Ashwin Krishnan
Ashwin Krishnan

The Cloud Has Your Data (Whether You Like It Or Not)

Cloud Cleanup Anyone?

Following on where we left off from my last two articles now we shift focus to what this data collection means to you and me and some impending regulations that presumably give us control but do they really? And if we can’t rely on regulations alone, then what can we do about it to protect ourselves?

Let’s start with the regulation GDPR that is making the rounds or all the right reasons – which for the uninitiated is ‘General Data Protection Regulation‘, a sweeping regulation that originated in the EU and impacts not just EU enterprises but every enterprise that has customers or partners in the EU – that affords controls to end customers – enterprises and individuals. Let’s focus on one such with a catchy title ‘The Right to be Forgotten’ (could serve as a good tag line for an estranged lover’s song lyrics as well) which is really the right to ask your provider to erase every digital footprint that you left behind and. On the face of it, this looks very compelling – imagine I can call Vodafone and say, ‘forget me’ and all my digital exhaust is obliterated. But is that really the case? Lets’ dig in. If every provider needs to uniquely identify each of their customers’ digital trail on a continuous basis, imagine the cost that it’s going to entail. And is it even feasible? Let me explain my skepticism. The average number of IP devices in an average US home was about 25 (laptops, smartphones, smart TVs, NEST sensors, IoE devices …) last year that is likely to double this year. And the amount of data that each of these devices is generating is also skyrocketing. So how realistic is it that providers are going to be able to keep up with this data tsunami and fingerprint these in real-time in the event that I hit the ‘Erase All’ button and they need to bring the Kleenex out?

(Source: oecdinsights)

I hope I have your attention now. So, what we are left with – as enterprises and consumers – then? As enterprises – the answer comes down to protecting your own data. And the ‘easiest’ way to do it is by encrypting everything AND keeping the crypto keys with you. The cloud providers’ response of – we can’t provide you with customized solutions or good analytics – with encrypted data is no longer valid. Good technology like ‘homomorphic encryption’ allows for data analytics even on encrypted data. So encrypt everything, and keep the keys with you. As consumers, it is more challenging. I do want Netflix to offer me a 3 month ‘All you can eat Bollywood movies’ based on my viewing patterns. But I do not want Roomba (yes, the vacuum) to snoop and collect data on me without my explicit permission. So, we fickle consumers, want the cake and eat it too! And for the right reasons. So, anonymizing everything with things like the Tor browser or obfuscating IP addresses is not for the faint of heart. And with the pervasiveness of connected pacemakers, insulin monitoring tools, connected refrigerators – all of which collect and send data to the cloud – there is no pragmatic way of obfuscating or anonymizing anything anymore. So, it really boils down to the contract between providers and consumers that needs to change. Regulation clearly helps but we – as consumers – need to become more educated individually, help our friends and family get educated and demand answers from provider’s aka grassroots activism. If you want to join in on the conversation – there is a brand-new podcast series called ‘The Moral Compass’ that I will be hosting and looking for folks who feel strongly about this subject to join me in the conversation (drop me a line). This is not easy, but pursuing anything worthwhile rarely is.

By Ashwin Krishan

Aruna Headshot

Cloud Proofing Future Business Challenges

Cloud Proofing Business Hardly a week goes by without coming across news around the increase in the number of organizations

Louis Columbus

Improving Endpoint Security Needs To Be A Top Goal In 2020

Improving Endpoint Security Bottom Line:  Attacking endpoints with AI, bots, and machine learning is gaining momentum with cybercriminals today with

Tunio Headshot

The Evolution of Data Transfer

Data Transfer Whether due to a lack of time, need or simply because email started at such an advanced stage,

Docker

New Filesharing Implementation in Docker Desktop Windows Improves Developer Inner Loop UX

A common developer workflow when using frameworks like Symfony or React is to edit the source code using a Windows

Bbc Tech

The NHS robots performing major surgery

How would you feel about a robot performing major surgery on you? 2019 has seen a boom in the use

Google Data

Google.org Fellows bring transparency to local jail data nationwide

Click here to explore Interactive Map with Localized Data In recent years, we’ve seen a bipartisan focus on criminal justice reform