September 28, 2017

The Internet Has Your Data (Whether You Like It Or Not)

By Ashwin Krishnan

Cloud Cleanup Anyone?

Following on where we left off from my last two articles now we shift focus to what this data collection means to you and me and some impending regulations that presumably give us control but do they really? And if we can’t rely on regulations alone, then what can we do about it to protect ourselves?

Let’s start with the regulation GDPR that is making the rounds or all the right reasons – which for the uninitiated is ‘General Data Protection Regulation‘, a sweeping regulation that originated in the EU and impacts not just EU enterprises but every enterprise that has customers or partners in the EU – that affords controls to end customers – enterprises and individuals. Let’s focus on one such with a catchy title ‘The Right to be Forgotten’ (could serve as a good tag line for an estranged lover’s song lyrics as well) which is really the right to ask your provider to erase every digital footprint that you left behind and. On the face of it, this looks very compelling – imagine I can call Vodafone and say, ‘forget me’ and all my digital exhaust is obliterated. But is that really the case? Lets’ dig in. If every provider needs to uniquely identify each of their customers’ digital trail on a continuous basis, imagine the cost that it’s going to entail. And is it even feasible? Let me explain my skepticism. The average number of IP devices in an average US home was about 25 (laptops, smartphones, smart TVs, NEST sensors, IoE devices …) last year that is likely to double this year. And the amount of data that each of these devices is generating is also skyrocketing. So how realistic is it that providers are going to be able to keep up with this data tsunami and fingerprint these in real-time in the event that I hit the ‘Erase All’ button and they need to bring the Kleenex out?

(Source: oecdinsights)

I hope I have your attention now. So, what we are left with – as enterprises and consumers – then? As enterprises – the answer comes down to protecting your own data. And the ‘easiest’ way to do it is by encrypting everything AND keeping the crypto keys with you. The cloud providers’ response of – we can’t provide you with customized solutions or good analytics – with encrypted data is no longer valid. Good technology like ‘homomorphic encryption’ allows for data analytics even on encrypted data. So encrypt everything, and keep the keys with you. As consumers, it is more challenging. I do want Netflix to offer me a 3 month ‘All you can eat Bollywood movies’ based on my viewing patterns. But I do not want Roomba (yes, the vacuum) to snoop and collect data on me without my explicit permission. So, we fickle consumers, want the cake and eat it too! And for the right reasons. So, anonymizing everything with things like the Tor browser or obfuscating IP addresses is not for the faint of heart. And with the pervasiveness of connected pacemakers, insulin monitoring tools, connected refrigerators – all of which collect and send data to the cloud – there is no pragmatic way of obfuscating or anonymizing anything anymore. So, it really boils down to the contract between providers and consumers that needs to change. Regulation clearly helps but we – as consumers – need to become more educated individually, help our friends and family get educated and demand answers from provider’s aka grassroots activism. If you want to join in on the conversation – there is a brand-new podcast series called ‘The Moral Compass’ that I will be hosting and looking for folks who feel strongly about this subject to join me in the conversation (drop me a line). This is not easy, but pursuing anything worthwhile rarely is.

By Ashwin Krishan

Ashwin Krishnan

Ashwin is an industry expert with over two decades of experience in cybersecurity and cloud technologies. The author of "Mobile Security for Dummies", is currently Senior Vice President of Products and Strategy at HyTrust, a late stage security startup. A recognized thought leader, Ashwin has written for LightReading.com, Virtual-Strategy.com, ITSPMagazine.com, & SiliconIndia.com. Ashwin has also spoken at a number of conferences and events including Mobile World Congress, RSA Security Conference, VMWorld, Telecom Industry Association, and Product Camp Silicon Valley.
Rakesh Soni

Breaking Barriers with the Cloud: How Computing is Unlocking New Business Horizons

Breaking Barriers with the Cloud The ever-increasing rate of global cloud adoption is enough to [...]
Read more

AI-Powered Analytics: Q&A with Sonata Software’s Manu Swami

Welcome to today’s enlightening Q&A session on “AI for Enhanced Analytics,” where we are privileged [...]
Read more
Randy

Gain Critical AI Insights: The Oxford Artificial Intelligence Programme

Acquire Essential Skills for Success in the AI Industry The expansion of online learning within [...]
Read more
Frank Suglia

Forecasting Cloud Trends in 2024

The past few years have rapidly accelerated cloud adoption and impacted the overall IT landscape. [...]
Read more
Andy Hilliard

Accelerance CEO Unveils the Future: AI’s Role in Software Development

In this edition of CloudTweaks, we feature an insightful discussion with Andy Hilliard, CEO of [...]
Read more
Vulnerabilities

Flashpoint’s Cyber Threat Intelligence Index Edition

Cyber Threat Intelligence In an era of rapid digital transformation, we have witnessed a concerning [...]
Read more

SPONSOR PARTNER

Explore top-tier education with exclusive savings on online courses from MIT, Oxford, and Harvard through our e-learning sponsor. Elevate your career with world-class knowledge. Start now!
© 2024 CloudTweaks. All rights reserved.