The Necessity of Legally Compliant Data Management in European Cloud Architectures

Size: px
Start display at page:

Download "The Necessity of Legally Compliant Data Management in European Cloud Architectures"

Transcription

1 The Necessity of Legally Compliant Data Management in European Cloud Architectures Szilvia Varadi a, Attila Kertesz b, and Michael Parkin c a University of Szeged, Department of International and European Law, H-6722 Szeged, Rakoczi ter 1., Hungary varadiszilvia@juris.u-szeged.hu b MTA SZTAKI Computer and Automation Research Institute, H-1518 Budapest, P.O. Box 63, Hungary attila.kertesz@sztaki.hu c European Research Institute in Service Science, Tilburg University, 5000 LE Tilburg, P.O. Box 90153, The Netherlands m.s.parkin@uvt.nl Abstract Taking advantage of flexible resource provisions enabled by Cloud Computing, many businesses have recently migrated their IT applications and data to the Cloud, allowing them to respond to new demands and requests from customers. However, Cloud Computing also moves functions and responsibilities away from local ownership and management to a third-party provided service, and brings with it a set of associated legal issues, such as data protection, licensing, intellectual property rights and the need to comply to necessary regulation. In this paper we evaluate commonly-observed Cloud Computing use cases against the law applying to Cloud Computing to find where legal problems may arise. We derive a general architecture for Clouds and use it to illustrate common Cloud Computing usage patterns. The use cases are assessed against evaluation criteria derived from the relevant Cloud Computing law for the data processing of end-user details and materials, including roles and responsibilities necessary for legal compliance. The Data Protection Directive of the European Union has been used in this evaluation, as it is a commonly accepted and influential directive in the field of data processing legislation. Keywords: European Law; Data Protection; Cloud Computing; Security. 1. Introduction Cloud Computing offers on-demand access to computational, infrastructure and data resources operated from a remote source. Recently, this form of service provision has become hugely popular, with many businesses migrating their IT applications and data to the Cloud to take advantage of the flexible resource provision that can bring benefits to businesses which need to be agile and respond quickly to new demands and requests from customers. As new products and technologies are offered in the near future, Gartner estimates that in the period , $112 billion will be spent by businesses and individuals on Cloud Computing offerings from vendors such as Amazon, IBM, Microsoft and many others (Pring et al., 2010). The technical motivation for Cloud Computing is introduced in (Buyya et al., 2009; Vaquero et al., 2008), but at a working level Cloud solutions provide a business with the option to outsource the operation and management of IT infrastructure and services, allowing the business and its employees to concentrate on their core competencies. This, together with pay as-you-go billing that reduces the need for up-front capital expenditure, means using Cloud Computing solutions allows services to be designed and tailored to the individual requirements of a business. However, Cloud Computing also moves functions and responsibilities away from local ownership and management to a third-party provided service, and brings with it a set of associated legal issues, such as data protection, licensing, intellectual Preprint submitted to CLSR

2 property rights and the need to comply with necessary regulation. As more and more businesses become global in their outlook, concerns also remain over privacy of widely-distributed data and its processing. Regulations focusing on geographical locations may be a large obstacle to a widespread adoption of Cloud Computing solutions by companies (Svantesson and Clarke, 2010). As a result of the pace of technical and economic progress in this field it is therefore important to determine the compliance of commonly-observed Cloud Computing patterns-of-use to legal constraints and requirements. In this paper we provide a method for and the results of an evaluation of commonlyobserved Cloud use cases against the law applying to Cloud Computing. To do this we derive a general architecture for Clouds and use it to illustrate common Cloud Computing usage patterns. To point out where problems may arise, the use cases are assessed against evaluation criteria derived from the relevant Cloud Computing law for the data processing of end-user details and materials, including the roles and responsibilities necessary for legal compliance. To clarify legal compliance in the identified usage patterns, we consider the Data Protection Directive (Directive 95/46/EC, 1995) of the European Union a commonly accepted and influential directive in the field of data processing legislation. This is not the first research carried out in this field, e.g., a paper by Bygrave (Bygrave, 2000) investigates the possible impact of the directive on the activities of E-commerce operators, and later a deliverable of the OPTIMIS project (OPTIMIS, 2010) (which we refer to again in Section 2) studies in detail the applicability of this directive for their own Cloud deployment models. In this paper we take a step forward and examine use cases identified in a generalized architecture compiled from reports of international expert groups and research projects. The remainder of this paper is as follows: Section 2 presents European law applying to Cloud Computing concentrating on data processing legislation, and introduces the relevant roles and the evaluation criteria derived from the data-processing legislation for common Cloud Computing use cases; Section 3 describes and analyzes several Cloud architectures and derive a general Cloud architecture that encompasses their features. Section 4 uses specific use cases of the general Cloud architecture to show where legal questions may arise, and Section 5 discusses the recent European reform and future developments in this area. Finally, the findings are summarized in Section Legislation applying to the Cloud As described in the introduction, Cloud Computing allows the outsourcing of computational power, data storage and other capabilities to a remote third-party. In the supply of any goods and services, the law gives certain rights that protect the consumer and provider, which also applies for Cloud Computing: it is subject to legal requirements and constraints to ensure Cloud services are accurately described and provided to customers with guarantees on quality and fitness-for-purpose. As Section 2 of (OPTIMIS, 2010) describes, the characteristics of Cloud Computing make it of interest to three main fields of law: Intellectual property law, as data and applications (i.e., code) hosted in the Cloud may contain trade secrets or be subject to copyright and/or patent protection; Green (i.e., ecological) legislation, since the datacenters hosting the basic Cloud infrastructure (e.g., servers, switches, routers, etc.) require a large amount of energy to operate and indirectly produce carbon dioxide; Data protection law. In this evaluation of Cloud architectures against legal requirements we have chosen to perform the evaluation exclusively using requirements from data protection law. We do not consider intellectual property law because, as (OPTIMIS, 2010) describes, it is often considered on a case-by-case basis making it difficult to derive common requirements to fulfill these obligations for a Cloud architectures. Secondly, green legislation is also not considered here as compliance to it is an orthogonal concern to the Cloud architecture used; different providers may implement the same architecture with different levels of eco-friendliness. However, using only one field of law does not restrict the evaluation; data protection covers the dynamic provisioning and processing of data in Cloud environments intrinsic to the operation of all

3 Clouds and the field covers the majority of currently available Cloud Computing characteristics and functions, including cases where (Section 4 of OPTIMIS, 2010): The infrastructure used to store and process a costumer's data is shared with other customers (i.e., multi-tenancy); The Cloud provider's servers are located in several jurisdictions; Data is transferred from one location (also called as establishment) to another depending on where resources are available; The Cloud service provider decides the location of the data, service and security standards instead of the customer; IT resources are not dedicated to a customer but instead are dynamically provisioned. Thus, data protection legislation is fundamental to Cloud Computing as the consumer loses a degree of control over personal artifacts when they are submitted to the provider for storage and possible processing. To protect the consumer against the provider misusing their data, data processing legislation has been developed to ensure that the fundamental right to privacy is maintained. However, the distributed nature of Cloud Computing (in that Cloud services are available from anywhere in the world) makes is difficult to analyze every country's data protection laws for common Cloud architecture evaluation criteria. We have therefore chosen a common directive that applies as widely as possible and used the European Data Protection Directive (DPD) as a basis for our evaluation. Although it is an EU directive, countries that wish to engage in data transactions with EU Member States are indirectly required to provide an adequate level of protection and the Directive has had a far greater global impact than thus far acknowledged, making it an effective mechanism to raise the level of data protection worldwide (Birnhack, 2008) European Data Protection Directive EU Data Protection Directive (Directive 95/46/EC, 1995) is a directive adopted by the European Union designed to protect the privacy and protection of all personal data collected for or about citizens of the EU, especially as it relates to processing, using, or exchanging such data 1. All 27 EU Member States are reported to have enacted their own data protection legislation that transposes the directive into internal law, Canada, Australia and Argentina have implemented legislation that complies with the DPD, Switzerland has partially implemented legislation and the USA has voluntary registration to the Safe Harbor program to ensure private companies who sign up adhere to the rules set out in the DPD (Whittaker, 2011). The DPD has therefore been used in this evaluation as it is a commonly accepted and influential directive in the field of data processing legislation. It was produced in 1995, before Cloud Computing was developed, but can be applied to Cloud Computing as it describes how the protection of the processing of personal data and the free movement of such data should be achieved in a technology-neutral way. The DPD can be summarized as having elements concerned with the responsibilities of two actors involved in data exchanges and restrictions on the free movement of data between them based on their location Relevant roles defined in the DPD The requirements of the DPD are expressed as two technology-neutral actors or roles that have certain responsibilities that must be carried out in order to fulfill the directive. These roles, the data controller and data processor, are naturally equivalent to service consumer and service provider roles found distributed computing. According to the Article 2 of DPD (Directive 95/46/EC, 1995) a data controller is the natural or legal person which determines the means of the processing of personal data, whilst a data 1 What is EU Data Protection Directive 95/46/EC? Online: Whatis.com, 2008.

4 processor is a natural or legal person which processes data on behalf of the controller. However, following these definitions, a special case arises: if the processing entity plays a role in determining the purposes or the means of processing, it is a controller rather than a processor. Finally, although not a specific role, third parties are defined in Article 2 of DPD (Directive 95/46/EC, 1995) as any natural or legal person, public authority, agency or any other body other than the data subject, controller, processor and the persons who are authorized to process the data. This definition is further clarified in (Data Protection Working Party, Feb. 2010) by stating that such a third party has no specific legitimacy or authorization to process the personal data, therefore it is not involved in the controller-to-subject relationship. The DPD was designed to allow the free-flow of data between EU Member States. However, this directive also gives the opportunity to third countries to participate in free-flow activities, if deemed to implement adequate level of data protection (Article 25 of DPD (Directive 95/46/EC, 1995)). This condition means that a third country has to provide at least the same level of protection as the national provisions of the Member States. Once this condition is fulfilled, they can interoperate with other providers within the EU with no barriers Responsibilities associated to the roles of the DPD We have chosen the EU Data Protection Directive as legislation to evaluate current Cloud Computing use cases, since this directive is a widely-used and adopted set of rules governing Cloud Computing fundamentals. The DPD also introduces a set of responsibilities for the roles of data controller and processor. We can use these duties to form evaluation criteria to assess Cloud Computing use cases. The directive is also discussed in much detail with respect to Cloud Computing in (OPTIMIS, 2010), and provides a set of criteria that the roles must meet. According to these sources, the data controller must: Be responsible for compliance with data protection law. Comply with the general principles (e.g., legitimate processing) laid down in Article 6 of DPD. Be responsible for the choices governing the design and operation of the processing carried out. Give consent for processing to be carried out (explicit or implied, orally or in writing). Be liable for data protection violations. The data processor, meanwhile, must: Process data according to the mandate and the instructions given by the controller. Be an agent of the controller. Be a separate legal entity to the controller. These roles are strengthened if: The controller gives detailed instructions to the processor. The controller monitors the processor for the status of the processing. Relevant expertise can be shown to be present in either party (e.g., the processor is a specialist in it). A written contract exists between the controller and processor. The controller is able to exercise full and sole control at any time while the data processing takes place. The controller is informed of the main elements of the processing structure. Finally, in the evaluation of specific Cloud-usage scenarios we will assess location-related issues that may arise due to one of the establishments being outside a jurisdiction. In such cases, in general, an adequate level of data protection should be provided according to the EU DPD.

5 3. Architectural models of Clouds 3.1. View of the European Commission An expert group associated with the European Commission published their view on Cloud Computing in (Jeffery and Neidecker-Lutz, 2009). The report categorizes Cloud architectures into five groups, as shown in Fig. 1. Private Clouds (i) consist of resources managed by an infrastructure provider (IP) that are typically owned or leased by an enterprise from a service provider (SP). Usually, services with Cloud-enhanced features are offered, therefore this group includes SaaS (Software as a Service) solutions like ebay 2. Public Clouds (ii) offer their services to users outside of the company and may use Cloud functionality from other providers. In this solution enterprises can outsource their services to such Cloud providers mainly for cost reduction. Examples of these providers are Amazon 3 or Google Apps 4. Hybrid Clouds (iii) consist of both private and public Cloud infrastructures to achieve a higher level of cost reduction through outsourcing by maintaining the desired degree of control (e.g., sensitive data may be handled in private Clouds). The report states that hybrid Clouds are rarely used at the moment. In Community Clouds (iv) different entities contribute with their (usually small) infrastructure to build up an aggregated private or public Cloud. Smaller enterprises may benefit from such infrastructures, and a solution is provided by Zimory 5. Finally Special Purpose Clouds (v) provide more specialized functionalities with additional, domain specific methods, such as the distributed document management by Google's App Engine. This group is an extension or a specialization of the previous Cloud categories. Fig. 1. Cloud Architectures from the EC Report 2 ebay Inc. Online: Amazon Web Services. Online: Google Apps for Business. Online: Zimory GmbH. Online:

6 3.2. ENISA The European Network and Information Security Agency (ENISA) differentiates between four architectures (Catteddu and Hogben, 2009; ensia2), which are shown in Fig. 2. A Public Cloud (i) is a publicly-available infrastructure to which any organization may subscribe and use (also called as service consumers (SC)). Private Clouds (ii) offer services built on Cloud Computing principles, but accessible only within a private network. Partner Clouds (iii) are operated by a provider to a limited and welldefined number of parties. Finally, a Cloud Federation (iv) may be built up by aggregating two or more Clouds. Fig. 2. ENISA Cloud Architectures

7 3.3. NIST Cloud Architectures The National Institute of Standards and Technology (NIST) defines four deployment models (Mell and Grance, 2011; Liu et al., 2011) depicted in Fig. 3. According to their definitions, a Private Cloud (i) is an infrastructure operated solely for an organization that may be managed by either the organization or a third-party and located locally or remotely. A Community Cloud (ii) is shared by several organizations, and supports a specific community that has shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be managed by organizations or third parties, and may exist on premises or off premises. A Public Cloud infrastructure (iii) is made available to the general public or a large industry group, and is owned by an organization selling Cloud services. Finally, a Hybrid Cloud (iv) is a composition of two or more Clouds (private, community or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., Cloud bursting for load balancing between Clouds). Fig. 3. NIST deployment models

8 The Cloud Computing Use Case Discussion Group (Cloud Computing Use Case Discussion Group, 2009) adopts the NIST models. They extend the view on Hybrid Clouds by stating that multiple Clouds work together, coordinated by a Cloud broker that federates data, applications, user identity, security and other details. Though a brokering mechanism is needed for federating Clouds, no specific guidelines are given how to achieve this. The Distributed Management Task Force (DMTF) Open Cloud Standards Incubator view (DMTF, 2009) has also adopted the NIST models and defined different scenarios showing how Clouds may interoperate. These scenarios explain how data centers interact with Cloud providers and differentiate three cases: If a datacenter, run by Service Provider 1 (SP1) and hosted by Infrastructure Provider 1 (IP1), exceeds the available capacity limits then IP2 provides extra computing capacity for IP1 and SP1 is unaware of this provisioning. In a multiple Cloud scenario, SP1 may operate services in both IP1 and IP3 Clouds, therefore a datacenter may request services from both providers since they may support different services or Service-level Agreement (SLA) parameters. A provider may act as a Cloud broker to federate resources from other providers (e.g., IP1 and IP2) to make them available to its consumers transparently without using any of its own resources OPTIMIS project The architectural views of the OPTIMIS project (Ferrer et al., 2012) are shown in Fig. 4. The project has three basic architectural scenarios. In a Federated Cloud Architecture (i), a Service Provider (SP) assesses an Infrastructure Provider (IP). IPs can share resources among each other. In a Multi-Cloud Architecture (ii), different infrastructure providers are used separately by a service provider. Finally in a Hybrid Cloud Architecture (iii), a Private Cloud (PC) is used by the SP, which can utilize resources of different IPs. Fig. 4. OPTIMIS Cloud architectures 3.5. Reservoir project The Reservoir project (Rochwerger et al., 2009) claims that small and medium Cloud providers cannot enter the Cloud-provisioning market due to the lack of interoperability between Clouds. Their approach is

9 exemplified by the electric grid approach: for one facility to dynamically acquire electricity from a neighboring facility to meet a spike in demand. Disparate datacenters should be federated in order to provide a seemingly infinite service computing utility. Regarding the architectural view, a Reservoir Cloud consists of different Reservoir Sites (RS) operated by different IPs. Each RS has resources that are partitioned into isolated Virtual Execution Environments (VEE). Service applications may use VEE hosts from different RSs simultaneously. Each application is deployed with a service manifest that formally defines its SLA contract. Virtual Execution Environment Managers (VEEM) interact with VEEs, Service Managers and other VEEMs to enable federations to be formed. A VEEM gathers interacting VEEs into a VEE group that serves a service application. This implies that a Reservoir service stack has to be present on the resources/sites of IPs. Their specialized Cloud architecture is depicted in Fig. 5. Fig. 5. Reservoir Cloud Architecture

10 3.6. Our unified view Fig. 6 shows an extended view of Federated Clouds incorporating private, public, multi- and hybrid Cloud architectures. Interoperability is achieved by high-level brokering instead of bilateral resource renting. Nevertheless different IPs may share or rent resources, but it is transparent to their management. Such a federation can be enabled without applying additional software stack for providing low-level management interfaces (Marosi et al., 2011). The logic of federated management is moved to higher levels, and there is no need for adapting interoperability standards by IPs (and some industrial providers are reluctant to do so). In this case, Cloud providers offering PaaS solutions may form sub-federations simultaneously to this approach. Specific service applications may be more suitable for such a solution, and projects like Reservoir (Rochwerger et al., 2009) and 4CaaSt 6 are working towards such a solution. Our approach targets IaaS-type providers, e.g., RackSpace, the infrastructure services of Amazon EC2, and providers using Cloud middleware such as OpenNebula or Eucaliptus. Fig. 6. Federated Cloud Management Architecture 6 4CaaSt EU FP7 project. Online:

11 4. Use cases exemplifying legal aspects 4.1. General usage scenarios The federated Cloud architecture described in Section 3.6 is now explored through a series of use cases to demonstrate where legal issues can arise in this general organizational structure. In these use cases the relevant actors and their roles (summarized in Section 2.2) will be identified and the necessary actions should be defined in order to prevent violations of the directive. As we will show, there are complications when personal data is transferred to multiple jurisdictions. Fig. 7. Common use cases: (a) with one infrastructure provider; (b) with different infrastructure providers The most common use case (C0) depicted in Fig. 7.a is when a user asks a service provider (SP) to store (and possibly process) their personal data. The SP leases Cloud resources from an infrastructure provider (IP) and the private data of the user is stored in a database (DB) and managed by a virtual machine (VM) located in an establishment (E) of the IP. In this simple case the SP is a data controller and IP is the data processor instructed by SP. However, there are questions that arise when this use case is extended. C1: When a SP offers the infrastructure to the user through directly a service front-end. In this case the SP, who is also an IP, is the data controller and there is no data processor. C2: When a Cloud service offered by SP1 is actually re-sold to the end-user from another service provider (e.g., SP2), either SP1 or SP2 may be the data controller. Therefore, if there is a chain of SPs the last entity contacting the IP will become the data controller and the instructed IP will be the data processor. C3: When an infrastructure provider (IP1) uses resources from a different provider (IP2) and, possibly for commercial reasons, this relationship is not made public, the SP using resources of IP1 is not aware of that it is using IP2 as shown in Figure 7.b. Therefore, when data moved from IP1 to IP2 for processing, IP1 will become the controller instead of SP, and IP2 will be the the processor instead of IP1. C4: In the situation where a user asks an SP to manage their private data, and the SP uses an IP for this task which has a public interface, the user may modify its data directly without involving the SP. Here, the user becomes the controller when accessing the database directly. C5: If a user asks two different service providers (SP1 and SP2) to manage two databases, and the user decides to migrate a part of the data from SP1 to SP2 by themselves, the user becomes the data controller

12 for the migration. C6: If an SP utilizes two different IPs (IP1 and IP2) for storing user data, and the user asks the SP to migrate data from IP1 to IP2, the SP will stay in the role of data controller and IP1 will remain the data processor since the SP instructed IP1 to do the transfer. If IP1 is not interoperable with IP2, the SP will fetch the data from IP1 and move it to IP2, so the initial roles will not change. Table 1 summarizes these general cases and depicts the relevant roles (data controller (DC) or data processor (DP)) the participating actors may play regarding data protection compliance. Table 1. Identified roles in common use cases. Use case User Service provider Infrastructure provider C0 - DC DP C1 - DC - C2 - DC DP C3 - DC DC & DP C4 DC DC DP C5 DC DC DP C6 - DC DP Fig. 8. Data distribution regulations related to EU Member States: (a) with one infrastructure provider; (b) with different infrastructure providers 4.2. Location-related cases In the following we discuss use cases where legal issues may arise due to private data processing at different geographical locations within the European Union 7. Article 4 of DPD (Directive 95/46/EC, 1995) states that the location of the data controller's establishment determines the national law applicable for data processing. In these cases let us consider the use case where a service managing private user data is deployed and executed in a datacenter of a Cloud Infrastructure Provider (IP) located in a EU Member 7 The DPD also applies to the EEA and EFTA countries according to (EEA Joint Committee, 2000).

13 State (MS). The service provider utilizes several IPs by aggregating them into a Cloud federation. The simplest use case (EU0) is where the SP, who is the data controller, has one establishment (E) located in a EU Member State. Here, the law applicable to data processing will be the national law of the MS regardless of the location of the IP. We now describe more complex cases (from the discussions of the Data Protection Working Party (Data Protection Working Party, Dec. 2010)) to identify the national law applicable. EU1: When an IP has facilities located in different Member States (e.g., MS1 and MS2). It distributes user data handled by a service on a virtual machine (VM1) using a database (DB1) in an establishment of MS1, and another service on a virtual machine (VM2) using a database (DB2) in an establishment of MS2. In this situation, IP will become the data controller, and at each establishment the corresponding national law has to be applied. EU2: Similar to the previous case, when an IP (established in MS1) has different establishments located in different Member States (e.g., MS1 and MS2), and it distributes user data between these establishments, the IP is again the data controller. In the specific case depicted in Fig. 8.a, the processing of the data by VM located in an establishment in MS1 involves data located in a different establishment in MS2, the law of MS1 must be applied. EU3: Similarly to use cases EU1 and EU2, when the IP has several establishments (possibly in a third country), and at least one of these is located in a MS, the applicability of this MS's law will be triggered and has to be applied in all establishments. EU4: Similar to case C3, if IP1 in MS uses resources from a different provider in a non-member State (e.g., IP2), the SP using IP1 may be unaware that it is using IP2. In this situation, IP1 is the data controller and IP2 is the processor and the law of the appropriate MS is applicable. When IP1 is located in an non- MS, and IP2 in a MS, again the law of the appropriate MS is applicable, and IP1 has to provide the adequate level of data protection as defined in the DPD. EU5: When an SP providing a federated Cloud management in an EU MS, and it utilizes different IPs and one of which (IP2) is located in non-ms - depicted in Figure 8.b. Since SP is the data controller and IPs are processors, the law of the SP's MS has to be applied (according to recital (18) in the preamble of DPD (Directive 95/46/EC, 1995)), and IP2 has to provide at least the same level of protection as the national law of MS. Otherwise, if IP2 cannot ensure an adequate level of protection, the decision making process should rule out IP2 from provider selection. EU6: If the SP providing a federated Cloud management (not necessarily in a MS) utilizes different IPs, one of which (IP2) is located at a MS. The SP is the data controller and IPs are processors. Since the establishment (or an equipment) of IP2 is located in a MS, the law of this MS has to be applied, and the establishments located in non-mss have to provide an adequate level of protection. Table 2. Location-related use cases. Use case SP IP National law applicable EU0 DC - E of SP EU1 - DC E x of IP EU2 - DC E i of IP EU3 - DC E MS of IP EU4 - DC & DP E MS of IP EU5 DC DP E of SP EU6 DC DP E MS of IP

14 Table 2 summarizes these location-related use cases, depicts the relevant roles (data controller (DC) or data processor (DP)) the participating actors (SP and IP) may play regarding data protection compliance, and specifies the entity, which location determines the national law applicable for data processing Summary and discussion Regarding the general use cases, Table 1 shows how the SP is mainly responsible for complying with the data protection regulation. When personal data is transferred to multiple jurisdictions it is crucial to properly identify the controller since this role may change dynamically in specific actions. We have seen how information on the exact location of the processing establishments is also of great importance in the use cases. Table 2 highlights that even if one datacenter resides in the EU, the law of the appropriate Member State of this data centre must be applied by the SP. In this section we have shown that identifying the relevant roles and the national law applicable to common Cloud Computing use cases is not straightforward. Cross-continental cases may further complicate the situation, e.g., when a US company stores data to a Cloud provider in France the French law will apply, and the exportation of the processed data back to the US will be restricted or prohibited (Gellman, 2009). Nevertheless, according to the discussion in (Commission Decision, 2000), if the European organization complies with the Safe Harbor privacy principles for the protection of personal data, the data is allowed to be transferred from a Member State to the US. 5. Recent developments and future steps in European legislation As we have seen in the previous section, new developments in legislation regulation applying to Cloud Computing are still needed. This situation is identified by Wong in (Wong, 2011), who gathered related steps of the Art. 29 Working Party to revise the directive and the European Commission has also initiated a public consultation 8, in the framework of their Digital Agenda, to find the requirements, barriers and opportunities for the provisioning and use of Cloud Computing that will contribute to a future European Cloud Computing strategy, scheduled to be published in According to a recent press release of the European Commission (EC Press release, 2012), they proposed a reform of the European data protection rules in a regulation (COM, 2012) that will replace the currently effective Data Protection Directive. Their main goal is to strengthen the users' influence on their personal data. They propose the following key changes: A single set of rules on data protection across the EU to avoid unnecessary administrative requirements. It places increased responsibility and accountability for the companies processing personal data (e.g. they must notify the national supervisory authority of serious data breaches within 24 hours). It promotes a single national data protection authority in each EU country that people can refer to, even when their data is processed by a company based outside the EU. These authorities will be empowered to fine companies that violate EU data protection rules. It strengthens the right to data portability by enabling easier access to users' personal data, and easier data migration among service providers. It introduces the 'right to be forgotten' to enable the deletion of user data upon request, when there are no legitimate grounds for retaining it. It explicitly states that EU rules must be applied for data processing outside the EU by companies that are active in the EU market. As we have seen in Section 4, the currently effective European DPD is basically appropriate for 8 Public Consultation on Cloud Computing by the European Commission. Online: August 2011.

15 determining the law applicable for data management in Cloud services, when the data controller and processor roles are well identified. What is more problematic for companies is to apply the identified law at a European scale, because the Member States implemented the DPD rules in different ways. This fact has also been recognized by the European Commission. In our opinion, instead of taking sanctions, it decided to perform a reform of the data protection rules using the principle of subsidiarity. Based on this principle the Union can introduce a unified legislation for data protection to be applied by all Member States. This reform will also give the opportunity for the Commission to replace the flexible directive with a strictly applicable regulation. Concerning our investigation, this proposal for a new regulation mostly clarifies, restates and strengthens the referred rules of the DPD. Only the so-called 'right to be forgotten' introduces a new responsibility for Cloud service providers. Some providers claim in the service usage terms and conditions to have the right to retain data, which may be affected by this new regulation. Even though it would definitely be a positive sign for the users and would encourage service utilization, but it would also place further development costs for providers, since the removal of all data replicas may also raise some technical problems. 6. Conclusion Many businesses are considering migrating their IT applications and data to Clouds to take advantage of the flexible resource provision such systems enable. However, remote resource provision brings with it new legal issues, such as data protection, licensing and intellectual property rights. In this paper we have gathered the corresponding responsibilities necessary for legal compliance from the Data Protection Directive of the European Union, and mapped the roles it describes to commonly-observed Cloud Computing use cases derived from a generalized model of different Cloud architectural views. As the directive also states that the location of the data controller's establishment determines the national law applicable for data processing, we have also examined usage patterns where different geographical locations of the relevant actors play a part. We can conclude that data protection is a far more complex problem in Cloud systems compared to traditional ICT systems. We identified dynamic roles changing as actions are initiated among the corresponding providers, which may also affect the national law applicable during service execution. Our future work plans to incorporate international legislations applying to Clouds considering crosscontinental cases. Acknowledgements The research leading to these results has received funding from the European Community's Seventh Framework Programme FP7/ under grant agreement (S-Cube). References 1. M. D. Birnhack, The EU Data Protection Directive: An Engine of a Global Regime, Tel Aviv University Law Faculty Papers, no. 95, Tel Aviv University Law School, L. A. Bygrave, European Data Protection, Determining Applicable Law Pursuant To European Data Protection Legislation, Computer Law & Security Report, vol. 16, no. 4, pp , R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility, Future Generation Computer Systems, vol. 25, no. 6, pp , June D. Catteddu and G. Hogben, Cloud computing Risk Assessment: Benefits, risks and recommendations for information security, ENISA report. Online: Nov D. Catteddu and G. Hogben, An SME perspective on Cloud Computing. Cloud Computing SME Survey, ENISA report. Online: November Cloud Computing Use Case Discussion Group. Online: August 2009.

16 7. COM (2012) 11 final, Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation), Brussels, Commission Decision no. 2000/520/EC of 26 July 2000 pursuant to Directive 95/46/EC of the European Parliament and of the Council on the adequacy of the protection provided by the safe harbour privacy principles and related frequently asked questions issued by the US Department of Commerce. Official Journal L 215, pp. 7-47, August Data Protection Working Party. Opinion 1/2010 on the concepts of ``controller'' and ``processor''. Ref. WP 169. Online: Feb Data Protection Working Party. Opinion 8/2010 on applicable law. Ref. WP 179. Online: Dec Decision of the EEA Joint Committee, No. 83/1999 of 25 June 1999 amending Protocol 37 and Annex XI (Telecommunication services) to the EEA Agreement, Official Journal 296, pp. 41, Nov Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, Official Journal L 281, pp , Nov DMTF white paper no. DSP-IS0101, Interoperable Clouds, A White Paper from the Open Cloud Standards Incubator 1.0. Online: Nov EC Press release, Commission proposes a comprehensive reform of data protection rules to increase users' control of their data and to cut costs for businesses, European Commission, IP/12/46, 25/01/2012. Online: europa.eu/rapid/pressreleasesaction.do?reference=ip/12/46, Jan A.J. Ferrer et. al, OPTIMIS: a Holistic Approach to Cloud Service Provisioning, Future Generation Computer Systems, vol. 28, pp , R. Gellman, Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing, World Privacy Forum, February 23, K. Jeffery, and B. Neidecker-Lutz, The Future of Cloud Computing, Opportunities for European Cloud Computing beyond 2010, Expert Group Report, January A. Cs. Marosi, G. Kecskemeti, A. Kertesz and P. Kacsuk, FCM: an Architecture for Integrating IaaS Cloud Systems. In Proceedings of the Second International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2011), IARIA, pp. 7-12, Rome, Italy, P. Mell and T. Grance. The NIST Definition of Cloud Computing, NIST Special Publication Online: September F. Liu, J. Tong, J. Mao, R. B. Bohn, J. V. Messina, M. L. Badger, D. M. Leaf, NIST Cloud Computing Reference Architecture, NIST Special Publication Online: September OPTIMIS FP7 project deliverable no. D , Cloud Legal Guidelines. Online: November B. Pring et. al., Forecast: Public Cloud Services, Worldwide and Regions, Industry Sectors, Gartner report. Online: June B. Rochwerger et. al, The Reservoir model and architecture for open federated cloud computing, IBM Journal of Research and Development, April D. Svantesson, and R. Clarke. Privacy and consumer risks in cloud computing. Computer Law & Security Review, vol. 26, pp , L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, A break in the clouds: towards a cloud definition, SIGCOMM Comput. Commun. Rev. 39, 1, pp , Z. Whittaker, Safe Harbor: Why EU data needs `protecting' from US law. Online: April R. Wong, Data protection: The future of privacy, Computer Law & Security Review, vol. 27, issue 1, pp , February 2011.

Legal Aspects of Data Protection in Cloud Federations

Legal Aspects of Data Protection in Cloud Federations Legal Aspects of Data Protection in Cloud Federations Attila Kertesz a and Szilvia Varadi b a MTA SZTAKI Computer and Automation Research Institute, H-1518 Budapest, P.O. Box 63, Hungary E-mail: kertesz.attila@sztaki.mta.hu

More information

Attila Kertész, PhD. LPDS, MTA SZTAKI. Summer School on Grid and Cloud Workflows and Gateways 1-6 July 2013, Budapest, Hungary

Attila Kertész, PhD. LPDS, MTA SZTAKI. Summer School on Grid and Cloud Workflows and Gateways 1-6 July 2013, Budapest, Hungary CloudFederation Approaches Attila Kertész, PhD. LPDS, MTA SZTAKI Summer School on Grid and Cloud Workflows and Gateways 1-6 July 2013, Budapest, Hungary Overview Architectural models of Clouds European

More information

Chapter 1: Characterizing Cloud Federation Approaches

Chapter 1: Characterizing Cloud Federation Approaches Chapter 1: Characterizing Cloud Federation Approaches Attila Kertesz MTA SZTAKI, Budapest, Hungary, and Software Engineering Department University of Szeged, Szeged, Hungary Abstract: Cloud Computing offers

More information

Cloud Computing Architecture: A Survey

Cloud Computing Architecture: A Survey Cloud Computing Architecture: A Survey Abstract Now a day s Cloud computing is a complex and very rapidly evolving and emerging area that affects IT infrastructure, network services, data management and

More information

Application of Data Protection Concepts to Cloud Computing

Application of Data Protection Concepts to Cloud Computing Application of Data Protection Concepts to Cloud Computing By Denitza Toptchiyska Abstract: The fast technological development and growing use of cloud computing services require implementation of effective

More information

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS Shirley Radack, Editor Computer Security Division Information

More information

yvette@yvetteagostini.it yvette@yvetteagostini.it

yvette@yvetteagostini.it yvette@yvetteagostini.it 1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work

More information

CLOUD COMPUTING IN HIGHER EDUCATION

CLOUD COMPUTING IN HIGHER EDUCATION Mr Dinesh G Umale Saraswati College,Shegaon (Department of MCA) CLOUD COMPUTING IN HIGHER EDUCATION Abstract Technology has grown rapidly with scientific advancement over the world in recent decades. Therefore,

More information

NIST Cloud Computing Reference Architecture

NIST Cloud Computing Reference Architecture NIST Cloud Computing Reference Architecture Version 1 March 30, 2011 2 Acknowledgements This reference architecture was developed and prepared by Dr. Fang Liu, Jin Tong, Dr. Jian Mao, Knowcean Consulting

More information

FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS

FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS International Journal of Computer Engineering and Applications, Volume VIII, Issue II, November 14 FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS Saju Mathew 1, Dr.

More information

Into the Cloud: How will the Draft EU Data Protection Regulation affect cloud computing service providers and users?

Into the Cloud: How will the Draft EU Data Protection Regulation affect cloud computing service providers and users? 10 Juni 2013 Taylor Wessing - Essay Competition 2013 Into the Cloud: How will the Draft EU Data Protection Regulation affect cloud computing service providers and users? by Katarina Kesselová, LLM. Introduction

More information

Cloud Computing; What is it, How long has it been here, and Where is it going?

Cloud Computing; What is it, How long has it been here, and Where is it going? Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where

More information

A Strawman Model. NIST Cloud Computing Reference Architecture and Taxonomy Working Group. January 3, 2011

A Strawman Model. NIST Cloud Computing Reference Architecture and Taxonomy Working Group. January 3, 2011 A Strawman Model NIST Cloud Computing Reference Architecture and Taxonomy Working Group January 3, 2011 Objective Our objective is to define a neutral architecture consistent with NIST definition of cloud

More information

FCM: an Architecture for Integrating IaaS Cloud Systems

FCM: an Architecture for Integrating IaaS Cloud Systems FCM: an Architecture for Integrating IaaS Systems Attila Csaba Marosi, Gabor Kecskemeti, Attila Kertesz, Peter Kacsuk MTA SZTAKI Computer and Automation Research Institute of the Hungarian Academy of Sciences

More information

CHECKLIST FOR THE CLOUD ADOPTION IN THE PUBLIC SECTOR

CHECKLIST FOR THE CLOUD ADOPTION IN THE PUBLIC SECTOR CHECKLIST FOR THE CLOUD ADOPTION IN THE PUBLIC SECTOR [4] CHECKLIST FOR THE CLOUD ADOPTION IN THE PUBLIC SECTOR 1. Introduction Although the use of cloud services can offer significant benefits for public

More information

White Paper on CLOUD COMPUTING

White Paper on CLOUD COMPUTING White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples

More information

Briefly summarised, SURFmarket has submitted the following questions to the Dutch DPA:

Briefly summarised, SURFmarket has submitted the following questions to the Dutch DPA: UNOFFICIAL TRANSLATION Written opinion on the application of the Wet bescherming persoonsgegevens [Dutch Data Protection Act] in the case of a contract for cloud computing services from an American provider

More information

Cloud Computing: Contracting and Compliance Issues for In-House Counsel

Cloud Computing: Contracting and Compliance Issues for In-House Counsel International In-house Counsel Journal Vol. 6, No. 23, Spring 2013, 1 Cloud Computing: Contracting and Compliance Issues for In-House Counsel SHAHAB AHMED Director Legal and Corporate Affairs, Microsoft,

More information

Towards Data Interoperability of Cloud Infrastructures using Cloud Storage Services

Towards Data Interoperability of Cloud Infrastructures using Cloud Storage Services Towards Data Interoperability of Cloud Infrastructures using Cloud Storage Services Tamas Pflanzner 1 and Attila Kertesz 2,1 1 University of Szeged, Department of Software Engineering H-6720 Szeged, Dugonics

More information

Security Considerations for Public Mobile Cloud Computing

Security Considerations for Public Mobile Cloud Computing Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of

More information

Cloud Computing in the Enterprise An Overview. For INF 5890 IT & Management Ben Eaton 24/04/2013

Cloud Computing in the Enterprise An Overview. For INF 5890 IT & Management Ben Eaton 24/04/2013 Cloud Computing in the Enterprise An Overview For INF 5890 IT & Management Ben Eaton 24/04/2013 Cloud Computing in the Enterprise Background Defining the Cloud Issues of Cloud Governance Issue of Cloud

More information

How To Understand Cloud Usability

How To Understand Cloud Usability Published in proceedings of HCI International 2015 Framework for Cloud Usability Brian Stanton 1, Mary Theofanos 1, Karuna P Joshi 2 1 National Institute of Standards and Technology, Gaithersburg, MD,

More information

Interoperable Clouds

Interoperable Clouds Interoperable Clouds A White Paper from the Open Cloud Standards Incubator Version: 1.0.0 Status: DMTF Informational Publication Date: 2009-11-11 Document Number: DSP-IS0101 DSP-IS0101 Interoperable Clouds

More information

IAAS CLOUD EXCHANGE WHITEPAPER

IAAS CLOUD EXCHANGE WHITEPAPER IAAS CLOUD EXCHANGE WHITEPAPER Whitepaper, July 2013 TABLE OF CONTENTS Abstract... 2 Introduction... 2 Challenges... 2 Decoupled architecture... 3 Support for different consumer business models... 3 Support

More information

Data Integrity Check using Hash Functions in Cloud environment

Data Integrity Check using Hash Functions in Cloud environment Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology

More information

Architectural Implications of Cloud Computing

Architectural Implications of Cloud Computing Architectural Implications of Cloud Computing Grace Lewis Research, Technology and Systems Solutions (RTSS) Program Lewis is a senior member of the technical staff at the SEI in the Research, Technology,

More information

Cloud Computing. Bringing the Cloud into Focus

Cloud Computing. Bringing the Cloud into Focus Cloud Computing Bringing the Cloud into Focus November 2011 Introduction Ken Cochrane CEO, IT/NET Partner, KPGM Performance and Technology National co-leader IT Advisory Services KPMG Andrew Brewin Vice

More information

Cloud Computing Service and Legal Issues

Cloud Computing Service and Legal Issues Cloud Computing Service and Legal Issues Takato Natsui Professor of Law, Meiji University, Tokyo, Japan 1. Introduction Many IT businesses have indicated that cloud computing is a very promising emerging

More information

TECHNICAL SPECIFICATION: ABBREVIATIONS AND GLOSSARY

TECHNICAL SPECIFICATION: ABBREVIATIONS AND GLOSSARY REALIZATION OF A RESEARCH AND DEVELOPMENT PROJECT (PRE-COMMERCIAL PROCUREMENT) ON CLOUD FOR EUROPE TECHNICAL SPECIFICATION: ABBREVIATIONS AND GLOSSARY ANNEX IV (E) TO THE CONTRACT NOTICE TENDER NUMBER

More information

NIST Cloud Computing Reference Architecture & Taxonomy Working Group

NIST Cloud Computing Reference Architecture & Taxonomy Working Group NIST Cloud Computing Reference Architecture & Taxonomy Working Group Robert Bohn Information Technology Laboratory June 21, 2011 2 Outline Cloud Background Objective Working Group background NIST Cloud

More information

Security issues for Cloud Computing

Security issues for Cloud Computing 274 Security issues for Cloud Computing Vikas Goyal [1], Dr. Chander Kant [2] [1] Research Scholar, [2] Assistant Professor Deptt. of Comp. Sc. & Appl., Kurukshetra University, Kurukshetra, India. vikas.goyal_85@yahoo.co.in,

More information

Acquia Comments on EU Recommendations for Data Processing in the Cloud

Acquia Comments on EU Recommendations for Data Processing in the Cloud Acquia Comments on EU Recommendations for Data Processing in the Cloud Executive Summary On July 1, 2012, European Union (EU) data protection regulators provided guidelines for service providers processing

More information

Summary of responses to the public consultation on Cloud computing run by CNIL from October to December 2011 and analysis by CNIL

Summary of responses to the public consultation on Cloud computing run by CNIL from October to December 2011 and analysis by CNIL Summary of responses to the public consultation on Cloud computing run by CNIL from October to December 2011 and analysis by CNIL 1. Definition of Cloud Computing In the public consultation, CNIL defined

More information

Cloud Computing in Higher Education: Impact and Challenges

Cloud Computing in Higher Education: Impact and Challenges Cloud Computing in Higher Education: Impact and Challenges Anju Gautam Research Scholar, Jagannath University, Jaipur Abstract: Cloud computing is a slogan at present days. It has altered the entire state

More information

A Survey on Cloud Computing

A Survey on Cloud Computing A Survey on Cloud Computing Poulami dalapati* Department of Computer Science Birla Institute of Technology, Mesra Ranchi, India dalapati89@gmail.com G. Sahoo Department of Information Technology Birla

More information

Cloud Computing Services and its Application

Cloud Computing Services and its Application Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 1 (2014), pp. 107-112 Research India Publications http://www.ripublication.com/aeee.htm Cloud Computing Services and its

More information

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University

More information

Grid Computing Vs. Cloud Computing

Grid Computing Vs. Cloud Computing International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 577-582 International Research Publications House http://www. irphouse.com /ijict.htm Grid

More information

TECHNICAL SPECIFICATION: LEGISLATION EXECUTING CLOUD SERVICES

TECHNICAL SPECIFICATION: LEGISLATION EXECUTING CLOUD SERVICES REALIZATION OF A RESEARCH AND DEVELOPMENT PROJECT (PRE-COMMERCIAL PROCUREMENT) ON CLOUD FOR EUROPE TECHNICAL SPECIFICATION: LEGISLATION EXECUTING CLOUD SERVICES ANNEX IV (D) TO THE CONTRACT NOTICE TENDER

More information

1.1.1 Introduction to Cloud Computing

1.1.1 Introduction to Cloud Computing 1 CHAPTER 1 INTRODUCTION 1.1 CLOUD COMPUTING 1.1.1 Introduction to Cloud Computing Computing as a service has seen a phenomenal growth in recent years. The primary motivation for this growth has been the

More information

Cloud Computing in Higher Education: A Guide to Evaluation and Adoption

Cloud Computing in Higher Education: A Guide to Evaluation and Adoption Cloud Computing in Higher Education: A Guide to Evaluation and Adoption Executive Summary Public cloud computing delivering infrastructure, services, and software on demand through the network offers attractive

More information

Optimizing Service Levels in Public Cloud Deployments

Optimizing Service Levels in Public Cloud Deployments WHITE PAPER OCTOBER 2014 Optimizing Service Levels in Public Cloud Deployments Keys to Effective Service Management 2 WHITE PAPER: OPTIMIZING SERVICE LEVELS IN PUBLIC CLOUD DEPLOYMENTS ca.com Table of

More information

Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST

Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST Future of Cloud Computing Irena Bojanova, Ph.D. UMUC, NIST No Longer On The Horizon Essential Characteristics On-demand Self-Service Broad Network Access Resource Pooling Rapid Elasticity Measured Service

More information

Insights into Cloud Computing

Insights into Cloud Computing This article was originally published in the November 2010 issue of the Intellectual Property & Technology Law Journal. ARTICLE Insights into Cloud Computing The basic point of cloud computing is to avoid

More information

Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages

Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages Ivan Zapevalov 2 Outline What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages 3 What is cloud computing? 4 What is cloud computing? Cloud computing is the

More information

Why Migrate to the Cloud. ABSS Solutions, Inc. 2014

Why Migrate to the Cloud. ABSS Solutions, Inc. 2014 Why Migrate to the Cloud ABSS Solutions, Inc. 2014 ASI Cloud Services Information Systems Basics Cloud Fundamentals Cloud Options Why Move to the Cloud Our Service Providers Our Process Information System

More information

Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) 2014: 245 incidents reported

Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) 2014: 245 incidents reported Protecting What Matters Most Christian Fahlke, Regional Sales Manager ALPS March 2015 Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) 2014: 245 incidents reported (Source: https://ics-cert.us-cert.gov/sites/default/files/monitors/ics-cert_monitor_sep2014-feb2015.pdf)

More information

Where in the Cloud are You? Session 17032 Thursday, March 5, 2015: 1:45 PM-2:45 PM Virginia (Sheraton Seattle)

Where in the Cloud are You? Session 17032 Thursday, March 5, 2015: 1:45 PM-2:45 PM Virginia (Sheraton Seattle) Where in the Cloud are You? Session 17032 Thursday, March 5, 2015: 1:45 PM-2:45 PM Virginia (Sheraton Seattle) Abstract The goal of this session is to understanding what is meant when we say Where in the

More information

CLOUD COMPUTING. Keywords: Cloud Computing, Data Centers, Utility Computing, Virtualization, IAAS, PAAS, SAAS.

CLOUD COMPUTING. Keywords: Cloud Computing, Data Centers, Utility Computing, Virtualization, IAAS, PAAS, SAAS. CLOUD COMPUTING Mr. Dhananjay Kakade CSIT, CHINCHWAD, Mr Giridhar Gundre CSIT College Chinchwad Abstract: Cloud computing is a technology that uses the internet and central remote servers to maintain data

More information

A Load Balancing Model Based on Cloud Partitioning for the Public Cloud

A Load Balancing Model Based on Cloud Partitioning for the Public Cloud International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 16 (2014), pp. 1605-1610 International Research Publications House http://www. irphouse.com A Load Balancing

More information

Information Auditing and Governance of Cloud Computing IT Capstone 4444 - Spring 2013 Sona Aryal Laura Webb Cameron University.

Information Auditing and Governance of Cloud Computing IT Capstone 4444 - Spring 2013 Sona Aryal Laura Webb Cameron University. Information Auditing and Governance of Cloud Computing IT Capstone 4444 - Spring 2013 Sona Aryal Laura Webb Cameron University P a g e 1 P a g e 2 Table of Contents Abstract... 3 Introduction... 3 Previous

More information

Li Sheng. lsheng1@uci.edu. Nowadays, with the booming development of network-based computing, more and more

Li Sheng. lsheng1@uci.edu. Nowadays, with the booming development of network-based computing, more and more 36326584 Li Sheng Virtual Machine Technology for Cloud Computing Li Sheng lsheng1@uci.edu Abstract: Nowadays, with the booming development of network-based computing, more and more Internet service vendors

More information

Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges.

Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges. Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges. B.Kezia Rani 1, Dr.B.Padmaja Rani 2, Dr.A.Vinaya Babu 3 1 Research Scholar,Dept of Computer Science, JNTU, Hyderabad,Telangana

More information

Hybrid Cloud Computing

Hybrid Cloud Computing Dr. Marcel Schlatter, IBM Distinguished Engineer, Delivery Technology & Engineering, GTS 10 November 2010 Hybrid Computing Why is it becoming popular, Patterns, Trends, Impact Hybrid Definition and Scope

More information

The NIST Definition of Cloud Computing (Draft)

The NIST Definition of Cloud Computing (Draft) Special Publication 800-145 (Draft) The NIST Definition of Cloud Computing (Draft) Recommendations of the National Institute of Standards and Technology Peter Mell Timothy Grance NIST Special Publication

More information

SCADA Cloud Computing

SCADA Cloud Computing SCADA Cloud Computing Information on Cloud Computing with SCADA systems Version: 1.0 Erik Daalder, Business Development Manager Yokogawa Electric Corporation Global SCADA Center T: +31 88 4641 360 E: erik.daalder@nl.yokogawa.com

More information

SLA BASED SERVICE BROKERING IN INTERCLOUD ENVIRONMENTS

SLA BASED SERVICE BROKERING IN INTERCLOUD ENVIRONMENTS SLA BASED SERVICE BROKERING IN INTERCLOUD ENVIRONMENTS Foued Jrad, Jie Tao and Achim Streit Steinbuch Centre for Computing, Karlsruhe Institute of Technology, Karlsruhe, Germany {foued.jrad, jie.tao, achim.streit}@kit.edu

More information

Cloud computing: the state of the art and challenges. Jānis Kampars Riga Technical University

Cloud computing: the state of the art and challenges. Jānis Kampars Riga Technical University Cloud computing: the state of the art and challenges Jānis Kampars Riga Technical University Presentation structure Enabling technologies Cloud computing defined Dealing with load in cloud computing Service

More information

White Paper. Cloud Vademecum

White Paper. Cloud Vademecum White Paper Cloud Vademecum Cloud is the new IT paradigm this document offers a collection of thoughts, internal and external discussions and information. The goal is to inspire and stimulate the route

More information

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction

More information

Logical Data Models for Cloud Computing Architectures

Logical Data Models for Cloud Computing Architectures Logical Data Models for Cloud Computing Architectures Augustine (Gus) Samba, Kent State University Describing generic logical data models for two existing cloud computing architectures, the author helps

More information

Cloud Service Rollout. Chapter 9

Cloud Service Rollout. Chapter 9 Cloud Service Rollout Chapter 9 Cloud Service Topics Cloud service rollout plans vary depending on the type of cloud service SaaS, PaaS, or IaaS and the vendor. Unit Topics Identifying vendor roles and

More information

A Model for Accomplishing and Managing Dynamic Cloud Federations

A Model for Accomplishing and Managing Dynamic Cloud Federations A Model for Accomplishing and Managing Dynamic Cloud Federations London, CFM workshop 2014, December 8 th Giuseppe Andronico, INFN CT Marco Fargetta (INFN CT), Maurizio Paone (INFN CT), Salvatore Monforte

More information

August 2011. Report on Cloud Computing and the Law for UK FE and HE (An Overview)

August 2011. Report on Cloud Computing and the Law for UK FE and HE (An Overview) August 2011 Report on Cloud Computing and the Law for UK FE and HE (An Overview) Please Note: This guidance is for information only and is not intended to replace legal advice when faced with a risk decision.

More information

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org 1 Disclaimers This presentation provides education on Cloud Computing and its security

More information

The Cloud Opportunity: Italian Market 01/10/2010

The Cloud Opportunity: Italian Market 01/10/2010 The Cloud Opportunity: Italian Market 01/10/2010 Alessandro Greco @Easycloud.it In collaboration with easycloud.it Who is easycloud.it? Easycloud.it is a Consultant Company based in Europe with HQ in Italy.

More information

APPLICABILITY OF CLOUD COMPUTING IN ACADEMIA

APPLICABILITY OF CLOUD COMPUTING IN ACADEMIA Abstract APPLICABILITY OF CLOUD COMPUTING IN ACADEMIA Prof. Atul B Naik naik_ab@yahoo.com Prof. Amarendra Kumar Ajay akajay2001@gmail.com Prof. Swapna S Kolhatkar swapna.kolhatkar@gmail.com The Indian

More information

Unleashing the Potential of Cloud Computing in Europe - What is it and what does it mean for me?

Unleashing the Potential of Cloud Computing in Europe - What is it and what does it mean for me? EUROPEAN COMMISSION MEMO Brussels, 27 September 2012 Unleashing the Potential of Cloud Computing in Europe - What is it and what does it mean for me? See also IP/12/1025 What is Cloud Computing? Cloud

More information

Facilitating self-adaptable Inter-Cloud management

Facilitating self-adaptable Inter-Cloud management Facilitating self-adaptable Inter-Cloud management G. Kecskemeti, M. Maurer, I. Brandic, A. Kertesz, Zs. Nemeth, S. Dustdar 20th Euromicro International Conference on Parallel, Distributed and Network-Based

More information

Fundamental Concepts and Models

Fundamental Concepts and Models Chapter 4: Fundamental Concepts and Models Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,

More information

Role of Cloud Computing in Education

Role of Cloud Computing in Education Role of Cloud Computing in Education Kiran Yadav Assistant Professor, Dept. of Computer Science. Govt. College for Girls, Gurgaon, India ABSTRACT: Education plays an important role in maintaining the economic

More information

OpenNebula Leading Innovation in Cloud Computing Management

OpenNebula Leading Innovation in Cloud Computing Management OW2 Annual Conference 2010 Paris, November 24th, 2010 OpenNebula Leading Innovation in Cloud Computing Management Ignacio M. Llorente DSA-Research.org Distributed Systems Architecture Research Group Universidad

More information

Expert Reference Series of White Papers. Understanding NIST s Cloud Computing Reference Architecture: Part II

Expert Reference Series of White Papers. Understanding NIST s Cloud Computing Reference Architecture: Part II Expert Reference Series of White Papers Understanding NIST s Cloud Computing Reference Architecture: Part II info@globalknowledge.net www.globalknowledge.net Understanding NIST s Cloud Computing Reference

More information

THE CLOUD: OPPORTUNITIES AND ISSUES

THE CLOUD: OPPORTUNITIES AND ISSUES THE CLOUD: OPPORTUNITIES AND ISSUES OF IMMATERIALITY Alberto Pera Partner, Gianni Origoni Grippo Cappelli & Partners THE CLOUD IS A NO-LAND TERRITORY Data can be accessed and processed from anywhere via

More information

SURVEY OF ADAPTING CLOUD COMPUTING IN HEALTHCARE

SURVEY OF ADAPTING CLOUD COMPUTING IN HEALTHCARE SURVEY OF ADAPTING CLOUD COMPUTING IN HEALTHCARE H.Madhusudhana Rao* Md. Rahmathulla** Dr. B Rambhupal Reddy*** Abstract: This paper targets on the productivity of cloud computing technology in healthcare

More information

CLOUD COMPUTING, TRADE SECRET / KNOW-HOW & EUROPEAN LEGAL FRAMEWORK

CLOUD COMPUTING, TRADE SECRET / KNOW-HOW & EUROPEAN LEGAL FRAMEWORK CLOUD COMPUTING, TRADE SECRET / KNOW-HOW & EUROPEAN LEGAL FRAMEWORK AIPPI 2012 SEOUL XX October 2012 Alexandra NERI, Partner, TMT, +33 1 53 57 70 70, alexandra.neri@hsf.com TOPICS What is cloud computing?

More information

Perspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

Perspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory Perspectives on Cloud Computing and Standards Peter Mell, Tim Grance NIST, Information Technology Laboratory Caveats and Disclaimers This presentation provides education on cloud technology and its benefits

More information

European Users recommendations for the success of Public Cloud Computing in Europe. Cyril Bartolo Cloud Computing Council chairman 25-Nov-2014 v1b

European Users recommendations for the success of Public Cloud Computing in Europe. Cyril Bartolo Cloud Computing Council chairman 25-Nov-2014 v1b 1 European Users recommendations for the success of Public Cloud Computing in Europe Cyril Bartolo Cloud Computing Council chairman 25-Nov-2014 v1b 2 European CIO Association EuroCIO is created by CIOs

More information

COMMISSION STAFF WORKING DOCUMENT. on the existing EU legal framework applicable to lifestyle and wellbeing apps. Accompanying the document

COMMISSION STAFF WORKING DOCUMENT. on the existing EU legal framework applicable to lifestyle and wellbeing apps. Accompanying the document EUROPEAN COMMISSION Brussels, 10.4.2014 SWD(2014) 135 final COMMISSION STAFF WORKING DOCUMENT on the existing EU legal framework applicable to lifestyle and wellbeing apps Accompanying the document GREEN

More information

Privacy in the Cloud A Microsoft Perspective

Privacy in the Cloud A Microsoft Perspective A Microsoft Perspective November 2010 The information contained in this document represents the current view of Microsoft Corp. on the issues discussed as of the date of publication. Because Microsoft

More information

Data Protection. Processing and Transfer of Personal Data in Kvaerner. Binding Corporate Rules Public Document

Data Protection. Processing and Transfer of Personal Data in Kvaerner. Binding Corporate Rules Public Document Data Protection Processing and Transfer of Personal Data in Kvaerner Binding Corporate Rules Public Document 1 of 19 1 / 19 Table of contents 1 Introduction... 4 1.1 Scope... 4 1.2 Definitions... 4 1.2.1

More information

ESOMAR PRACTICAL GUIDE ON COOKIES JULY 2012

ESOMAR PRACTICAL GUIDE ON COOKIES JULY 2012 ESOMAR PRACTICAL GUIDE ON COOKIES JULY 2012 Copyright ESOMAR 2012 TABLE OF CONTENTS 2 Objectives 2 Introduction 3 Definitions 4 SECTION 1: APPLICABLE LAW 4 SECTION 2: WHAT YOU NEED TO KNOW SOME FAQs 5

More information

6 Cloud strategy formation. 6.1 Towards cloud solutions

6 Cloud strategy formation. 6.1 Towards cloud solutions 6 Cloud strategy formation 6.1 Towards cloud solutions Based on the comprehensive set of information, collected and analysed during the strategic analysis process, the next step in cloud strategy formation

More information

The NREN s core activities are in providing network and associated services to its user community that usually comprises:

The NREN s core activities are in providing network and associated services to its user community that usually comprises: 3 NREN and its Users The NREN s core activities are in providing network and associated services to its user community that usually comprises: Higher education institutions and possibly other levels of

More information

Cloud Based E-Government: Benefits and Challenges

Cloud Based E-Government: Benefits and Challenges Cloud Based E-Government: Benefits and Challenges Saleh Alshomrani 1 and Shahzad Qamar 2 1 Faculty of Computing and IT, King Abdulaziz University, Jeddah, Saudi Arabia 2 Faculty of Computing and IT, North

More information

Key Research Challenges in Cloud Computing

Key Research Challenges in Cloud Computing 3rd EU-Japan Symposium on Future Internet and New Generation Networks Tampere, Finland October 20th, 2010 Key Research Challenges in Cloud Computing Ignacio M. Llorente Head of DSA Research Group Universidad

More information

ASCETiC Whitepaper. Motivation. ASCETiC Toolbox Business Goals. Approach

ASCETiC Whitepaper. Motivation. ASCETiC Toolbox Business Goals. Approach ASCETiC Whitepaper Motivation The increased usage of ICT, together with growing energy costs and the need to reduce greenhouse gases emissions call for energy-efficient technologies that decrease the overall

More information

CLOUD COMPUTING: WHAT YOU SHOULD KNOW

CLOUD COMPUTING: WHAT YOU SHOULD KNOW CLOUD COMPUTING: WHAT YOU SHOULD KNOW There is hardly a topic creating more of a buzz in software industry, than the Cloud. Cloud computing is a dramatic shift in the way we think about providing computing

More information

E-learning Using Cloud Computing

E-learning Using Cloud Computing International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 1 (2014), pp. 41-46 International Research Publications House http://www. irphouse.com /ijict.htm E-learning

More information

DATA LOCATION COMPLIANCE IN CLOUD COMPUTING

DATA LOCATION COMPLIANCE IN CLOUD COMPUTING MASTER THESIS DATA LOCATION COMPLIANCE IN CLOUD COMPUTING J. Noltes MSC COMPUTER SCIENCE TRACK INFORMATION SYSTEMS ENGINEERING EXAMINATION COMMITTEE dr. ir. W. (Wolter) Pieters dr. ir. V. (Virginia) Nunes

More information

Cloud Computing. Patrick Van Eecke. Partner, DLA Piper Brussels Professor Universiteit Antwerpen

Cloud Computing. Patrick Van Eecke. Partner, DLA Piper Brussels Professor Universiteit Antwerpen Cloud Computing Legal issues Patrick Van Eecke Partner, DLA Piper Brussels Professor Universiteit Antwerpen Cloud computing & the law Infrastructure as a Service Data storage e.g. Amazon S3 Platform as

More information

Getting Familiar with Cloud Terminology. Cloud Dictionary

Getting Familiar with Cloud Terminology. Cloud Dictionary Getting Familiar with Cloud Terminology Cloud computing is a hot topic in today s IT industry. However, the technology brings with it new terminology that can be confusing. Although you don t have to know

More information

Overview. The Cloud. Characteristics and usage of the cloud Realities and risks of the cloud

Overview. The Cloud. Characteristics and usage of the cloud Realities and risks of the cloud Overview The purpose of this paper is to introduce the reader to the basics of cloud computing or the cloud with the aim of introducing the following aspects: Characteristics and usage of the cloud Realities

More information

The eighth data protection principle and international data transfers

The eighth data protection principle and international data transfers Data Protection Act 1998 The eighth data protection principle and international data transfers The Information Commissioner s recommended approach to assessing adequacy including consideration of the issue

More information

Cloud Computing: The Next Computing Paradigm

Cloud Computing: The Next Computing Paradigm Cloud Computing: The Next Computing Paradigm Ronnie D. Caytiles 1, Sunguk Lee and Byungjoo Park 1 * 1 Department of Multimedia Engineering, Hannam University 133 Ojeongdong, Daeduk-gu, Daejeon, Korea rdcaytiles@gmail.com,

More information

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall. The Magical Cloud Lennart Franked Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall. 2014-10-20 Lennart Franked (MIUN IKS) The Magical Cloud 2014-10-20 1 / 35

More information

How To Understand Cloud Computing

How To Understand Cloud Computing Cloud Computing Today David Hirsch April 2013 Outline What is the Cloud? Types of Cloud Computing Why the interest in Cloud computing today? Business Uses for the Cloud Consumer Uses for the Cloud PCs

More information

Why You Should Consider the Cloud

Why You Should Consider the Cloud INTERSYSTEMS WHITE PAPER Why You Should Consider the Cloud In 2014, we ll see every major player make big investments to scale up Cloud, mobile, and big data capabilities, and fiercely battle for the hearts

More information