• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here: Home » Privacy in Cloud Computing

By Abhishek Ghosh December 11, 2013 3:01 am Updated on December 11, 2013

Privacy in Cloud Computing

Advertisement

Privacy in Cloud Computing is gaining importance in our daily lives – both in the private and in professional environment. In order to judge whether the need for security and data protection is enough, many points needs to be considered. Of particular interest is the question of who is responsible for Privacy in Cloud Computing : The one who collected the data or the respective cloud provider. When we consider the course of advancing globalization, where the data may cross international borders and thus faces different jurisdictions, the situation appears more complicated. Privacy in Cloud Computing is gaining importance in our daily lives – true, but more true is to calculate or consider all the apparent and unapparent factors.

Table of Contents

  • 1 Introduction
  • 2 Basics
  • 3 Applicability

 

Privacy in Cloud Computing : Basics

 

Due to the ongoing technological development, data management and thus the collection and storage of data become easier and more common. In addition, users are significantly more likely to prompted to divulge personal information. For privacy, the basic principles are becoming of increasing importance. The problem that arises is the existing laws, which must be must be on new or changing techniques which were not considered when the actual bills were applied.

Advertisement

---

This present term of data protection is extremely misleading. Because unlike indicated literally, more than bare data, the are affected by so-called factor named “personal data”, the focus is of privileged nature. Additionally, note that the rules of data protection are in a constant and ever-faster change. Here is a short overview of its development. As early as in 1968, United Nations began the UN to consult the implications of data processing. However, only non-binding guidelines have been developed:

  1. Accuracy of the data
  2. Purpose of data
  3. Inspection by interested parties in the stored data
  4. Security of data
  5. Monitoring of compliance and sanctions for non-compliance

 

 

Privacy in Cloud Computing : Applicability

 

Privacy in Cloud Computing

According to the aforementioned census, decision for an interference with the right of informational self-determination is only possible in a particular case. This must be justified by special standards, appropriate legal claims or consent of the individual.

Possible example of such a case is the collection of data for the payment of taxes and the employer is a pass-through station in these cases and the data collected may not be used for their own purposes. But for this rule, there can be exceptions in certain circumstances.

Stakeholders may legitimize a data collection method. However, this must be clear, unambiguous form needed to filled prior to the collection of the data. Furthermore, should consent not be a flat one, but must be earmarked and the person must not be unfairly disadvantaged.
Except in the cases mentioned above, there are also legitimate reasons where one company want to use the personal information. More specifically, this means that the personal data are recorded and used for a purpose.

This article has been continued here.

One copy of this article can be downloaded as pdf from the link below, Licensed under a Creative Commons NC ND License with no re-publication rights, part or in full to any domain on the Internet.

This Article Has Been Shared 710 Times!

Facebook Twitter Pinterest
Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Privacy in Cloud Computing

  • Google F1 : Distributed RDBMS replacement for MySQL

    Google F1, The Fault-Tolerant Distributed RDBMS is targated to be replacement for MySQL. This claimed to be perform better like serving Ads from crap servers.

  • Cloud Computing Benefits for Small Business

    Cloud Computing Benefits for Small Business are not that focused than the providers do to show advantages for the Enterprises. Strategy can make ROI more.

  • GoDaddy Buys Media Temple : Thoughts and Ideas

    GoDaddy Buys Media Temple – four days has been passed since we all know about the acquisition. Thoughts and Helps for the old Clients and technical notes.

  • Technical Aspects of Data Security in the Cloud

    Technical aspects of data security in the cloud is one of the main reason why the companies or the end users thinks to be in the cloud. Here is a discussion.

  • Browser Based Chat, Screen Sharing System With HTML5 WebRTC

    Browser based chat including video chat, Screen Sharing are possible with HTML5 WebRTC. Here are some resources which you can run on Cloud as App.

Additionally, performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (22.1K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Samsung Galaxy S22 Ultra: Long Term Review June 30, 2022
  • How to Make the Most of Your S Pen (S22 Ultra) June 29, 2022
  • Safe Chargers for Samsung Galaxy S22 Ultra June 27, 2022
  • How Telecoms Can Use The Cloud To Power Their 5G Network June 24, 2022
  • A Beginner Guide to Cloud Computing for Development June 22, 2022

About This Article

Cite this article as: Abhishek Ghosh, "Privacy in Cloud Computing," in The Customize Windows, December 11, 2013, July 1, 2022, https://thecustomizewindows.com/2013/12/privacy-in-cloud-computing/.

Source:The Customize Windows, JiMA.in

This website uses cookies. If you do not want to allow us to use cookies and/or non-personalized Ads, kindly clear browser cookies after closing this webpage.

Read Privacy Policy.

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2022 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy