Modelling Cloud Computing Architecture Without Compromising Privacy: A Privacy by Design Approach


Summary  As the Internet has evolved, we have seen the emergence of “Cloud computing.” Organizations have begun to leverage the connectivity created by the Internet to optimize the utility of computing. Ever-cheaper and more powerful processing and storage capabilities are allowing data centres to act as viable, large scale central computing hubs. Simultaneously, increasing network bandwidth and reliable yet flexible network connections make it possible for clients – both individual and enterprise – to utilize high quality services which reside solely on these remote central hubs. These services will often include data storage (and real time access) or processing (by remote software and computing resources). This possibility, however, forces clients to re-think the data protection schemes developed for the point-A-to-point-B data flow.

(Paper)
Keywords  Cloud computing, privacy, data in the cloud, Privacy by Design
Video
Published Date  Jun 09, 2010
<< Back
Back to Top
To search for a specific word or phrase, use quotation marks around each search term. (Example: "body-worn cameras")