scispace - formally typeset
Open AccessJournal ArticleDOI

Privacy and consumer risks in cloud computing

Dan Jerker B. Svantesson, +1 more
- 01 Jul 2010 - 
- Vol. 26, Iss: 4, pp 391-397
TLDR
In this article, the privacy and consumer risks that are associated with cloud computing are examined.
About
This article is published in Computer Law & Security Review.The article was published on 2010-07-01 and is currently open access. It has received 211 citations till now. The article focuses on the topics: Information privacy & Privacy software.

read more

Citations
More filters
Journal ArticleDOI

Student data protection in a South African ODL university context: risks, challenges and lessons from comparative jurisdictions

TL;DR: A comparative policy and practice review was applied to analyze available international legislation governing data privacy and protection to establish some of the trends, risks, and best practices.
Journal ArticleDOI

A Survey of Privacy Vulnerabilities of Mobile Device Sensors

TL;DR: In this paper , the state of the art of what personal and sensitive user attributes can be extracted from mobile device sensors, emphasizing critical aspects such as demographics, health and body features, activity and behavior recognition, and so forth.
Journal ArticleDOI

Analysis of anomaly detection method for Internet of things based on deep learning

TL;DR: The simulation results show that the optimized RNN deep learning algorithm for anomaly detection in cloud computing system can effectively improve the detection success rate, effectively reduce the detection time and cost, show strong robustness, and effectively improved the online service efficiency of the Internet of things technology.
Journal ArticleDOI

Efficiency and Risk Management Models for Cloud-Based Solutions in Supply Chain Management

TL;DR: In this article, the authors proposed a conceptual framework to investigate the impact of franchise service quality on customer loyalty, and the results of the study indicate that service quality dimensions such as tangibles, reliability, responsiveness and assurance are positively and significantly realted to customer loyalty.
Journal ArticleDOI

The necessity of legally compliant data management in European cloud architectures

TL;DR: This paper evaluates commonly-observed Cloud Computing use cases against the law applying to Cloud Computing to find where legal problems may arise, and derives a general architecture for Clouds and uses it to illustrate common Cloud Computing usage patterns.
Related Papers (5)
Frequently Asked Questions (6)
Q1. What are the contributions mentioned in the paper "Privacy and consumer risks in cloud computing" ?

In this paper, Clarke et al. adopt the definition devised by the second author in an earlier paper and define cloud computing as a service that satisfies all of the following conditions: 1 ) The service is delivered over a telecommunications network ; 2 ) Users rely on the service for access to and/or processing of data ; 3 ) The data is under the legal control of the user ; 4 ) Some of the resources on which the service depends are virtualized, which means that the user has no technical need to be aware which server running on which host is delivering the service, nor 

8The starting point of any privacy discussion regarding cloud computing must be the realisation that several forms of cloud computing are in their infancy. 

While the legal issues facing cloud operators and cloud users stem from the fact that personal data is transferred across jurisdictional borders, applicable privacy regulation typically draws a line between data being transferred within an organisation, and data being transferred between organisations. 

To assess whether the company could do so, it would need to know in which country, or countries, its data would be stored – it would need to know the location of the cloud. 

If they fail to earn the trust of their customers by adopting clear and transparent policies on how their customers’ data will be used, stored, and protected, governments will come under increasing pressure to regulate privacy in the Cloud. 

organisations, businesses and individuals interested in utilising cloud computing products must ensure they are aware of the privacy and security risks associated with using the product and take those risks into account when deciding whether to use it.