Abstract
We are starting to depend more and more on ‘cloud’ technology, in business and in our own personal lives. With so much personal data being stored in our personal clouds, questions are being asked about where the responsibility lies for the protection of data. For instance, is it with the consumer or with the provider? People have a right to know where their files are being stored and what is protecting them. The same goes for the consumer. They are obligated to ensure that their passwords are of a good strength and that they are safe while browsing the web, especially on public networks. The personal cloud industry is on the rise, and if the experts are correct in their predictions, the business world will be a better place for it, better in terms of portability and flexibility. The power to set your office up wherever you happen to be sitting, anywhere in the world, will be what personal cloud providers are offering. This is the future for cloud computing. Security and privacy are now more relevant than ever. This chapter examines the issues around cloud data protection and security and also investigates if the current Data Protection Act defines sufficient guidelines for data controllers on how they should collect and store user information in relation to thin-based clients using online or cloud-based service or if a lack of clarity in the Data Protection Act could cause these services to misuse the user’s data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Amazon Web Services (2013) Amazon Elastic Compute Cloud (Amazon EC2). http://aws.amazon.com/ec2/
Balaciart D (2014) What The Future Of Cloud Computing Will Bring | clouderPC. clouderPC, Trivandrum, India. Available at: http://www.clouderpc.com/the-future-of-cloud-computing-includes-combining-all-services-together/#.VD67AGewIiY
Behl A, Behl K (2012, Oct. 30 2012–Nov. 2 2012) An analysis of cloud computing security issues. Paper presented at the Information and Communication Technologies (WICT), 2012 World Congress on
Borrill S (2014) Telstra Keynote Urges CIOs to Master the Art of Shaping Cloud ServicesTelecomsTalk. Telecomstalk.com. Available at: http://www.telecomstalk.com/?p=3823
Caso, E. (2014). The Rise of the Personal Cloud | WIRED. [online] WIRED. Available at: http://www.wired.com/2014/01/rise-personal-cloud/
Cisco (2014) Cisco visual networking index: global mobile data traffic forecast update, 2013–2018. Available: http://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/white_paper_c11-520862.pdf
Chen D, Hong Z (2012, 23–25 March 2012) Data security and privacy protection issues in cloud computing. Paper presented at the Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on, Hangzhou, China
Data Protection Commissioner (2005) Are you a data controller? Available: http://www.dataprotection.ie/docs/Are-you-a-Data-Controller-/43.htm
Data Protection Commissioner (2010) Data security guidance. http://www.dataprotection.ie/viewdoc.asp?DocID=1091
Data Protection Commissioner (2014) Global privacy sweep raises concerns about mobile apps. Available: http://www.dataprotection.ie/viewdoc.asp?Docid=1456&Catid=66&StartDate=01+January+2014&m=
Dinadayalan P, Jegadeeswari S, Gnanambigai D (2014, Feb. 27 2014–March 1 2014) Data security issues in cloud environment and solutions. Paper presented at the Computing and Communication Technologies (WCCCT), 2014 World Congress on, Tiruchirappalli, India
Djemame K, Armstrong D, Guitart J, Macias M (2014) A risk assessment framework for cloud computing. Cloud Computing, IEEE Transactions on, PP(99), 1–1
Gallagher S (2014) Update: what Jennifer Lawrence can teach you about cloud security. Ars Technica, Boston. http://arstechnica.com/security/2014/09/what-jennifer-lawrence-can-teach-you-about-cloud-security/
Grance T, Mell P (2011) The NIST definition of cloud computing. National Institute for Standards and Technology, Gaithersburg, Tamil Nadu, India
Homer T (2014) 2020 vision for cloud services to the enterprise what service should the enterprise expect and demand by 2020?, 1st edn. [ebook] EMEA, Quinta do Lago
ICS (2015) ICS predicts data protection will be a hot topic in 2015. http://www.ics.ie/news/view/1341
Intel (2015) Intel’s vision of the ongoing shift to cloud computing. Available: http://www.intel.ie/content/dam/www/public/us/en/documents/white-papers/cloud-computing-intel-cloud-2015-vision.pdf
Iyler K, Easwar D (2013) Cloud computing and modelling of cash flows. In: International conference on business analytics, Lisbon, Portugal, 18–21 January 2013, pp 34–42
Jadeja Y, Modi K (2012, 21–22 March 2012) Cloud computing – concepts, architecture and challenges. Paper presented at the Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on
Kelyman B (2014) How I secure my personal cloud. Dark Reading. Available at: http://www.darkreading.com/cloud-security/how-i-secure-my-personal-cloud/d/d-id/1113941
Keshavarzi A, Haghighat AT, Bohlouli M (2013, 12–14 Sept. 2013) Research challenges and prospective business impacts of cloud computing: a survey. Paper presented at the Intelligent Data Acquisition and Advanced Computing Systems (IDAACS), 2013 IEEE 7th International Conference on, Berlin, Germany
Kulkarni G, Chavan N, Chandorkar R, Waghmare R, Palwe R (2012) Cloud security challenges. Paper presented at the Telecommunication Systems, Services, and Applications (TSSA), 2012 7th international conference on, New York, 30–31 Oct 2012
McKendrick J (2013) 10 quotes on cloud computing that really say it all. http://www.forbes.com/sites/joemckendrick/2013/03/24/10-quotes-on-cloud-computing-that-really-say-it-all/, 29th September 2013, Chicago
NIST Cloud Computing Standards Roadmap (2011) 1st ed. [ebook] The US Department of Commerce. Available at: http://www.nist.gov/itl/cloud/upload/NIST_SP-500-291_Version-2_2013_June18_FINAL.pdf
Perlroth N (2014) Security needs evolve as computing leaves the office. [online] Bits Blog. Available at: http://bits.blogs.nytimes.com/2014/06/11/security-needs-evolve-as-computing-leaves-the-office/
Rai A, Sharma S (2013) Privacy issues regarding personal data in cloud computing, 1st edn. International Journal of Advanced Research in Computer Science, New York, USA
Robinson N (2011) The cloud, 1st edn. Rand, Santa Monica
Searls D (2013) Bringing “Personal cloud” to market. Harvard Blog. https://blogs.law.harvard.edu/doc/2013/05/04/how-marketable-will-personal-cloud-be/
Shetty S (2013) Gartner says cloud computing will become the bulk of new IT spend by 2016. Analysts examine cloud strategies and adoption at gartner symposium
Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11
Sugumaran M, Murugan BB, Kamalraj D (2014) An architecture for data security in cloud computing, computing and communication technologies (WCCCT), 2014 World Congress on, Delhi, India, 27 February 2014–1 March 2014, pp 252–255. doi:10.1109/WCCCT.2014.53
Tomonari K, Yukio E (2010) Achieving a “Personal Cloud” environment, 1st edn. NEC Technical Journal
Varia J, Mathew S (2013) Overview of amazon web services. Available: http://media.amazonwebservices.com/AWS_Overview.pdf
Walker K (2013) The Notorious Nine: cloud computing top threats in 2013. www.cloudsecurityalliance.org/topthreats. Cloud Security Alliance, London, UK
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
McKelvey, N., Curran, K., Gordon, B., Devlin, E., Johnston, K. (2015). Cloud Computing and Security in the Future. In: Zhu, S., Hill, R., Trovati, M. (eds) Guide to Security Assurance for Cloud Computing. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-25988-8_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-25988-8_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-25986-4
Online ISBN: 978-3-319-25988-8
eBook Packages: Computer ScienceComputer Science (R0)