Achieving Regulatory Compliance for Data Protection in the Cloud
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2013, Vol 4, Issue 12
Abstract
The advent of cloud computing has enabled organizations to take advantage of cost-effective, scalable and reliable computing platforms. However, entrusting data hosting to third parties has inherent risks. Where the data in question can be used to identify living individuals in the UK, the Data Protection Act 1998 (DPA) must be adhered to. In this case, adequate security controls must be in place to ensure privacy of the data. Transgressions may be met with severe penalties. This paper outlines the data controller’s obligations under the DPA and, with respect to cloud computing, presents solutions for possible encryption schemes. Using traditional encryption can lead to key management challenges and limit the type of processing which the cloud service can fulfill. Improving on this, the evolving area of homomorphic encryption is presented which promises to enable useful processing of data whilst it is encrypted. Current approaches in this field have limited scope and an impractical processing overhead. We conclude that organizations must thoroughly evaluate and manage the risks associated with processing personal data in the cloud.
Authors and Affiliations
Mark Rivis, Shao Zhu
Building Low Cost Cloud Computing Systems
The actual models of cloud computing are based in megalomaniac hardware solutions, being its implementation and maintenance unaffordable to the majority of service providers. The use of jail services is an alternative to...
Development of Eye-Blink and Face Corpora for Research in Human Computer Interaction
A major requirement in face recognition research and coded voluntary eye-blink based sign language communication research is a robust face and eye-blink image corpora. The effectiveness, confidence level, and acceptabili...
A Collaborative Process of Decision Making in the Business Context based on Online Questionnaires
This article is a component of a series of articles and scientific researches conducted by the research team which deals with the web 2.0 and its interactions with the different technology areas. During recent years, the...
Enhanced Architecture of a Web Warehouse based on Quality Evaluation Framework to Incorporate Quality Aspects in Web Warehouse Creation
In the recent years, it has been observed that World Wide Web (www) became a vast source of information explosion about all areas of interest. Relevant information retrieval is difficult from the web space as there is no...
Bioinspired Immune System for Intrusions Detection System in Self Configurable Networks
In the last couple of years, the computer frameworks have become more vulnerable to external attacks. The PC security has become the prime cause of concern for every organization. To achieve this objective Intrusion Dete...