scispace - formally typeset
Open AccessJournal ArticleDOI

Privacy and consumer risks in cloud computing

Dan Jerker B. Svantesson, +1 more
- 01 Jul 2010 - 
- Vol. 26, Iss: 4, pp 391-397
TLDR
In this article, the privacy and consumer risks that are associated with cloud computing are examined.
About
This article is published in Computer Law & Security Review.The article was published on 2010-07-01 and is currently open access. It has received 211 citations till now. The article focuses on the topics: Information privacy & Privacy software.

read more

Citations
More filters
Book ChapterDOI

Privacy Issues in Cross-Border Identity Management Systems: Pan-European Case

TL;DR: The paper presents a Pan-European Identity Management System that was developed through the concerted efforts of several European research initiatives, and identifies gaps in the privacy protection mechanisms, which occur because privacy is considered strictly from the EU Data Protection regulation perspective.
Proceedings ArticleDOI

Measuring Cloud Security from risks perspective

TL;DR: The objective of this work is to reveal and explore the risks encountered when adopting cloud computing and how their existence affects the intended user and layout mitigation strategies that should be followed to avoid such risks.

Enhancement of user level controls in cloud databases

TL;DR: This work considered several privacy factors from the industry perspective, namely data loss, data storage location being unknown to the client, vendor lock-in, unauthorized secondary use of user's data for advertising, targeting secured backup and easy restoration, and focused on a novel logical model that might help bring the level of user control of privacy in cloud databases into a higher level.

Cloud Computing and its Effects on Electronic Commerce: A Survey

TL;DR: It is shown that cloud computing has a wide prospect in e -commerce applications and this matter is shown through describing the cloud computing features, concepts and analyzing the improvement of e-commerce by it.
Proceedings ArticleDOI

Real time Application of Malware Patching on Decentralized IoT Systems Through Disease Spread Analysis.

TL;DR: This paper utilizes SEIR disease spread model to measure the effectiveness of the security model's mitigation of malware spread in the IoT network and takes on a more efficient approach to patching large IoT systems to mitigate the spread of several different types of malware attacks.
Related Papers (5)
Frequently Asked Questions (6)
Q1. What are the contributions mentioned in the paper "Privacy and consumer risks in cloud computing" ?

In this paper, Clarke et al. adopt the definition devised by the second author in an earlier paper and define cloud computing as a service that satisfies all of the following conditions: 1 ) The service is delivered over a telecommunications network ; 2 ) Users rely on the service for access to and/or processing of data ; 3 ) The data is under the legal control of the user ; 4 ) Some of the resources on which the service depends are virtualized, which means that the user has no technical need to be aware which server running on which host is delivering the service, nor 

8The starting point of any privacy discussion regarding cloud computing must be the realisation that several forms of cloud computing are in their infancy. 

While the legal issues facing cloud operators and cloud users stem from the fact that personal data is transferred across jurisdictional borders, applicable privacy regulation typically draws a line between data being transferred within an organisation, and data being transferred between organisations. 

To assess whether the company could do so, it would need to know in which country, or countries, its data would be stored – it would need to know the location of the cloud. 

If they fail to earn the trust of their customers by adopting clear and transparent policies on how their customers’ data will be used, stored, and protected, governments will come under increasing pressure to regulate privacy in the Cloud. 

organisations, businesses and individuals interested in utilising cloud computing products must ensure they are aware of the privacy and security risks associated with using the product and take those risks into account when deciding whether to use it.