Regulation on Cloud to Protect User Privacy This essay discusses regulation that rules cloud provider to protect privacy of data citizens within country. This essay will describe about what cloud services and its wide range of service In the second section, it will explain more about the security threat of cloud services and going more specific into privacy issue. The next section, I will discuss about the extent of technical regulation that porposed from case given by taking model from exist country regulation. In the Fourth section, this essay will discuss about evaluation and another policy as alternative of the previous policy. Finally, this essay will be closed by suggestion and conclusion about what regulation that should be purposed regarding to protect privacy citizens’ data stored in cloud. What is cloud services? Today, cloud services are widely used by people around the world in purpose of business, government, and personal use. With cloud services, users use resources - could be storage, computional capability, or software- from cloud service provider mediated by Internet. Doing computational work with cloud services involves a number of computers to do the large-scale works, therefore it usually called by distributed system over Internet (reference, paper?). Cloud service also offers a large-scale service where users only pay for what they use (on-demand). Therefore, companies migrate to business-to-business cloud as they don’t have to spend money building intial cost for their computational business. For instance, instead of building their own storage, network, cooling, they could just “rent” resource from cloud provider for the lower cost. Besides money benefits, cloud resources also able to be shared by multiple... ... middle of paper ... ... widely range of services to society. For public cloud, costumers have no idea where their data is stored and what regulation would be applied to their data. This may affect to their privacy assurance. Regulation that urge cloud company to store local citizens’ data within country could be guarantee users’ data because cloud company will have some restriction to process users’ data based on local law. But this regulation may result refusing from giant company providers and local users suffer to loss cloud services from them. Regulation that urge cloud company to encrypt users’ local data may be chosen as alternatives, but this is limited on a certain of cloud services. From the prespective of security assurance, I may suggest the first regulation, which is stores local users’ within country because it can covers whole cloud services to ensure their privacy security.
In today's society with the increased use of computers, internet, and wireless communications, the need for safety and security has risen dramatically. The internet has become the number one communication medium and is more accessible than ever. Through the internet, vast amount of information is being transmitted between computers. At times, some of the information transmitted can be intercepted illegally, such as personal information and private messages. The percentage of information that is illegally intercepted has been dramatically reduced due to the use of encryption software technology, which was once used by the United States military and government. This technology has given businesses and private users the sense of security in transmitting information through the internet as well as to maintain national security. The use of encryption has been a topic of discussion for the past 20 years. The U.S government has attempted several times to regulate encryption because they felt that it was a matter of national security that they should have control of the technology and protect us from vulnerability if software is shared or sold to other countries. The effort of encryption regulation by the U.S. was unsuccessful and today there are least restrictions on the use and export of encryption technology. The introduction of encryption regulation in the United States has made a global impact. Other countries, such as China, Russia, and others around the world, have implemented encryption regulations to due to the influence of the U.S. but have restrictions that are far more stringent and harsh. The strong regulations by these countries are creating conflict among private users and foreign companies that export encryption software to these countries. This argument and debate continues between the government, businesses, and encryption companies. The question is should the government have the right to monitor and regulate encryption and what ethical questions does it raise?
George Orwell foresees a nightmarish-future for the world in his book 1984, where individualism loses precedence to "the good of society," and with it goes the individual's private life. "The [controlling] Party" in the socialist government knows the intimate details of all citizens, and prosecutes those who violate social orders through threatening speech, behavior or thoughts. The omnipresent visual warning "Big Brother is Watching You,” reminds citizens that no personal information is safe from the "Thought Police." While this may seem far-fetched to some, Orwell envisioned technology facilitating government's abuse of power in 1950; in the twenty-first century, progress has left one's private life susceptible to interested parties in both the public and private sectors. In 1997, Ralph Nader cautioned, "The people are not organized not equipped with the knowledge, tools or skills to confront the invasions of the self they can see, let alone the far greater, more subterranean kinds of surveillance" (viii). With the rise of computers to their current capabilities, collecting, storing, accessing and sharing personal data has become easier than ever before: governments and companies no longer keep files of paper records on individuals, which accessing, stealing or sharing would be too arduous a task, but rather electronic databases that they can easily create, access and link. Ellen Alderman and Caroline Kennedy note in their book The Right to Privacy, "From a privacy point of view, we are in the midst of the most unsettling period in [the computer] revolution" (326). Computers do not threaten personal privacy, though, nor violate any right granted to Americans: the word 'privacy' does not appear in the Constitution, nor does the p...
New technologies raise new ethical challenges besides new technical problems. Cloud computing is the recent technology in IT that moves the data away from portable storage devices to large data centers called cloud. It basically means that every application given as services over the Internet to the user. In the view of User it is accessing his/her files, programs and other services through Internet which are hosted by other service providers. One more aspect of cloud computing is the cost effectiveness of this technology which attracted enterprises to use this technology to consume their IT services in a cost effective way. With the Commercialization of this technology, the hype around the Cloud computing technology growing in lightning speed. Now the Cloud Computing is in use, but still it is an emerging technology. It is a unknown thing that, how this technology can be used and for what purposes it will be used and what kind of ethical issues these developments will rise in future. A Precautionary Principle is obtained to control the rise of ethical issues. It is good to react before unexpected consequences occurs through these ethical issues. The technical problems can be solved at the time of rise but ethical problems need to be identified prior to the development to the success of the technology.
The protection of consumer privacy in e-business. The digital era has arrived. Blue Book information editorial board and Social Science Literature Publishing House (2010) pointed out that “China's e-commerce transaction volume reached 3.85 trillion yuan in 2009”. Utilisation of e-business services was also high amongst Hong Kong people.
I say that the government should have a limit on when they can monitor. The government is meant to keep the people safe, but that does not mean the government should know everything people do. This would include the government monitoring people’s internet content. With monitoring internet content the federal government deals with national matters, protection of private content from the government, it is for protecting the people, and schools can view students posts.
Personal clouds give user far greater control over the data. As the steward of own storage, user decide who has access to their own data and who doesn’t, and user don’t have to worry about the storage provider collecting information about their activities. Hackers tend to cast wide nets by targeting large datacenter, which makes small personal cloud far less vulnerable to external threats. As the user owned and controlled by itself, it can give the user to build their own personal cloud storage based on their requirement use without any third party charge. It can give us more benefit in term of costing and security and privacy over the data. While user can add or customize their own interactive features for the cloud storage such as video and audio stream, comments activity, message board, chatting, VOIP or many other infrastructure as it was an open sources program. Personal cloud storage offers larger space of capacity storage to the user to keep data rather that the public cloud storage where the counterparts and scalability requirements are more
The finding of this report are based on four different factors for different factor for analysis of personal data protection and personal data privacy. The first is current regulations, which ……
Internet regulation is basically restricting or controlling access to certain aspects or information. Internet regulation consists of mainly two categories: Censorship of data, and controlling aspects of the Internet.
Despite the numerous advantages offered by cloud computing, security is a big issue concerned with cloud computing. There are various security issues and concerns associated with cloud computing, among them being phishing, data loss and data privacy. There are different mitigation measures that cloud pioneers are currently using to ensure data stored in the cloud remain secure and confidential as intended. Encryption is one mitigation method used to ensure security in cloud computing. According to Krutz and Vines (2010), encryption involves coding of the data stored in the computing cloud such that hackers cannot gain access to the data. Data encryption seems to be the most effective method of ensuring security in computing (Krutz and Vines, 2010). However, it is of paramount importance to note that encrypted data is usually difficult to search or perform various calculations on it.
Several types of cloud storage systems have been developed to supporting both personal and business uses. Cloud storage also a model of networked enterprise storage where the data is stored not only in the user's computer, but also in virtualized of storage, which generally hosted by third parties company.
When they wanted to save photos online instead of on your personal computer, they are able to use “cloud computing” service. Cloud computing means that the transfer of computing data or information over the internet. Not just to keep data in your personal computer, they are able to save the data on internet server to open their data in any computer. In this report we will walk through about what is cloud computing, what kinds of model did cloud computing have, types of cloud computing, benefits of cloud computing, and security.
As aforementioned, in recent years the internet has increased popularity and with that comes some concerns in laws regarding the cloud. Few laws have been created to protect the users of the internet from non consensual use of personal information. “Usually the only legal precedents restricting a company is its own privacy policy but most companies give you a sense of protection without any legality behind it,”(2013, CQ Researcher, Big data and privacy). This is a problem because with no laws or policies protecting the private internet user companies will be able to do what they want with the information and nothing will stop them.
Many legal steps have implemented worldwide to ensure the protection and privacy of data in many countries in many
With the controversy of intrusion of privacy, this has forced various governments to make laws and clarifications of laws in multiple countries. For example,
Cloud computing is a type of computing that depends on sharing computing resources rather than having local servers or personal device to handle applications.