You are on page 1of 3

Literature Review

Rahul Sharma 6705707

Privacy in Cloud Computing

As a metaphor for the Internet, "the cloud" is a familiar cliché, but when combined with
"computing" the meaning gets bigger and fuzzier. Some analysts and vendors define cloud
computing narrowly as an updated version of utility computing. Cloud computing describes a new
and different consumption and delivery model for IT services based on Internet protocols, and it
typically involves provisioning of dynamically scalable and often virtualized resources.1

Another different definition of “cloud computing” is seen as running computer applications off a
remote server (i.e. in the cloud) via the internet. Using either definition, one could then posit that
cloud computing services can exist in many forms and variations such as photography sites, social
networking sites, web collaborations, as well as services seen as more traditional internet services
like online data storage, and email. For the purposes of this particular review, I would prefer using
latter definition.2

As with other major technological transitions, the evolution of cloud computing has drawn
widespread attention. It has also raised policy questions concerning how people, organizations, and
governments handle information and interactions in this environment.3

According to the recent findings around 69% of the users store there data online or use word
applications which involves the functionality of web and according to these findings4, the most
important in terms of privacy relate to what the hosts actually did with information stored on their
servers, 68 percent of respondents who said they'd used cloud services declared that they would be
"very" concerned, and another 19 percent at least "somewhat" concerned, if their personal data
were analyzed to provide targeted advertising”4

The most important known fact that the content you get depends on which circles you socialise
with, that Google analyses email information to provide exactly that, targeted advertising. Users
however were universal in their condemnation of hosts selling or using files for marketing purposes.5

There is one of the very interesting article “Why are Google and Facebook fighting to control our
data?”6 because it was all about accessing the information from other company’s database for there
business and to retain or to expand their users.7

1
http://www.infoworld.com/d/cloud-computing/what-cloud-computing-really-means-031
2
http://www.privacyrights.org/ar/cloud-computing.html
3
microsoft.com/.../3/.../cloud_privacy_wp_102809.pdf
4
http://www.pewinternet.org/Reports/2008/Use-of-Cloud-Computing-Applications-and-Services.aspx
5
http://arstechnica.com/tech-policy/news/2008/09/pew-cloud-computing-study-debuts-at-google-event-in-
progress.ars
The concept and way of handing sensitive and private data to another company worries many
people Is data held somewhere in the cloud as secure as data protected in user-controlled
computers and networks? Privacy and security can only be as good as its weakest link. Cloud
computing increases the risk of data theft and use of private information.8

many of the users whoever uses any of the web service agrees to the terms and conditions
whichever is given by the companies like “For content that is covered by intellectual property rights,
like photos and videos , you specifically give us the following permission, subject to your privacy and
application settings you grant us a non-exclusive, transferable, sub-licensable, royalty-free,
worldwide license to use any IP content that you post on or in connection with Facebook .”9

Another implied consent states ““You hereby grant Facebook an irrevocable, perpetual, non-
exclusive, transferable, fully paid, worldwide license (with the right to sublicense) to (a) use, copy,
publish, stream, store, retain, publicly perform or display, transmit, scan, reformat, modify, edit,
frame, translate, excerpt, adapt, create derivative works and distribute (through multiple tiers), any
User Content you (i) Post on or in connection with the Facebook Service or the promotion thereof
subject only to your privacy settings or (ii) enable a user to Post, including by offering a Share Link on
your website and (b) to use your name, likeness and image for any purpose, including commercial or
advertising,each of (a) and (b) on or in connection with the Facebook Service or the promotion
thereof.””10

As discussed in the previous articles Privacy issues are still Foggy as it is still unclear The increased
risks of inadvertent or deliberate disclosure of private and sensitive data by posting to sites , The
increased exposure to malware that is commonly hiding on and distributed through these sites, The
increased risk of unauthorized use of private data used on the cloud computing sites as a result of no
access controls, Determining how data protection requirements apply to information stored in these
computer clouds, Determining the retention requirements for information put into the clouds.11

Can information be permanently and completely removed from the clouds once it is put there?
Determining the logs that need to be generated and maintained for access to data in the clouds.
Determine logs that are necessary to show how information is accessed, copied, modified and
otherwise used and now in some case private data is also compared with the “toxic waste” as it is a
danger of spreading it to the word.12

One of the major issue with cloud computing is that technology is way ahead of the law. There are
many questions that need to be answered which Does the user or the hosting company own the
data? If the host company goes out of business, what happens to the users' data it holds? And, most
importantly from a privacy standpoint, how does the host protect the user's data.

6
http://arstechnica.com/tech-policy/news/2008/09/pew-cloud-computing-study-debuts-at-google-event-in-
progress.ars
7
http://arstechnica.com/tech-policy/news/2008/09/pew-cloud-computing-study-debuts-at-google-event-in-
progress.ars
8
http://www.worldprivacyforum.org/cloudprivacy.html
9
facebook.com/terms
10
http://consumerist.com/2009/02/facebooks-new-terms-of-service-we-can-do-anything-we-want-with-your-
content-forever.html
11
https://www.infosecisland.com/blogview/3539-Privacy-and-Cloud-Computing-Challenges.html
12
http://www.privacyrights.org/ar/cloud-computing.htm
So its been advised in most of the articles that before you utilize any cloud computing services, be
aware of the potential risks. And make sure that you carefully read the privacy policy of the hosting
company to become aware of your rights.

As from the last article reviewed Governments are also making the efforts to understand the
implications of the information security for its citizens. In particular, the European Union has
organised a panel of regulators to lay out operating guidelines for social networks for use within the
EU. Included in the guidelines are provisions that “social networks must delete accounts that have
been inactive for long periods, as well as discard users’ personal information after they delete their
accounts13

13
http://mashable.com/2009/06/24/eu-privacy-social-networks/

You might also like