Cloud Computing
Cloud Computing
Cloud Computing
DCN
Introduction:
Successfully addressing the privacy, trust and security risks inherent in
deployments of cloud computing represents a complex and difficult
challenge for one significant reason: The widespread use of cloud
technologies brings into sharper focus linkages among issues that
formerly were firmly within the purview of stove-piped regulatory or
technological approaches or domains.
Although the technologies and legal or compliance requirements
associated with the cloud may not be new or particularly innovative (for
example, the audit requirements resemble .Those required for
outsourcing arrangements), the public policy challenge hinges on
whether their combination in a cloud environment undermines or
degrades current policy approaches. For example: Widespread take up
of cloud computing might contradict or adversely affect globally
established data protection and privacy principles. Consent and user
control of personal data are key tenets of privacy and data protection
frameworks that are particularly pertinent for Europe. However,
widespread implementation of cloud computing reduces users and
even cloud providers control of personal information as it is opaquely
and autonomously disassembled and re-assembled across a highly
distributed infrastructure.
The technological challenges of providing for confidentiality in the cloud
present potential barriers to establishing trust. For example, encryption
and similar technologies are currently the best way to maintain data
confidentiality but their effectiveness is reduced in cloud environments
because the cloud user has little or no other effective (logical or
physical) security controls.
Cloud computing deployment poses operational challenges in respect of
compliance and risk management. For example, verifying compliance
with certain regulatory or voluntary standards is significantly more
complex in a cloud environment since the point at which a satisfactory
level of assurance is achieved might incur greater and greater costs for
the cloud user. Cloud users may have to take on trust their providers
compliance with the requisite operational procedures.
Defining
trust:
security,
privacy
and
15
17
CEPIS:
19
1. Background:
Cloud Computing is not a very new concept in IT, in fact Cloud Computing
is a more advanced version of the Data Processing Service Bureaus that
we had 40 years ago. Nevertheless, the best known companies in the IT
field offer or will shortly offer Cloud Computing services to a range of
customers from organisations of all sizes to individuals. The biggest and
best known Cloud Computing providers include Amazon with EC2 [5],
Microsoft with Azure [6] and Google with GoogleApps (e.g. Gmail, Google
Docs, Google Calendar) [7]. The paradigm of Cloud Computing can be
described in simple terms as offering particular IT services that are hosted
on the internet the most common ones being Platform as a Service (PaaS),
Infrastructure as a Service (IaaS) and Software as a service (SaaS).
Cloud Computing is often marketed as an efficient and cheap solution that
will replace the clientserver paradigm. The paradigm shift involves/results
in the loss of control over data as well as new security and privacy issues.
For this reason caution is advised when deploying and using Cloud
Computing in enterprises.
After all, the first big issue in data protection in Europe arose at the end of
the 1960s, when a Swedish company decided to have its data processing
done by a service bureau in Germany and the data protection legislations
in both countries were not alike.
With Cloud Computing rapidly gaining popularity, it is important to highlight
the resulting risks. As security and privacy issues are most important, they
should be addressed before Cloud Computing establishes an important
market share. Many IT and important research agencies are aware of these
risks and have produced reports and analyses to document them [1], [2],
[3] ,[4].
2. Concerns:
20
5. The paradigm shift in Cloud computing makes the use of traditional risk
management approaches hard or even impossible. Irrespective of the fact
that control over data is transferred to the Cloud Computing provider, risk
management and compliance issues are split between the Cloud
Computing provider,
Internet provider and customer. However, compliance can be seen as one
of the important trust factors between the Cloud Computing provider and
customer. Regulatory and legislative compliance is also problematic. Cloud
data centres can be geographically dispersed. Therefore legislative
compliance is not currently adequately defined.
6. As all technical control is given to the Cloud Computing provider,
customers often want to have an external audit of this provider. Therefore
logging and auditing information has to be stored and protected in order to
enable verification. Appropriate logging could provide the possibility for
Forensic investigation in cases of incident.
7. Concerns also exist with regard to deletion of data: It is difficult to delete
all copies of electronic material because it is difficult to find all copies. It is
impossible to guarantee complete deletion of all copies of data. Therefore it
is difficult to enforce mandatory deletion of data. However, mandatory
deletion of data should be included into any forthcoming regulation of Cloud
Computing services, but still it should not be relied on too much: the age of
a Guaranteed complete deletion of data, if it ever existed has passed.
This needs to be considered, when data are gathered and stored.
8. Data Protection and Privacy legislation is not even similar in many
countries around the globe yet Cloud Computing is a global service of the
future. Consequently the problems and risks that affect data protection
rules in Europe must be considered properly when Cloud Computing
platforms are locatedon servers in nonEuropean countries.
9. Cloud computing depends on a reliable and secure telecommunications
network that assures and guarantees the operations of the terminal users
of the services provided in the cloud by the cloud computing provider.
Telecommunications networks are often provided separately from the Cloud
computing services.
22
3. Recommendations:
23
References:
25
26