This website uses cookies to ensure you have the best experience. Learn more

Regulation On Cloud To Protect User Privacy

1844 words - 8 pages

Regulation on Cloud to Protect User Privacy

This essay writes about regulation that rules cloud provider to protect privacy of data citizens within country. First of all, this essay will describe about what cloud services that used nowadays, its wide range of services, and users motivation why they would use cloud services. In the second section, it will explain more about the security threat of cloud services and going more specific into privacy issue. The next section, I will discuss about the extent of technical regulation that porposed from question : moving all data users within country and comparation with another countries regulation, and going deep into its evaluation. In the Fourth section, this essay will discuss about another policy and security mechanism as alternative of the previous policy. Finally, this essay will be closed by analysis, suggestion, and conclussion about what regulation that should be purposed regarding to protect privacy data stored in the users within a country.

What is cloud services?

Today, cloud services are widely used by people around the world in purpose of business, government, and personal use. The concept of “cloud” inspired by Internet topology, which become the basis of cloud sevice itself. With cloud services, users use resources - could be storage, computional capability, or software- from cloud service provider mediated by Internet. Doing computational work with cloud services –cloud computing, involve a number of computers to do the large-scale works, therefore it usually called by distributed system over Internet (reference, paper?). Cloud service also offers a large-scale economical service that only paid for what you use. Therefore, companies migrate to business-to-business cloud as they don’t have to spend money building intial cost for their computational business. For instance, instead of building their own storage, network, cooling, they could just “rent” resource from cloud provider for the lower cost. Besides money benefits, cloud resources also able to be shared by multiple users and re-alocate resource for multiple users on-demand. For costumers who rent for data storage in cloud, it gives them auto backup, and decrease risk of losing data because of disaster. Usually cloud storage location is chosen on the least risk location for disaster.

Cloud services models

Cloud services provides flexible, elastic, and dynamic platform. There is wide range of services that could be provided by cloud providers. Based on blabla, there are 3 models of cloud services that widely popular. They are Infratructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).

Infratructure as a Service provider the physical computer itself, or virtual machine. Provider supply for fundamental resource for computing such as processing, servers, storage, networks and manage its physical infrastructures but costumers have control for their operating system. (costumer example of...

Find Another Essay On Regulation on Cloud to Protect User Privacy

Congress Passed Health Insurance Portability and Accountability Act to Protect Privacy and Health Care

753 words - 4 pages problem. On August 21, 1996, the Health Insurance Portability and Accountability Act (HIPAA) was passed by congress and President Bill Clinton. History of HIPAA Titles Of HIPAA: Purposes There are 5 titles that serve purpose to the HIPAA law. The first title is to What it does Allow the definition of privacy to be Privacy is the right of an individual to keep his/her individual health information from being disclosed. During the 1980’s


845 words - 4 pages fraudulent charges. And while the charges are still in your account while the claims is being processed, they accrue interest. Bankers may suggest to pay for those to avoid interest to accrue and will just refund you once the process is completed. Not a very customer-satisfying idea, but that is how it works. To save you from these inconveniences, let me share some practical tips on how to protect yourself from fraudulent charges on your online

Right to Privacy on Social Networking Sites

1894 words - 8 pages of these systems would clearly infringe on the public’s right to privacy. Advocates of chat monitoring also point to the growing trend of cyber-terrorism in today’s society as motivation to eavesdrop on instant-messaging conversations. Mounting fears that social networking sites and chat rooms in general could become breeding grounds for terrorist activity have caused governments across the world to worry. The British government became one of

Anonymous web browsing rather than internet privacy policies is needed in order to protect our private information. To what extent do you agree wi

1230 words - 5 pages privacy policies. Superiority of internet privacy policies is the website have self regulation that restrict the data allowed to collect so that people feel safer to browse in these website. However, internet privacy policies is not regulated by any organization or law. Therefore, discrepancies between privacy statement and the actual privacy practices may appeared. Anonymous web browsing can hide the user identity that prevent personal information

Call for Freedom: Analysis on I am Joaquin, Necessary to Protect Ourselves

697 words - 3 pages sympathize with the speaker's feeling of rejection. This sympathy leads to acceptance, acceptance of the speaker and his call for freedom. Rejection is one of man's greatest fears, fear that no one wants to feel. Out of the dread of feeling fear, one is inspired to fight, fight for freedoms they have not yet achieved.A little weaker on its emotional appeal is Malcom X's interview with Les Crane, Necessary to Protect Ourselves, and What is an

Compare and analyse China against France on how IP is adopted to protect ICT innovation & entrepreneurship, from legal perspective

2712 words - 11 pages COMP1B03 Innovation and Entrepreneurship: The Rise of the ICT Industry in ChinaIndividual Literature Review3.From Intellectual Property (IP) Protection and legal PerspectiveCompare and analyse China against another country / region (including Taiwan, but excluding Hong Kong & Macau) on how IP is adopted to protect ICT innovation & entrepreneurship, from legal perspective.Date of submission 20/3/2014AbstractThis review explore the current

Privacy Levels on Social Networking Sites - To What Extent Are They

1614 words - 6 pages your friends, and vice versa, for everyone on your friends list and network to see. User Awareness of Privacy on Facebook Recently, a survey was conducted of 210 Facebook users, questioning them about privacy issues (Hovi, Pitkanen, Tuunainen, 2009). Question Yes (%) No (%) Have you read the Facebook terms of use? 15 85 Have you read the Facebook privacy policy? 21 79 These statistics show that most Facebook users

What ethical problems may arise in research on humans? Right to privacy and confidentiality

1147 words - 5 pages before the law.I would like to talk to you about privacy and confidentiality. Privacy: the quality or condition of being secluded from the presence or view of others. ( ) Confidentiality: Containing information whose unauthorized disclosure could be injurious to either or both parties.Not all the ethical issues have clear answers; some hinge on researcher's judgment and scruples.Need for respect.Privacy and

Privacy in computers - the effects that unstable security systems can have on large businesses and the threats they deal to databases

650 words - 3 pages information at their own will. This moral right of privacy to an individual is breached and therefore forfeits its privacy.Private records and information that are obtained in computer databases require the best available physical and electronic security available. This will ensure that all data is only accessible to authorised users. Without adequate security, almost any user could log onto these private records and view them accordingly. This opens

This essay is about the Second Amendment and whether its meaning was for personal gun use or military gun use. It is based on the book "Whose Right to Bear Arms Did the Second Amendment Protect?"

622 words - 2 pages When the Constitution was first created, it lacked a bill of rights. The Anti-federalists believed that a bill of rights was necessary to protect the rights of the American citizens, so they used this as their reason for opposing the ratification of the Constitution. Although the Federalists thought that it was pointless to include one, James Madison went ahead and wrote up a properly worded Bill of Rights. By doing this, he hoped to quiet the

towards privacy preserving

1073 words - 5 pages their data on the cloud to create trust them and have overcome this problem, a trusted cloud computing platform proposed design guarantees the implementation of the guest virtual machines to provide a closed box execution environment Infrastructure as a Service providers such as Amazon allowing infrastructure. To protect a data in a secured way, while cloud user uploading a data it will get encrypted which means non readable format and when

Similar Essays

Regulation On Cloud To Protect User Privacy

2983 words - 12 pages Regulation on Cloud to Protect User Privacy This essay discusses regulation that rules cloud provider to protect privacy of data citizens within country. This essay will describe about what cloud services and its wide range of service In the second section, it will explain more about the security threat of cloud services and going more specific into privacy issue. The next section, I will discuss about the extent of technical regulation that

Security Methods To Protect Your Privacy

744 words - 3 pages Security Methods to Protect Your Privacy Privacy and security issues have become one of the top concerns among computer users in today’s market. It has become a game of survival of the fittest in protection of your security. The only true way to defend yourself is knowledge. You should prepare your self against hackers, spammers and potential system crashing viruses and web bugs. Lets focus on how you can protect yourselves from the

We Must Strive To Protect Privacy In Technology

574 words - 2 pages We Must Strive to Protect Privacy in Technology Technology is getting more and more complex as the years come and go. The availability of personal information is easier to access and the risk of it being tampered with is also high. As the years pass, the threat of privacy invasion gets greater and greater and easier to happen. There are several ways that privacy is able to be invaded and there will only be more to come. Americans have

Facebook Or Fakebook?: The Effect Of Simulation On Location Privacy User Studies

1343 words - 5 pages Facebook or Fakebook?: The effect of simulation on location privacy user studies Iain Parris, Fehmi Ben Abdesslem, Tristan Henderson School of Computer Science, University of St Andrews, St Andrews KY16 9SX, UK {ip,fehmi,tristan} 1. INTRODUCTION There is a well-known divide between users' actual pri- vacy behaviours and their responses to survey questions [1]. In an attempt to reduce this divide, monitoring and ques- tioning