Skip to main content

Developing a Framework of Comprehensive Criteria for Privacy Protections

  • Conference paper
  • First Online:
Advances in Information and Communication (FICC 2022)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 439))

Included in the following conference series:

Abstract

Cloud computing holds the promise of democratizing access to many computer resources, such as software, by effectively outsourcing computing tasks. However, this raises a variety of security and privacy concerns. Researchers and professionals must maintain security and privacy protections when managing data and information in cloud environments. While several security-related strategies and protections have already been established, there is still no comprehensive set of controls or criteria that specifically addresses privacy protection in the cloud. In this paper, we propose an all-encompassing privacy framework for cloud computing: the Comprehensive Criteria for Privacy Protections (C2P2) framework. The C2P2 framework was developed through qualitative analysis and evaluation of ten major existing privacy-related documents. This paper aims to present our initial and novel synthesis of the C2P2 framework, for which we found 107 unique privacy criteria across thirteen categories. This is the first assessment of its kind for the current privacy-related frameworks and serves as the first step towards establishing a comprehensive set of privacy protection criteria in cloud computing. We believe this framework provides an essential roadmap towards an inclusive privacy standard that information researchers and professionals can use to build controls and certifications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Hartzog, W.: The inadequate, invaluable fair information practices. Maryland Law Rev. 952–983 (2017)

    Google Scholar 

  2. McCallister, E.: Guide to protecting the confidentiality of personally identifiable information, vol. 800, no. 122. Diane Publishing (2010)

    Google Scholar 

  3. Schwartz, P.M., Solove, D.J.: The PII problem: privacy and a new concept of personally identifiable information. New York Univ. Law Rev. 86, 1814–1894 (2011)

    Google Scholar 

  4. Kesan, J., Hayes, C., Bashir, M.: A comprehensive empirical study of data privacy, trust, and consumer autonomy. Indiana Law J. 91, 267–352 (2016)

    Google Scholar 

  5. Stiglitz, J. E:. Making globalisation work. Esri (2006)

    Google Scholar 

  6. Gunawan, J., Choffnes, D., Hartzog, W., Wilson, C.: The COVID-19 Pandemic and the Technology Trust Gap, Seton Hall Law Review, pp. 1505–1533 (2020)

    Google Scholar 

  7. Privacy Act of 1974. The United States Department of Justice. https://www.justice.gov/opcl/privacy-act-1974. Accessed 15 Jan 2020

  8. Mell, P., Grance, T.: The NIST definition of cloud computing (2011)

    Google Scholar 

  9. Ellis, R., Mohan, V. (Eds.).: Rewired: cybersecurity governance. John Wiley & Sons (2019)

    Google Scholar 

  10. The New Brazilian General Data Protection Law – a detailed analysis. IAPP. https://iapp.org/news/a/the-new-brazilian-general-data-protection-law-a-detailed-analysis. Accessed 15 Aug 2018

  11. Guilloteau, S., Venkatesen, M.: Privacy in cloud computing-itu-t technology watch report march 2012. In: International Telecommunication Union: Geneva, Switzerland (2013)

    Google Scholar 

  12. Nist Privacy Framework: A Tool For Improving Privacy Through Enterprise Risk Management. https://www.nist.gov/privacy-framework. Accessed 16 Jan 2020

  13. Cloud Controls Matrix v3.0.1. Cloud Security Alliance. https://cloudsecurityalliance.org/artifacts/cloud-controls-matrix-v3-0-1/. Accessed 3 August 2019

  14. Reidenberg, J. R.: Resolving Conflicting International Data Privacy Rules in Cyberspace. Stanford Law Review, pp. 1315–1371 (2000)

    Google Scholar 

  15. General Data Protection Regulation. https://gdpr-info.eu/

  16. Wang, F.Y.: Cooperative data privacy: the Japanese model of data privacy and the EU-Japan GDPR adequacy agreement. Harv. J. Law Technol. 33, 661–691 (2020)

    Google Scholar 

  17. African Union Convention on Cyber Security and Personal Data Protection. https://au.int/en/treaties/african-union-convention-cyber-security-and-personal-data-protection. Accessed 27 June 2014

  18. Greenleaf, G.: Five YEARS OF THE APEC privacy framework: failure or promise? Comput. Law Secur. Rev. 25(1), 28–43 (2009)

    Article  Google Scholar 

  19. What is the Cross-Border Privacy Rules System? Asia-Pacific Economic Cooperation. https://www.apec.org/About-Us/About-APEC/Fact-Sheets/What-is-the-Cross-Border-Privacy-Rules-System. Accessed 15 Apr 2019

  20. OECD Privacy Guidelines. OECD (2013). https://www.oecd.org/internet/ieconomy/privacy-guidelines.htm

  21. Sharma, T., Wang, T., Di Giulio, C., Bashir, M.: Towards inclusive privacy protections in the cloud. In: Zhou, J., et al (eds.) ACNS 2020. LNCS, vol. 12418, pp. 337–359. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-61638-0_19

Download references

Acknowledgment

This work has been supported by Cisco. We want to acknowledge and thank all of those who have contributed to this work.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, T., Hayes, C.M., Bashir, M. (2022). Developing a Framework of Comprehensive Criteria for Privacy Protections. In: Arai, K. (eds) Advances in Information and Communication. FICC 2022. Lecture Notes in Networks and Systems, vol 439. Springer, Cham. https://doi.org/10.1007/978-3-030-98015-3_61

Download citation

Publish with us

Policies and ethics