Privacy Issues In Cloud Computing
https://doi.org/10.9790/0661-17660813Abstract
Cloud computing is the delivery of computing as a service rather than a product. It provides shared resources, software, and information to computers and other devices over a network. The increasing network bandwidth and reliable yet flexible network connections make it even possible that users can now subscribe high quality services from data and software that reside solely on remote data centres. We can store and retrieve the data as we like using cloud computing. The cloud computing paradigm changes the way in which information is managed, especially where personal data processing is concerned. End-users can access cloud services without the need for any expert knowledge of the underlying technology. This is a key characteristic of cloud computing, which offers the advantage of reducing cost through the sharing of computing and storage resources, combined with an on-demand provisioning mechanism based on a pay-per-use business model. These new features have a direct impact on the IT budget and cost of ownership, but also bring up issues of traditional security, trust and privacy mechanisms.Privacy, in this Article, refers to the right to self-determination, that is, the right of individuals to 'know what is known about them', be aware of stored information about them, control how that information is communicated and prevent its abuse. In other words, it refers to more than just confidentiality of information. Protection of personal information (or data protection) derives from the right to privacy via the associated right to self-determination. Every individual has the right to control his or her own data, whether private, public or professional. Privacy issues are increasingly important in the online world. It is generally accepted that due consideration of privacy issues promotes user confidence and economic development. However, the secure release, management and control of personal information into the cloud represent a huge challenge for all stakeholders, involving pressures both legal and commercial. This study analyses the challenges posed by cloud computing and the standardization work being done by various standards development organizations (SDOs) to mitigate privacy risks in the cloud, including the role of privacy-enhancing technologies (PETs).
FAQs
AI
What are the primary privacy challenges in cloud computing?
The research identifies several primary challenges including risk assessment complexity, achieving regulatory compliance, and the emergence of new business models impacting consumer privacy. For instance, the FTC's report notes that advanced technologies have led to new business models that exploit consumer data extensively.
How do cloud delivery models affect data control for users?
The paper reveals that users often have limited control over their data in cloud environments, particularly in public and hybrid models. This limitation can result in risks of data loss and reliance on proprietary formats, which restricts user autonomy.
What trends are driving the growth of cloud computing services?
Research from IDC indicates the digital universe will expand from 1.8 zettabytes in 2011 to over 7 zettabytes by 2015, significantly driving demand for cloud services. This growth highlights the urgent need for innovative business models that prioritize consumer data privacy.
What operational risks are associated with cloud computing privacy?
The study highlights operational risks such as inadequate service-level agreements (SLAs), potential data breaches, and the complexity of maintaining compliance across jurisdictions. These risks necessitate robust privacy standards and a multidisciplinary approach from stakeholders to address evolving challenges.
How does cloud computing redefine IT infrastructure management?
The research indicates that cloud computing abstracts traditional infrastructure management by pooling resources and enabling on-demand provisioning. This shift allows organizations to scale up or down with minimal infrastructure commitment, altering their operational and financial strategies.
References (13)
- Grilo A, Jardim-Goncalves R (2011) Challenging electronic procurement inthe AEC sector: A BIM-based integrated perspective. Automation in Construction 20: 107-114
- Vorakulpipat C, Rezgui Y, Hopfe CJ (2010) Value creating construction virtual teams: A Case study in the construction sector. Automation in Construction 19: 142-147
- International Standard (ISO) 16739:2005 -Industry Foundation Classes
- Succar B (2009) Automation in Construction 18: 357-375
- Royal Institute of British Architects (RIBA) Plan of Work. Available at: http://www.ribaplanofwork.com/. [Last accessed: Jan 17, 2012]
- Serror M (2007) Shared computer-aided structural design model for construction industry (infrastructure). Comput Aided Des 40: 778-788
- Singh V (2010) A theoretical framework of a BIM-based multi-disciplinary platform. Automation in Construction 20: 131-144
- Rezgui Y, Cooper G, Brandon P (1998) Information management in a collaborative multiactor environment: the COMMIT Approach. J Comput Civil Eng 12: 136-145
- Rezgui Y, Hopfe C, Vorakulpipat C (2010) Generations of knowledge management in the architecture, engineering and construction industry: an evolutionary perspective. Adv Eng Inform 24: 219-228
- British Standards Institute (BSI): British Standard 1192:2007 -Collaborative production of architectural, engineering and construction information, Code of practice
- Cooper G, Cerulli C, Lawson BR, Peng C, Rezgui Y (2010) Tracking decision-making during architectural design. Electron J Inf Technol Construction 10: 125-139
- Kim H, Chaudhari S, Parashar M, Martyy C (2009) Online Risk Analytics on the Cloud International Workshop on Cloud Computing In: conjunction with the 9th IEEE International Symposium on Cluster Computing and the Grid, pp pp 484-489 a. CometCloud -available at: http://nsfcac.rutgers.edu/CometCloud/.
- Autodesk Revit Architecture -available at: http://www.autodesk.com/ products/autodesk-revit-family/overview. [Last accessed: Jan 15, 2012]