Abstract
Cloud computing - the new paradigm, the future for IT consumer utility, the economy of scale approach, the illusion of un infinite resources availability, yet the debate over security and privacy issues is still undergoing and a common policy framework is missing. Research confirms that users are concern when presented with scenarios in which companies may put their data to uses of which they may not be aware. Therefore, privacy and security should be considered at every stage of a system design whereas advantages and disadvantages should be rated and compared to internal and external factors once a company or a person decides to go into the business of cloud computing or become just an user.
Chapter PDF
Similar content being viewed by others
References
Mohamed, A.: A history of cloud computing (2009), http://www.computerweekly.com
Gourley, B.: Cloud Computing and Cyber Defense. A White Paper provided to the National Security Council and Homeland Security Council as input to the White House Review of Communications and Information Infrastructure, Crucial Point LLC (2009)
Reingold, B., Mrazik, R.: Cloud computing: the intersection of massive scalability, data security and privacy (Part I). Cyberspace Lawyer, [FNa1] 14 No. 5 GLCYLAW 1 Page 114 NO. 5, Cyberspace Law. 1, LegalWorks (2009)
United States National Standards for Information Technology, http://www.nist.gov/index.html
Dataline White Paper: Cloud computing for national security applications, http://www.dataline.com/soar.htm
Merrill Lynch, http://www.ml.com
Bruening, P., Treacy, B.: The Bureau of National Affairs, Inc. Cloud Computing: Privacy, Security Challenges, Privacy&Security Law. PVLR ISSN 1538-3423 (2009)
ISACA. Emerging Technology. White Paper Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives (2009)
Flinders, K.: Microsoft slashes cost of cloud computing (2009), http://www.computerweekly.com
Webbmedia Group’s Knowledge Basem, Cloud Computing Explained (2009), http://www.webbmediagroup.com
Binning, D.: Top five cloud computing security issues (2009), http://www.computerweekly.com
Gellman, R.: Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing, World Privacy Forum (2009)
Bertino, E., Paci, F., Ferrini, R., Shang, N.: Privacy-preserving Digital Identity Management for Cloud Computing, CS Department, Purdue University Bulletin of the IEEE Computer Society Technical Committee on Data Engineering
Reingold, B., Mrazik, R.: Cloud computing: Industry and government development (Part II)
Zimski, P.: Cloud computing faces security storm (2009), http://www.computerweekly.com
Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-Preserving Public Auditing for Data Storage: Security in Cloud Computing, Illinois Institute of Technology, Chicago IL 60616, USA, Worcester Polytechnic Institute, Worcester MA 01609, USA (2009)
104th Congress, The Health Insurance Portability and Accountability Act (HIPAA) of, P.L.104-191 (1996), http://www.cms.hhs.gov/hipaageninfo/downloads/hipaalaw.pdf
Yee, A.: Cloud Computing Security Risks - Are they real (2009), http://www.ebizq.net
Andrei, T.: Cloud Computing Challenges and Related Security Issues, p. 5 (2009)
ENISA: Cloud Computing Benefits, risks and recommendations for information security, Report (2009)
Almond, C.: A Practical Guide to Cloud Computing Security: What you need to know now about your business and cloud security, Avande (2009), www.avande.com
Brodkin, J.: Gartner: Seven cloud-computing security risks, Network World (2009)
Tchifilionova, V.: The mirage of law - an oasis for surveillance. In: International Politics, vol. 4, pp. 7–23. South-west University “Neofit Rilski” Press, Blagoevgrad (2009), (in Bulgarian/English) ISSN 1312-5435
Davies, S.: Unprincipled privacy: why the foundations of data protection are failing us. University of New South Wales Law Journal (2001), http://www.austlii.edu.au/au/journals/UNSWLJ/2001/7.html
107th Congress, The Patriot Act (2001), http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=107_cong_public_laws&docid=f:publ056.107.pdf
Trapani, G.: The Hidden Risks of Cloud Computing, Lifehacker (2009)
95/46/EC Directive of the European Parliament and the Council (1995), http://ec.europa.eu/justice_home/fsj/privacy/docs/95-46-ce/dir1995-46_part1_en.pdf
Hurley, D.: “A whole world in a glance: privacy as a key enabler of individual participation in democratic governance”, Harvard Infrastructure Project, Harvard (2001), http://www.pco.org.hk/english/infocentre/conference.html
EPIC, Before the Federal Trade Commission, Complaint and request for Injunction. In the Matter of Google, Inc. and Cloud Computing Services
Vijayan, V.: Google privacy convictions in Italy spark outrage (2010), http://www.itworld.com
Cavoukian, A.: Privacy in the clouds: A White Paper on Privacy and Digital Identity: Implications for the Internet, Information and privacy commissioner of Ontario (2009)
Bergkamp, L., et al.: EU Data Protection Policy. Computer Law and Security Report 18(1), 2002 (2002)
Litan, R.: Balancing Costs and Benefits of New Privacy Mandates. AEI-Brookings Joint Canter for Regulatory Studies, working paper 99-3 (April 1999)
The Information Commissioner’s Office, PIA’s Book (2007), http://www.ico.gov.uk/upload/documents/pia_handbook_html_v2/index.html
Pearson, S.: Taking Account of Privacy when Designing Cloud Computing Services. HP Laboratories, HPL-2009-54 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 IFIP International Federation for Information Processing
About this paper
Cite this paper
Tchifilionova, V. (2011). Security and Privacy Implications of Cloud Computing – Lost in the Cloud. In: Camenisch, J., Kisimov, V., Dubovitskaya, M. (eds) Open Research Problems in Network Security. iNetSec 2010. Lecture Notes in Computer Science, vol 6555. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19228-9_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-19228-9_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-19227-2
Online ISBN: 978-3-642-19228-9
eBook Packages: Computer ScienceComputer Science (R0)