• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here:Home » Privacy in Cloud Computing

By Abhishek Ghosh December 11, 2013 3:01 am Updated on December 11, 2013

Privacy in Cloud Computing

Advertisement

Privacy in Cloud Computing is gaining importance in our daily lives – both in the private and in professional environment. In order to judge whether the need for security and data protection is enough, many points needs to be considered. Of particular interest is the question of who is responsible for Privacy in Cloud Computing : The one who collected the data or the respective cloud provider. When we consider the course of advancing globalization, where the data may cross international borders and thus faces different jurisdictions, the situation appears more complicated. Privacy in Cloud Computing is gaining importance in our daily lives – true, but more true is to calculate or consider all the apparent and unapparent factors.

Table of Contents

  • 1 Introduction
  • 2 Basics
  • 3 Applicability

 

Privacy in Cloud Computing : Basics

 

Due to the ongoing technological development, data management and thus the collection and storage of data become easier and more common. In addition, users are significantly more likely to prompted to divulge personal information. For privacy, the basic principles are becoming of increasing importance. The problem that arises is the existing laws, which must be must be on new or changing techniques which were not considered when the actual bills were applied.

Advertisement

---

This present term of data protection is extremely misleading. Because unlike indicated literally, more than bare data, the are affected by so-called factor named “personal data”, the focus is of privileged nature. Additionally, note that the rules of data protection are in a constant and ever-faster change. Here is a short overview of its development. As early as in 1968, United Nations began the UN to consult the implications of data processing. However, only non-binding guidelines have been developed:

  1. Accuracy of the data
  2. Purpose of data
  3. Inspection by interested parties in the stored data
  4. Security of data
  5. Monitoring of compliance and sanctions for non-compliance

 

 

Privacy in Cloud Computing : Applicability

 

Privacy in Cloud Computing

According to the aforementioned census, decision for an interference with the right of informational self-determination is only possible in a particular case. This must be justified by special standards, appropriate legal claims or consent of the individual.

Possible example of such a case is the collection of data for the payment of taxes and the employer is a pass-through station in these cases and the data collected may not be used for their own purposes. But for this rule, there can be exceptions in certain circumstances.

Stakeholders may legitimize a data collection method. However, this must be clear, unambiguous form needed to filled prior to the collection of the data. Furthermore, should consent not be a flat one, but must be earmarked and the person must not be unfairly disadvantaged.
Except in the cases mentioned above, there are also legitimate reasons where one company want to use the personal information. More specifically, this means that the personal data are recorded and used for a purpose.

This article has been continued here.

One copy of this article can be downloaded as pdf from the link below, Licensed under a Creative Commons NC ND License with no re-publication rights, part or in full to any domain on the Internet.

Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Privacy in Cloud Computing

  • Nginx WordPress Installation Guide (All Steps)

    This is a Full Nginx WordPress Installation Guide With All the Steps, Including Some Optimization and Setup Which is Compatible With WordPress DOT ORG Example Settings For Nginx.

  • WordPress & PHP : Different AdSense Units on Mobile Devices

    Here is How To Serve Different AdSense Units on Mobile Devices on WordPress With PHP. WordPress Has Function Which Can Be Used In Free Way.

  • Developing Privacy Compliant Big Data Apps on IBM Cloud

    A key theme of this work is to answer the key question “Can we use IBM’s solutions to develop various privacy law complainant applications?”.

  • Changing Data With cURL for OpenStack Swift (HP Cloud CDN)

    Changing Data With cURL For Object is Quite Easy in OpenStack Swift. Here Are Examples With HP Cloud CDN To Make it Clear. Official Examples Are Bad.

performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Hybrid Multi-Cloud Environments Are Becoming UbiquitousJuly 12, 2023
  • Data Protection on the InternetJuly 12, 2023
  • Basics of BJT TransistorJuly 11, 2023
  • What is Confidential Computing?July 11, 2023
  • How a MOSFET WorksJuly 10, 2023
PC users can consult Corrine Chorney for Security.

Want to know more about us?

Read Notability and Mentions & Our Setup.

Copyright © 2023 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy