The loss of control by cloud-service consumers represents a
serious threat to data integrity, confidentiality and privacy principles. A reference for defining principles for
protection of privacy and personal data is the Madrid Resolution which was
approved by data protection authorities from fifty countries. “It states the urgent need to protect privacy
in a world without borders and attain a joint proposal for the establishment of
international standards on privacy and data protection. Its purpose is to
define a set of principles and rights guaranteeing the effective and internationally
uniform protection of privacy with regard to processing of personal data, and
to facilitate the international flows of personal data inherent in a globalized
world.”
The expanding quantity of personal data will drive the
demand for cloud services. Some of the
main privacy challenges for cloud computing are:
·
- Complexity of risk assessment
- With service providers promoting a simple way to flow personal data irrespective of national boundaries, a challenge arise in terms of checking the date processing life cycle and its compliance with legal frameworks.
- Emergence of new business models and their implications for consumer privacy
- The expand of technology, data demand, and collection means that new business models will be implemented to manage this data. “The fact that the applications may not all be operated by the same SaaS provider could result in differences in terms of reliability and security. Such models could become more widespread in the future, and their legal and security/privacy implications need to be clearly understood.”
- Regulatory compliance
Privacy- The state or condition of being free from being
observed or disturbed by other people
Compliance- The action or fact of complying with a wish or
command.
Sources:
Privacy is always an issue in networks. in my point of view, cloud computing attract a lot of different hackers which indicate a very high security systems that will stop their attacks.
ReplyDeletehow well are the security systems in cloud computing comparing to the hackers attacks ?
Mustafa Alaswad