Security and Privacy Implications of Cloud Computing – Lost in the Cloud

  • Vassilka Tchifilionova
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6555)


Cloud computing - the new paradigm, the future for IT consumer utility, the economy of scale approach, the illusion of un infinite resources availability, yet the debate over security and privacy issues is still undergoing and a common policy framework is missing. Research confirms that users are concern when presented with scenarios in which companies may put their data to uses of which they may not be aware. Therefore, privacy and security should be considered at every stage of a system design whereas advantages and disadvantages should be rated and compared to internal and external factors once a company or a person decides to go into the business of cloud computing or become just an user.


Cloud computing privacy data network security information 


  1. 1.
    Mohamed, A.: A history of cloud computing (2009),
  2. 2.
    Gourley, B.: Cloud Computing and Cyber Defense. A White Paper provided to the National Security Council and Homeland Security Council as input to the White House Review of Communications and Information Infrastructure, Crucial Point LLC (2009)Google Scholar
  3. 3.
    Reingold, B., Mrazik, R.: Cloud computing: the intersection of massive scalability, data security and privacy (Part I). Cyberspace Lawyer, [FNa1] 14 No. 5 GLCYLAW 1 Page 114 NO. 5, Cyberspace Law. 1, LegalWorks (2009)Google Scholar
  4. 4.
    United States National Standards for Information Technology,
  5. 5.
    Dataline White Paper: Cloud computing for national security applications,
  6. 6.
    Merrill Lynch,
  7. 7.
    Bruening, P., Treacy, B.: The Bureau of National Affairs, Inc. Cloud Computing: Privacy, Security Challenges, Privacy&Security Law. PVLR ISSN 1538-3423 (2009)Google Scholar
  8. 8.
    ISACA. Emerging Technology. White Paper Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives (2009)Google Scholar
  9. 9.
    Flinders, K.: Microsoft slashes cost of cloud computing (2009),
  10. 10.
    Webbmedia Group’s Knowledge Basem, Cloud Computing Explained (2009),
  11. 11.
    Binning, D.: Top five cloud computing security issues (2009),
  12. 12.
    Gellman, R.: Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing, World Privacy Forum (2009)Google Scholar
  13. 13.
    Bertino, E., Paci, F., Ferrini, R., Shang, N.: Privacy-preserving Digital Identity Management for Cloud Computing, CS Department, Purdue University Bulletin of the IEEE Computer Society Technical Committee on Data EngineeringGoogle Scholar
  14. 14.
    Reingold, B., Mrazik, R.: Cloud computing: Industry and government development (Part II)Google Scholar
  15. 15.
    Zimski, P.: Cloud computing faces security storm (2009),
  16. 16.
    Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-Preserving Public Auditing for Data Storage: Security in Cloud Computing, Illinois Institute of Technology, Chicago IL 60616, USA, Worcester Polytechnic Institute, Worcester MA 01609, USA (2009)Google Scholar
  17. 17.
    104th Congress, The Health Insurance Portability and Accountability Act (HIPAA) of, P.L.104-191 (1996),
  18. 18.
    Yee, A.: Cloud Computing Security Risks - Are they real (2009),
  19. 19.
    Andrei, T.: Cloud Computing Challenges and Related Security Issues, p. 5 (2009)Google Scholar
  20. 20.
    ENISA: Cloud Computing Benefits, risks and recommendations for information security, Report (2009)Google Scholar
  21. 21.
    Almond, C.: A Practical Guide to Cloud Computing Security: What you need to know now about your business and cloud security, Avande (2009),
  22. 22.
    Brodkin, J.: Gartner: Seven cloud-computing security risks, Network World (2009)Google Scholar
  23. 23.
    Tchifilionova, V.: The mirage of law - an oasis for surveillance. In: International Politics, vol. 4, pp. 7–23. South-west University “Neofit Rilski” Press, Blagoevgrad (2009), (in Bulgarian/English) ISSN 1312-5435Google Scholar
  24. 24.
    Davies, S.: Unprincipled privacy: why the foundations of data protection are failing us. University of New South Wales Law Journal (2001),
  25. 25.
  26. 26.
    Trapani, G.: The Hidden Risks of Cloud Computing, Lifehacker (2009)Google Scholar
  27. 27.
    95/46/EC Directive of the European Parliament and the Council (1995),
  28. 28.
    Hurley, D.: “A whole world in a glance: privacy as a key enabler of individual participation in democratic governance”, Harvard Infrastructure Project, Harvard (2001),
  29. 29.
    EPIC, Before the Federal Trade Commission, Complaint and request for Injunction. In the Matter of Google, Inc. and Cloud Computing ServicesGoogle Scholar
  30. 30.
    Vijayan, V.: Google privacy convictions in Italy spark outrage (2010),
  31. 31.
    Cavoukian, A.: Privacy in the clouds: A White Paper on Privacy and Digital Identity: Implications for the Internet, Information and privacy commissioner of Ontario (2009)Google Scholar
  32. 32.
    Bergkamp, L., et al.: EU Data Protection Policy. Computer Law and Security Report 18(1), 2002 (2002)Google Scholar
  33. 33.
    Litan, R.: Balancing Costs and Benefits of New Privacy Mandates. AEI-Brookings Joint Canter for Regulatory Studies, working paper 99-3 (April 1999)Google Scholar
  34. 34.
    The Information Commissioner’s Office, PIA’s Book (2007),
  35. 35.
    Pearson, S.: Taking Account of Privacy when Designing Cloud Computing Services. HP Laboratories, HPL-2009-54 (2009)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2011

Authors and Affiliations

  • Vassilka Tchifilionova
    • 1
  1. 1.National Laboratory of Computer VirologyBulgarian Academy of SciencesSofiaBulgaria

Personalised recommendations