Achieving Regulatory Compliance for Data Protection in the Cloud
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2013, Vol 4, Issue 12
Abstract
The advent of cloud computing has enabled organizations to take advantage of cost-effective, scalable and reliable computing platforms. However, entrusting data hosting to third parties has inherent risks. Where the data in question can be used to identify living individuals in the UK, the Data Protection Act 1998 (DPA) must be adhered to. In this case, adequate security controls must be in place to ensure privacy of the data. Transgressions may be met with severe penalties. This paper outlines the data controller’s obligations under the DPA and, with respect to cloud computing, presents solutions for possible encryption schemes. Using traditional encryption can lead to key management challenges and limit the type of processing which the cloud service can fulfill. Improving on this, the evolving area of homomorphic encryption is presented which promises to enable useful processing of data whilst it is encrypted. Current approaches in this field have limited scope and an impractical processing overhead. We conclude that organizations must thoroughly evaluate and manage the risks associated with processing personal data in the cloud.
Authors and Affiliations
Mark Rivis, Shao Zhu
Designing a Multi Agent System Architecture for IT Governance Platform
This paper presents a multi-agents architecture which facilitates the integration of three major IT governance frameworks: COBIT5, ITIL V3 and ISO/IEC27002, to optimize the construction of a distributed system. This arch...
Virtual Enterprise Network based on IPSec VPN Solutions and Management
Informational society construction can’t be realized without research and investment projects in Information and Communication Technologies (ICT). In the 21st century, all enterprises have a local area network, a virtual...
OpenCL-Accelerated Object Classification in Video Streams using Spatial Pooler of Hierarchical Temporal Memory
The paper presents a method to classify objects in video streams using a brain-inspired Hierarchical Temporal Memory (HTM) algorithm. Object classification is a challeng-ing task where humans still significantly outperfo...
Using Artificial Intelligence Approaches to Categorise Lecture Notes
Lecture materials cover a broad variety of documents ranging from e-books, lecture notes, handouts, research papers and lab reports amongst others. Downloaded from the Internet, these documents generally go in the Downlo...
Motivators and Demotivators of Agile Software Development: Elicitation and Analysis
Motivators and demotivators are key factors in software productivity. Both are also critical to the success of Agile software development. Literature reports very diverse and multidimensional critical factors affecting t...