Privacy in the Cloud: Going Beyond the Contractarian Paradigm
Masooda N. Bashir, Jay P. Kesan, Carol M Hayes and Robert Zielinski
1. Citation
Bashir, M, Hayes, C, Kesan, J & Zielinski, R 2011, “Privacy in the Cloud: Going Beyond the Contractarian Paradigm”, Proceedings of the 2011 Workshop on Governance of Technology, Information, and Policies, pp. 21-27, December 2011
2. Purpose of the Article
The purpose of the article is to provide a brief summary of cloud computing, a relatively new concept that has emerged with the increasing use of technology. In describing cloud computing, the article also informs the general public of its limited privacy and security levels, one of the main issues currently surrounding cloud computing. The article evaluates existing laws governing the privacy and security of the information and data of individuals, prompting readers to be more cautious in their use of the cloud.
3. Key Information
3.1 Cloud Computing
Cloud computing is defined by the article as the use of various softwares (such as hardware, storage and systems software) based in large global data centres rather than in local servers in personal computers. Cloud computing is believed to provide a range of benefits such as increased flexibility, reliability, portability and efficiency. It will simplify devices as well as reduce costs and the time taken to complete tasks.
However, at the same time, cloud computing gives rise to security, privacy and legal issues. Some of these
Cloud computing is a new technology that comes with both benefits and drawbacks and like any new tech it can be used to great success when paired with steps to mitigate the security issues it raises. Cloud computing has become somewhat of an ambiguous term often having different meaning for different people. An article in InfoWorld (2013) stated, ”Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any
This research paper tackles the issues that faces Cloud Computing today and gives the experts and industry’s point of view on the matter. The aspects explored are the significant industry questions that have risen about the use of Cloud Computing, business value, organization impact, adaptability, limitations, initial cost of implementation, and the severe business security risks
A significant paradigm shift is represented by public cloud computing from conventional norms of an organizational data center to a de-parameterized infrastructure which opens gates for potential adversaries to use. Cloud computing should be approached carefully with any emerging information technology area with due consideration to the sensitivity of data. A good planning helps and ensures that the computing environment is secure to the most possible extant and is in compliance with all relevant policies of an organization and makes sure the privacy is maintained.
A significant paradigm shift is represented by public cloud computing from conventional norms of an organizational data center to a de-parameterized infrastructure which opens gates for potential adversaries to use. Cloud computing should be approached carefully with any emerging information technology area with due consideration to the sensitivity of data. A good planning helps and ensures that the computing environment is secure to the most possible extant and is in compliance with all relevant policies of an organization and makes sure the privacy is maintained.
Cloud computing is an internet-based storage and management computer. It is a flexible, efficient, economic, environment friendly IT technology. For these advantages and the big business value of cloud computing, thousands of companies and institutions in different industries have begun to use cloud computing technology. For the widely use of cloud computing, now we are in the age of cloud computing. How to deal with its challenges has become a problem we are feeling obliged to face, especially the security issues. This research paper will first describe some characteristics and definitions of cloud computing. In section two, I will show two kinds of patterns of cloud computing,
Cloud services: The organizations have been highly dependent on the cloud services. The cybercriminals have been seeking ways to exploit corporate security policies for protecting cloud services. The cloud services have been providing immense risk of data being disclosed deliberately or accidentally. The hosting companies have a greater ease of control over the private data and information and can even communicate between the end user and access his user data even without his permission. Therefore this threat has to be placed at the highest priority. Additionally, the cloud providers have the authority to the share information with any of the third parties even without any warrant. All these activities poses privacy concerns as the data can be access on the cloud anywhere and anytime where the information can be deleted, or even altered. All these activities have further left a room for potential unwanted disclosure of data and information on the cloud. Thus using cloud services in an organization poses a threat to exploitation and stealing of confidential data by their competitors, cybercriminals and vigilante justice seekers (Shaikh, F. B., & Haider, S., 2011).
Cloud computing is moving into the mainstream. Moving to the cloud might be a viable option for some consumers. However, there are many facets to consider before moving to the cloud. There are four types of clouds, public, private, community, and hybrid. All four cloud arrangements have pros and cons, and they need to be weighed before a decision is made. Two main challenges of clouds are security and privacy. These two main issues must be addressed prior to choosing a cloud service. As a consumer, you make the choice for how stringent your security and privacy are to your stakeholders.
Abstract—The field of cloud computing has grown in popularity over the years with big software giants like Amazon, Microsoft and Google providing their own offerings. Some of features which make the cloud so attractive is the fact that it provides rapid elastically and easy scalability. Even though cloud adoption has been quite rapid, many of the business are reluctant to move to the cloud owing to the security and privacy concerns associated with the cloud. In this survey paper, we explore some of the security issues in cloud computing and the current efforts of the research community to tackle these issues.
The development of cloud computing services is speeding up the rate in which the organizations outsource their computational services or sell their idle computational resources. Even though migrating to the cloud remains a tempting trend from a financial perspective, there are several other aspects that must be taken into account by companies before they decide to do so. One of the most important aspect refers to security: while some cloud computing security issues are inherited from the solutions adopted to create such services, many new security questions that are particular to these solutions also arise, including those related to how the services are organized and which kind of service/data can be placed in the cloud. Aiming to give a better understanding of this complex scenario, in this article we identify and classify the main security concerns and solutions in cloud computing, and propose a taxonomy of security in cloud computing, giving an overview of the current status of security in this emerging technology.
The impacts of cloud computing has touched almost every area of Information Technology. The information kept in the cloud is private and confidential and protected by laws that regulate it and protects it. The cloud providers faces laws that relate to the preservation of critical information touching on taxes, security, and sometime employment regulations. Also in other circumstances, they are forced to comply with laws requiring them to destroy such
Usage of remote servers via internet to store, manage and process data instead of using a personal computer is known as Cloud computing. It’s a set of Information Technology services with the ability to scale up or down their service requirements. Most of the cloud services are provided by a third party service provider. In cloud computing, organizations can utilize IT services without in advance investment. Despite its benefits obtained from the cloud computing, the organizations are slow in accepting it due to security issues and challenges. Security is one of the major problems which hinder the growth of cloud. It’s not wise to handing over the important data to another company; such that clients need to be vigilant in understanding the risks of data infringement in this new environment. This paper discusses a detailed analysis of the cloud computing security issues and challenges. (Ayoleke)
Cloud computing has become a major topic of discussion and debate for any business or organization which relies on technology. Anyone connected to the Internet is probably using some type of cloud computing on a regular basis. Whether they are using Google’s Gmail, organizing photos on an Apple iPhone’s photo steam or searching the Web with Bing they are engaged in cloud computing. The interesting thing about cloud computing is it did not start as a technology for the business enterprise, but was driven by the public with services like Facebook. Over the last few years businesses have started to see the value of cloud computing causing it to become a major technology solution for businesses and organizations around the world.
Cloud computing security or also known as cloud security talks about a broad set of technologies, policies and controls deployed to protect applications, data, and the corresponding infrastructure of cloud computing. The cloud is a great invention to allow high capacity storage of data but without the cost to allow sharing of resources in a quick and timely manner. With technology becoming advanced in such a short amount time, new steps must be created to protect people information from being hacked. Hacker’s mission is determined by greed, anger, or request to damage their victims and the organization they might be a part. No one can actually stop all the potential vulnerabilities from being breached, but the provider and clients
The article “Cloud Computing: State of the Art and Security Issues” is written by Shruti Chhabra and V.S. Dixit, published by ACM SIGSOFT on 3rd April 2015. The article appears to be a collection of basics terminologies for Cloud Computing along with some categories comparisons between various Cloud services available in the market. In an attempt to discuss various security issues related to Cloud Computing, the authors have divided the article into nine areas as summarized below.
The goal of cloud computing is to apply traditional supercomputing, or high-performance computing power, normally used by military or research facilities, to perform tens of trillions of computations per second, in consumer-oriented applications such as financial portfolios, to deliver personalized information, to provide data storage or to power large, immersive computer games. When organizations contract for cloud services, such as applications, software, data storage, and processing capabilities, they can improve their efficiency and their ability to respond more quickly and reliably to their customers’ needs. At the same time, there are risks to be considered, including maintaining the security and privacy of systems and information, and assuring the wise expenditure of IT resources.