Valeri, L., Cave, J., Starkey, T. Graux, H., Creese, S., Hopkins, P. (2010): "The Cloud: Understanding the Security, Privacy and Trust Challenges" Report prepared for Unit F.5, Directorate-General Information Society and Media, European Commission: http://cordis.europa.eu/fp7/ict/security/docs/the-cloud-understanding-security-privacy- trust-challenges-2010_en.pdf, 07/23/2013.
  152. Robinson, N., Valeri, L., Cave, J., Starkey, T., Graux, H., Creese, S., & Hopkins, P. (2010): The Cloud: understanding the security, privacy and trust challenges. Privacy and Trust Challenges. Retrieved from http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2141970, 07/23/2013.
  153. Schleife, K. et al. et al. (2012): Wachstumshemmnisse für kleinere und mittlere Unternehmen am Beispiel der IT-Branche, Berlin.
  154. Schneier, B. (2013): Terms of Service as a Security Threat. Retrieved from http://sysinfosec.net/article.php/20130117081339726#4, 07/23/2013.
  155. Schneier, B. (2013b): Government Secrets and the Need for Whistleblowers. CRYPTO- GRAM Newsletter, June 15, 2013.
  156. Schneier, B. (2013c): Protecting E-Mail from Eavesdropping. CRYPTO-GRAM Newsletter, June 15, 2013.
  157. Schneier, Bruce (2013): Government Secrets and the Need for Whistleblowers. CRYPTO-GRAM Newsletter, 06/15/2013.
  158. Schonfeld, E. (2011): Netflix Now The Largest Single Source of Internet Traffic In North America TechCrunch. Retrieved from http://techcrunch.com/2011/05/17/netflix-largest- internet-traffic/, 07/23/2013.
  159. Schouten, E. (2012): "Auditable Cloud Services and Industry Compliance." In Wired, 11/2012.
  160. Schubert (2011): The Future of Cloud Computing -Opportunities for European Cloud Computing Beyond 2010, European Commission, Expert Group Study.
  161. Schubert, L., & Jeffery, K. (2012): Advances in clouds. Research in future Cloud Computingf. Retrieved from http://cordis.europa.eu/fp7/ict/ssai/docs/future-cc-2may- finalreport-experts.pdf, 07/23/2013.
  162. Schulzki-Haddouti, C. (2012): Wild Wild Cloud: Datenschutzkontrolle unmöglich. Retrieved from http://futurezone.at/netzpolitik/10436-wild-wild-cloud- datenschutzkontrolle-unmoeglich.php, 07/23/2013.
  163. Schwartz, M. J. (2013): Flickr Bug Revealed Private Photos To Public. Retrieved from http://www.informationweek.com/security/privacy/flickr-bug-revealed-private-photos- to-pu/240148386, 02/12/2013.
  164. Sealed Cloud (2013): http://www.sealedcloud.de/?page_id=8, 07/13/2013.
  165. Steinmueller (2004): The European Software sectoral system of innovations. In: Malerba, F. (ed.): Sectoral Systems of Innovations, Cambridge, 193-241.
  166. Streetinsider (2013): Salesforce. Retrieved from http://www.streetinsider.com/Earnings/Salesforce.com+%28CRM%29+Lower+Despite +Q2+Top+and+Bottom-Line+Beat%2C+Q3+EPS+Guidance+Falls+Short+But+FY+In- Line/7683268.html, 07/13/2013.
  167. Taft, D. K. (2012): Microsoft Sees Revenue Growth on Server and Tools as Xbox Drops. Retrieved from http://www.eweek.com/c/a/Windows/Microsoft-Sees-Revenue-Growth- on-Server-and-Tools-as-Xbox-Drops-686610/, 07/23/2013.
  168. Trevis (2013): Google: Number of Gmail Users. Retrieved from http://www.trefis.com/company?hm=GOOG.trefis&division=0781&driver=0883&from= pdf&scroll=1#/GOOG/n-0781/0875?c=top&from=rhs, 07/23/2013.
  169. Turlea, A. et al. (2010): The 2010 report on R&D in ICT in the European Union, Seville.
  170. Turlea, A. et al. (2011): The 2011 report on R&D in ICT in the European Union. Seville. United States (1986): Electronic Communications Privacy Act of 1986 (ECPA, Pub.L. 99- 508, 100 Stat. 1848, enacted October 21, 1986, codified at 18 U.S.C. § § 2510-2522). United States (2001): USA Patriot Act (U.S. H.R. 3162, Public Law 107-56), Title V, Sec 505. Amended 18 U.S.C. § 2709(b).
  171. van Ark, B. et al. (2003): ICT and productivity in Europe and the United States. Where do the differences come from? In: CESinfo 3(2003), 295-318.
  172. Vanson Bourne (2012): The Business Impact of the Cloud. According to 460 Senior Financial Decision-Makers. Vanson Bourne. Retrieved July 2013 from http://www.google.dk/url?sa=t&rct=j&q=&esrc=s&source=web&cd=3&ved=0CEIQFjAC &url=http%3A%2F%2Fstatic.ziftsolutions.com%2Ffiles%2F8a57cb7d3e5aa0dd013e61c 646bb1d58.pdf&ei=_BT1Ucy7NOOQ4AT_6YD4Dw&usg=AFQjCNEo3DLi66SynXZ5ehn40 mWW08ou_Q&sig2=27v-Dt9A8Z2fagRrAf0_WQ&bvm=bv.49784469,d.bGE&cad=rja
  173. Vaughan-Nichols, S. J. (2013): Evernote hacked, forces password reset. Retrieved from http://www.zdnet.com/evernote-hacked-forces-password-reset-7000012045/, 07/23/2013.
  174. Vehlow, M. (2011): PwC study: Cloud Computing in the Middle Market. http://www.pwc.de/de/mittelstand/cloud-computing-im-mittelstand.jhtml, 07/23/2013.
  175. Venkataraman/McArthur (2011): Vimeo EC2 transcoding. Retrieved from http://de.slideshare.net/ptrmcrthr/vimeo-ec2, 07/23/2013.
  176. Veugelers, R. (2009): "A lifeline for Europe's young radical innovators". Bruegel Policy Brief, 2009/01.
  177. Veugelers, R. et al. (2012): Lessons for ICT Innovative Industries. Three Experts' Positions on Financing, IPR and Industrial Ecosystems, Seville.
  178. Waldmann, U. (2013): Comment at CAST Forum, 06/27/2013.
  179. Wauters, P., Declercq, K., Van der Peijl, S., Davies, P. (2011): Study on cloud and service oriented architectures for e-government. final report. Deloitte. Retrieved from https://ec.europa.eu/digital-agenda/sites/digital-agenda/files/smart2010- 0074finalreport.pdf, 07/23/2013.
  180. Weber, Arnd; Haas, Michael; Scuka, Daniel: Mobile Service Innovation: A European Failure. Telecommunications Policy, Volume 35, Issue 5, June 2011, 469-480 WEF (2010): Exploring the Future of Cloud Computing. Riding the next wave of technology-driven transformation. World Economic Forum in partnership with Accenture. WEF (2011): Advancing Cloud Computing: What to do now? Priorities for Industry and Government. World Economic Forum in partnership with Accenture.
  181. Wessner, Charles (2008): Assessment of the Small Business Innovation Research Program, Washington, D.C.
  182. Wimmer, B. (2011): Uni Salzburg liegt in Googles Händen. Retrieved from http://futurezone.at/netzpolitik/69-uni-salzburg-liegt-in-googles-haenden.php, 07/23/2013.
  183. Wohlsen, M. (2013): Amazon Crash Could Cost A Lot More Than 400,000 Pairs of Unsold Underwear. Retrieved from http://www.wired.com/business/2013/02/amazon- crash-unsold-underwear/, 07/23/2013.
  184. Woloszynowicz, M. (2011): The Economics of Dropbox. http://www.w2lessons.com/2011/04/economics-of-dropbox.html, 07/23/2013. Yahoo Finance (2013): Rackspace Hosting, Inc. (RAX). Retrieved from http://finance.yahoo.com/q/ks?s=rax, 07/23/2013.
  185. Zhu, K., Zhou, Z. (2011): "Lock-In Strategy in Software Competition: Open-Source Software vs. Proprietary Software." In Information Systems Research, Article in Advance, pp 1-10.
  186. Zotero (2013): http://www.zotero.org/ Access June 14, 201, 07/23/2013.