Monday, 28 May 2012

CLOUD PRIVACY AND KEY FACTORS IN PRIVACY PROTECTION


                The cloud will typically process and store the information about which privacy is a paramount concern.the main issue is identity, which serves as the basis of privacy or lack of it, and underlines the trust of individuals and organisations in other entities. The key consideration is the intefrity that organisations adopt when handling personal information. From an organisation's perspective, control over information should remain with the end user or the data's creator with adequate controls ove4r repurposing.From a personal perspective, the person should have the wherewithal to control his or her identity as well as the release of socially sensitive identity attributes. Who owns the data?Is the person about whom the data pertains?Is it the organisation that prototypically stores tha data? Or, is it the cloud provider that physically stores the data somewhere out in cyberspace? As an example, is your financial information (as personal data) your property or is it uour bank's business property?

One of the beneficial aspects of the present concern over the information privacy is that it places the person about whom data are recorded in proper perspective.Whereas such person may be the object in an information system and is regarded as the subject in privacy protection.and that subject is intended to imply that a person should in fact have some control over the storsge of personal information.
More specifically, the subject is the person ,natural or legal, about whom the data are stored. The beneficial user is the organisation or individual for whom the data is performed, and the agency is the computing system in which the processing is performed and the information is stored. For example, the agency may be the service conmpany and the subject is the creditor.
In general, the beneficial user obtains the value from the data processed and has some control over the manner and time span in which the processing is performed. The agency need to be aware of the end use of the information or how and when the processing is performed.
The heart issues is the privacy protection, which normally refers to the protection of rights and individuals. While the concept may also apply to individuals, the individual aspect of the issue is that which raisess questions of privacy and liberty.



References:
Gellman, R. 2009. Privacy in the Clouds: Risks to Privacy and Confidentiality form Cloud Computing. World Privacy Forum (February 23, 2009).
Conti, G. 2009. Googling Security. Upper Saddle River, NJ: Addison- Wesley.

2 comments:

  1. Plagiarism from http://journals.cluteonline.com/index.php/JBER/article/viewFile/731/716

    ReplyDelete
  2. The privacy policy should provide an unobstructed view of where the information will be stored, highlight availability zones, data centers, and mention protocols that will determine access to your cloud servers. A thorough analysis of information data flow would help identify vulnerabilities and loopholes (if any).

    Cloud Hosting I Drupal Hosting I Managed Cloud Computing

    ReplyDelete