Privacy On Public Clouds – Five Issues You Must Know About

Advertise on CloudTweaks

Privacy On Public Clouds – Five Issues You Must Know About

Cloud computing is everywhere and presents a compelling value proposition for its end users. However issues like privacy and security still are grey areas when it comes to public clouds. Here presented are five issues one must be aware of: 

1. You own the data and hence the responsibility CSP

Many cloud users do not know the answer to this question – Who owns my personal information once I upload it on the Cloud Service Provider’s (CSP) server? Most public cloud service providers recognize that the user retains ownership of data once it is uploaded. (e.g. https://www.facebook.com/legal/terms) This also means that you have decided to trust the CSP with handling of your data. The CSP may have some responsibility for handling the information safely but not all. You may choose a different service provider or choose not to put particular data on cloud altogether. But the buck stops at you are responsible for the data you put up there.

2. CSPs collect much more data

Typically at the time of joining you provide certain details including personally identifiable information (PIIs) to CSP. But you will be surprised to know that they know a lot more about you. The additional information is derived from your regular usage of their services. This includes when you log in, for how long you are connected, devices you use, location from where you connect, applications you use etc. Various mechanisms are employed to collect these details. Common methods use browser web storage, application data caches, cookies, pixel tags and anonymous identifiers.

3. You have only limited control over data

It is common for CSPs to provide few privacy options to end users. But there is a catch. Firstly you do not get to control every data, only a subset of privileges is offered. Secondly these options help you customize how rest of the world sees your information. Your CSP still has full access to the data, and they use it for a variety of purposes (e.g. http://www.google.co.in/intl/en/policies/privacy/). You cannot stop them from doing that because it is covered in the contract.

However, you still have some absolute powers in the form of local browser security settings. You can set the desired security levels and in effect block cookies or other scripts from executing. But there is a cost associated with this. The moment you say block cookies, many features may stop working. CSPs clearly state that in their terms and conditions. So if you want to get full features from the cloud this is not a practical option.

4. Encryption is your true friend

What if you have already signed up with cloud service provider? You still have a friend in terms of encryption. You can encrypt all your sensitive data before storing it on the cloud. This adds an additional security layer, control of which lies entirely with you. It may not be to the CSPs liking but highly recommended as this will fetch you greater control over safety of your data.

5. Law of the land may not apply

Unfortunately, privacy laws all over the world are still evolving and there is no global standard. While you may be governed by the state laws you live in, the same may not apply to your data. Your CSP and eventually the server where your data resides, may come under a different jurisdiction. So think again if you are counting on local laws to come to your rescue in case of a breach.

By Manoj Tiwari

CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in cloud connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as technology related infographics and comics.

Contact us for more information on how to get involved in our content related services and placement programs.

CONTRIBUTORS

5 Pitfalls to Avoid when Selecting a Cloud-based Video Conferencing System

5 Pitfalls to Avoid when Selecting a Cloud-based Video Conferencing System

Cloud-based Video Conferencing System Pitfalls A recent survey revealed that three out of four executives predict that video conferencing will ...
Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the ...
Are you being served by an empathetic Bot! And do you even care?

Are you being served by an empathetic Bot! And do you even care?

Are you being served by an empathetic Bot! Move over chatbots - it is time for the empathetic bot. Say ...
Cryptographic Key Generation – It’s Time To Pay Attention

Cryptographic Key Generation – It’s Time To Pay Attention

Cryptographic Key Generation When we think about cryptographic keys, we tend to think about closely guarded secrets. Keys are the only ...
How Will the Internet of Things Change The World of Trucking?

How Will the Internet of Things Change The World of Trucking?

IoT Transportation Ever since sat-navs became commonplace in cars around the world, the relationship between vehicles and wireless data has ...
6 Blockchain Applications That Any Small Business Owner Can Use

6 Blockchain Applications That Any Small Business Owner Can Use

6 Blockchain Applications Although associated with the virtual currency bitcoin, blockchain technology can be applied across multiple industries, and it ...
Cloud Architecture

Cloud Architecture – The Multi-Tenant Versus Multi-Instance Debate

Cloud Architecture Winston Churchill quotes, “We shape our buildings; thereafter they shape us”. We can truly extend this analogy to ...
If Not Managed Correctly, The Cloud Can Cost An Organization

If Not Managed Correctly, The Cloud Can Cost An Organization

Cloud Application Management When organizations implement cloud applications, they do so as a means to be more efficient and in ...

NEWS

Cloudera Speeds Analytics Deployment for Cybersecurity Hub

Cloudera Speeds Analytics Deployment for Cybersecurity Hub

New Service Simplifies Path to Deploying Next Generation Cybersecurity Hub, Making Machine Learning Easier and Accessible PALO ALTO, Calif., Oct ...
Cisco to buy BroadSoft in $1.9 billion deal

Cisco to buy BroadSoft in $1.9 billion deal

(Reuters) - Cisco Systems Inc (CSCO.O), the world’s largest networking gear manufacturer, said it will buy U.S. telecommunications software company ...
Treacherous 12: Top Threats to Cloud Computing + Industry Insights

Treacherous 12: Top Threats to Cloud Computing + Industry Insights

Top Threats to Cloud Computing SEATTLE, Oct. 20, 2017 /PRNewswire/ -- The Cloud Security Alliance (CSA), the world's leading organization dedicated to defining ...

NEWSLETTER SUBSCRIBE

CloudTweaks has been a prominent influence covering cloud technologies since 2009. We have worked and continue to work with a tremendous number of writers, contributors and partners throughout the world – all of whom provide insights into the cloud business community. This information is provided to our Newsletter subscribers on a weekly basis - free of charge.

Subscribe to receive our weekly collection of Best of Thought leadership, Technology news, Tweaks, Curated resource links, Exclusive promotions and our popular Comic series.

Something went wrong. Please check your entries and try again.