scispace - formally typeset
Open AccessJournal ArticleDOI

Privacy and consumer risks in cloud computing

Dan Jerker B. Svantesson, +1 more
- 01 Jul 2010 - 
- Vol. 26, Iss: 4, pp 391-397
TLDR
In this article, the privacy and consumer risks that are associated with cloud computing are examined.
About
This article is published in Computer Law & Security Review.The article was published on 2010-07-01 and is currently open access. It has received 211 citations till now. The article focuses on the topics: Information privacy & Privacy software.

read more

Citations
More filters
Book ChapterDOI

A Secure OsiriX Plug-In for Detecting Suspicious Lesions in Breast DCE-MRI

TL;DR: A plug-in allowing OsiriX - a widespread medical image processing application dedicated to DICOM images coming from several equipments - to interact with a system for automatic detection of suspicious lesions in breast DCE-MRI is developed.
Journal Article

A Survey on Cloud Computing and its Services

TL;DR: This paper presents a meta-modelling architecture that automates the very labor-intensive and therefore time-heavy and expensive process of partitioning data over a scalable network of nodes.
Proceedings Article

Cloudy with a Chance of Misconceptions: Exploring Users’ Perceptions and Expectations of Security and Privacy in Cloud Office Suites

TL;DR: It is found that participants are aware of basic general security implications, storage models, and access by others, although some of their threat models seem underdeveloped, often due to lacking technical knowledge.
Journal ArticleDOI

Towards a privacy impact assessment methodology to support the requirements of the general data protection regulation in a big data analytics context: A systematic literature review

TL;DR: In this article , the authors conducted a systematic literature review with the aim of identifying privacy and data protection risks specific to the Big Data Analytics context that could negatively impact individuals' rights and freedoms when they occur.
Book ChapterDOI

Identifying Relevance of Security, Privacy, Trust, and Adoption Dimensions Concerning Cloud Computing Applications Employed in Educational Settings

TL;DR: In this paper, the authors introduced a research framework that captures the essence of security, privacy, trust, and adoption in the context of cloud computing applications when used in an educational environment.
Related Papers (5)
Frequently Asked Questions (6)
Q1. What are the contributions mentioned in the paper "Privacy and consumer risks in cloud computing" ?

In this paper, Clarke et al. adopt the definition devised by the second author in an earlier paper and define cloud computing as a service that satisfies all of the following conditions: 1 ) The service is delivered over a telecommunications network ; 2 ) Users rely on the service for access to and/or processing of data ; 3 ) The data is under the legal control of the user ; 4 ) Some of the resources on which the service depends are virtualized, which means that the user has no technical need to be aware which server running on which host is delivering the service, nor 

8The starting point of any privacy discussion regarding cloud computing must be the realisation that several forms of cloud computing are in their infancy. 

While the legal issues facing cloud operators and cloud users stem from the fact that personal data is transferred across jurisdictional borders, applicable privacy regulation typically draws a line between data being transferred within an organisation, and data being transferred between organisations. 

To assess whether the company could do so, it would need to know in which country, or countries, its data would be stored – it would need to know the location of the cloud. 

If they fail to earn the trust of their customers by adopting clear and transparent policies on how their customers’ data will be used, stored, and protected, governments will come under increasing pressure to regulate privacy in the Cloud. 

organisations, businesses and individuals interested in utilising cloud computing products must ensure they are aware of the privacy and security risks associated with using the product and take those risks into account when deciding whether to use it.