Social Impact of Privacy in Cloud Computing



Similar documents
Fundamental Concepts and Models

Essential Characteristics of Cloud Computing: On-Demand Self-Service Rapid Elasticity Location Independence Resource Pooling Measured Service


CHAPTER 8 CLOUD COMPUTING

Cloud definitions you've been pretending to understand. Jack Daniel, Reluctant CISSP, MVP Community Development Manager, Astaro

Summary of responses to the public consultation on Cloud computing run by CNIL from October to December 2011 and analysis by CNIL

Cloud Computing; What is it, How long has it been here, and Where is it going?

Cloud Computing Technology

The NIST Definition of Cloud Computing

CLOUD COMPUTING. A Primer

CLOUD COMPUTING OVERVIEW

CLOUD COMPUTING GUIDELINES FOR LAWYERS

The NIST Definition of Cloud Computing (Draft)

IS PRIVATE CLOUD A UNICORN?

East African Information Conference th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

Developing SAP Enterprise Cloud Computing Strategy

CLOUD COMPUTING An Overview

Cloud Computing Overview

The cloud - ULTIMATE GAME CHANGER ===========================================

NATO s Journey to the Cloud Vision and Progress

Security Issues in Cloud Computing

Fundamentals of Cloud Computing

The Private Cloud Your Controlled Access Infrastructure

Perspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

Why Private Cloud? Nenad BUNCIC VPSI 29-JUNE-2015 EPFL, SI-EXHEB

BUSINESS MANAGEMENT SUPPORT

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

White Paper on CLOUD COMPUTING

The HIPAA Security Rule: Cloudy Skies Ahead?

Cloud Computing. Course: Designing and Implementing Service Oriented Business Processes

Overview. The Cloud. Characteristics and usage of the cloud Realities and risks of the cloud

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

SCADA Cloud Computing

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Private Cloud Database Consolidation with Exadata. Nitin Vengurlekar Technical Director/Cloud Evangelist

IJRSET 2015 SPL Volume 2, Issue 11 Pages: 29-33

Cloud Computing An Elephant In The Dark

CS573 Data privacy and security in the cloud. Slide credits: Ragib Hasan, Johns Hopkins University

Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

6 Cloud computing overview

Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012

Are You Prepared for the Cloud? Nick Kael Principal Security Strategist Symantec

Cloud Computing Submitted By : Fahim Ilyas ( ) Submitted To : Martin Johnson Submitted On: 31 st May, 2009

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH Agenda. Security Cases What is Cloud? Road Map Security Concerns

Cloud Security Introduction and Overview

Cloud Computing--Efficiency and Security

OIT Cloud Strategy 2011 Enabling Technology Solutions Efficiently, Effectively, and Elegantly

The Trend and Challenges of Cloud Computing: A Literature Review

Cloud Computing in the Federal Sector: What is it, what to worry about, and what to negotiate.

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

Private Cloud 201 How to Build a Private Cloud

When Security, Privacy and Forensics Meet in the Cloud

Customer Security Issues in Cloud Computing

Security Considerations for Public Mobile Cloud Computing

A Survey on Cloud Security Issues and Techniques

Commercial Software Licensing

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.

Fundamental Concepts and Models

Mobile Cloud Computing: Paradigms and Challenges 移 动 云 计 算 : 模 式 与 挑 战

How To Protect Your Cloud Computing Resources From Attack

Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted.

IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011

Cloud Computing. Karan Saxena * & Kritika Agarwal**

Cloud Courses Description

A Study of Infrastructure Clouds

Capability Paper. Today, aerospace and defense (A&D) companies find

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

Figure 1 Cloud Computing. 1.What is Cloud: Clouds are of specific commercial interest not just on the acquiring tendency to outsource IT

Cloud Computing. Bringing the Cloud into Focus

Keyword: Cloud computing, service model, deployment model, network layer security.

2011 Morrison & Foerster LLP All Rights Reserved mofo.com. Risk, Governance and Negotiation in the Cloud: Capture Benefits and Reduce Risks

Cloud Computing: The Next Computing Paradigm

Improving Web Application Security by Eliminating CWEs Weijie Chen, China INFSY 6891 Software Assurance Professor Dr. Maurice Dawson 15 December 2015

ICT SECURITY SECURE ICT SYSTEMS OF THE FUTURE

Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST

PRIVATE CLOUD SECURITY CHALLENGES, AFFORDABILITY AND ANSWER TO A RELIABLE AND MODERNIZED MULTI-BIOMETRICS IDENTIFICATION SOLUTIONS

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

Managing Cloud Computing Risk

Addressing Data Security Challenges in the Cloud

Privacy and security in the cloud

What is Cloud-Based Security? Cloud-based Security = Security Management + Cloud Computing.

Transcription:

Social Impact of Privacy in Cloud Computing Rui Máximo Esteves, Chunming Rong Department of Electrical and Computer Engineering University of Stavanger Norway

About today Social considerations under a philosophical perspective Not a technical view Reflection

Agenda Cloud Computing definition Privacy and Freedom Implications to privacy and freedom of speech Conclusions

Cloud Computing definition

Cloudy definition? How do you explain it? Consensual definition? Ambiguity around the concept Complex and difficult to understand Influence several aspects of our society it is important to present the concept in a way that legislators, politicians and intellectuals can easily understand

What is Cloud Computing? Starting by the words Cloud and Computing Maybe it is related to computing information using the internet?!?!

What is Cloud Computing? Cloud computing is not a particular technology, but a model where the most computation is beyond the organization s firewall and uses internet shared computer resources on a pay per use basis With this paradigm shift, companies will have the opportunity to dynamically scale their hardware and software requirements in a more efficient way

Definition National Institute of Standards and Technology The specific concept and their requirements are continually evolving and there is no concise universal definition Relevant document with the five main characteristics, possible delivery and possible deployment models

NIST definition: main characteristics on-demand self-service ubiquitous network access location independent resource pooling rapid elasticity pay per use

NIST definition: delivery models Cloud Software as a Service (SaaS) Cloud Platform as a Service (PaaS) Cloud Infrastructure as a Service (IaaS)

NIST definition: Deployment Private Cloud Community Cloud Public Cloud Hybrid Cloud

The Cloud Computing paradigm Relies in the use of several technologies Some have been developed and implemented in the IT field earlier than the Cloud Computing concept It seems to be perceived as a symbol of technological advance and connected with prestige When we use the technologies are we following the paradigm? Buzzword

Privacy and Freedom

Privacy Free from others interference Decide when, how and extend is our information reveled The control allows the person to maintain varying degrees of Intimacy Essential for the development of Love, friendship and trust

Criminals Privacy example identity fraud criminals, stalkers and rapists exploitation of personal data for marketing purposes and to be used for discrimination purposes Coercion

Privacy Nissenbaum three principles definition of the sphere boundaries: (1) limiting surveillance of citizens and use of information about them by agents of government (2) restricting access to sensitive, personal, or private information (3) curtailing intrusions into places deemed private or personal To guarantee a satisfactory level of privacy any new technology should take these principles into consideration. Otherwise, the users might mistrust it

Freedom The state of not being imprisoned, enslaved or constrained We are born free and part of our individual freedom became sacrificed in order to live in a community Through a regulation of rights and duties To serve a public utility, which is considered more important than the individual Imperfections as social beings and the way we relate to each other

Freedom Franklin D. Roosevelt distinguished: freedom of every person to worship God in his own way freedom from want freedom from fear freedom of speech and expression

Freedom More harmonic society from equilibrium between the reduction of the individual sphere and the public utility Delicate balance can degenerate into a simple lost of privacy with no increase in public utility

Freedom Having excessive control over privacy can reduce the freedom

Implications to privacy and freedom of speech

Implications to privacy and freedom of speech Carr - an interesting analogy between the electricity and computing In the electricity s early days, industries had to build their own power sources To be productive a factory had to be in the energy business as well Electric grid, each factory plugs into the grid and stops investing on expensive and less efficient power systems Carr explored analogies

Implications to privacy and freedom of speech Both Electricity and Computation involves streams of electrons Difference between the ways they are organized and what they constitute A stream of electrons in electricity means a certain quantity of electric power Electric current can be seen as generic One ampere of electric current has always the same physical characteristics and possible uses, independent from who generates it and the purpose

Implications to privacy and freedom of speech There are no big concerns between confidentiality and electricity, but there might be with computation

Implications to privacy and freedom of speech Cloud providers argue that it will constitute a better overall security The information will become more centralized and cloud providers could invest more money in security systems Google attacks from China

Implications to privacy and freedom of speech The first Nissenbaum principle can be threatened on a Cloud Computing paradigm When something fails it can promote the degradation of freedom of speech The problem may become stronger if we contribute to centralize information into a lower number of systems political pressures terrorists organizations oppressive governments to control and monitor their citizens actions military targets

Implications to privacy and freedom of speech Enough technology to provide complex and sophisticated data encryption Premise that there is no computer power to discover the key or crack the algorithm in useful time

Implications to privacy and freedom of speech New generation of cyber pirates and an increase need of computer s security level The processing power to ensure new security standards will need to increase on both Client and Provider side The privacy of those who cannot afford the update may become degraded

Implications to privacy and freedom of speech

Implications to privacy and freedom of speech Trust? Chain of providers Two issues arise: the user might not trust one of the subcontractors, and might lose track of those whom had contact with the data Sensitive data such as medical, judicial and banking What if one of those hidden links is in a country with a different privacy policy that is less protective? When these kinds of decisions are made without the client s acknowledgment, one can lose control of privacy

Implications to privacy and freedom of speech We may trust our provider and believe it will no misuse the data What if the new buyer is our business competitor or is under a different juridical system? What if the provider went bankrupt?

Implications to privacy and freedom of speech Coghead A web based service for building and host customizable online database applications (PaaS) Bought by SAP What if one of Coghead s clients was a SAP competitor with a new revolutionary CRM application? MediaMax also known as Linkup deleted 3.5 million user accounts and files from their cloud service

Implications to privacy and freedom of speech Accidents can happen in all systems and it occurs in traditional systems as well Companies can have more control over the quality of their own IT department then when delegating to other companies

Conclusions Cloud Computing can provide economical and technical advantages It can leverage serious risks regarding the privacy and consequently the freedom of speech The provider should clarify where the data will be stored, which parties will be involved and under which legal system Our society should avoid the centralization of information on few Cloud Providers The success of the Cloud paradigm is dependent on the development of conditions for trusting it