scispace - formally typeset
Open AccessJournal ArticleDOI

Privacy and consumer risks in cloud computing

Dan Jerker B. Svantesson, +1 more
- 01 Jul 2010 - 
- Vol. 26, Iss: 4, pp 391-397
TLDR
In this article, the privacy and consumer risks that are associated with cloud computing are examined.
About
This article is published in Computer Law & Security Review.The article was published on 2010-07-01 and is currently open access. It has received 211 citations till now. The article focuses on the topics: Information privacy & Privacy software.

read more

Citations
More filters
Journal ArticleDOI

Ensuring Data Confidentiality and Authentication through Encryption at Application Layer

TL;DR: A generic scheme of user authentication and data confidentiality has been introduced and a tool that encrypts/decrypts the user data at application layer using public key infrastructure is introduced.
Journal ArticleDOI

Improved OpenID Authorization Registration Process

TL;DR: The characteristics of the blind signature are used to support user verification of the registering provider, to protect the user’s identity, and to address known vulnerabilities in the system.
Book ChapterDOI

Reducing healthcare disparities with technology

TL;DR: How the development of a real time on-line cloud based technology mediated solution to support LEP patients can address key effectiveness and efficiencies issues and provide superior healthcare and thereby serve to reduce a key healthcare disparity is discussed.
Journal Article

Deployment of web service in cloud and its optimization

TL;DR: The obtained result of the proposed mechanism has been found satisfactory and performs better than existing one and helps to gather analytical statistics of the resources currently held and will be used such a memory, number of instances and CPU.
Related Papers (5)
Frequently Asked Questions (6)
Q1. What are the contributions mentioned in the paper "Privacy and consumer risks in cloud computing" ?

In this paper, Clarke et al. adopt the definition devised by the second author in an earlier paper and define cloud computing as a service that satisfies all of the following conditions: 1 ) The service is delivered over a telecommunications network ; 2 ) Users rely on the service for access to and/or processing of data ; 3 ) The data is under the legal control of the user ; 4 ) Some of the resources on which the service depends are virtualized, which means that the user has no technical need to be aware which server running on which host is delivering the service, nor 

8The starting point of any privacy discussion regarding cloud computing must be the realisation that several forms of cloud computing are in their infancy. 

While the legal issues facing cloud operators and cloud users stem from the fact that personal data is transferred across jurisdictional borders, applicable privacy regulation typically draws a line between data being transferred within an organisation, and data being transferred between organisations. 

To assess whether the company could do so, it would need to know in which country, or countries, its data would be stored – it would need to know the location of the cloud. 

If they fail to earn the trust of their customers by adopting clear and transparent policies on how their customers’ data will be used, stored, and protected, governments will come under increasing pressure to regulate privacy in the Cloud. 

organisations, businesses and individuals interested in utilising cloud computing products must ensure they are aware of the privacy and security risks associated with using the product and take those risks into account when deciding whether to use it.