Abstract
During the recent few years, Cloud Computing has gained a strategic importance in the development of the ICT sector. Cloud Services have been adopted by companies, public administrations, and private customers to store and process data. As the requirements in terms of information reliability, accessibility, and availability increase, so do the requirements related to confidentiality and security of sensitive and classified data (e-mail, medical records, etc.). These are therefore translated into legal requirements constraints. When data are used by a Cloud application, security and confidentiality issues may arise due to the geographical distribution of the Cloud Providers’ data center. Indeed, it is a very common practice for a Cloud Provider to have its registered office in a country, while the several data centers it controls are located in different continents of the world. This business strategy, clearly aimed at maximizing profit by reducing expenses (especially in terms of taxes), is in contrast to the variegated national laws, which may provide specific requirements and security measures for the treatment of different kinds of data. This chapter presents an overview of the current initiatives concerning the legislation awareness in Cloud Computing and reports the main aspects to take into account to approach such a topic.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Valtysson, B. (2010). Access culture: Web 2.0 and cultural participation. International Journal of Cultural Policy, 16(2), 200–214.
Oasis topology and orchestration specification for cloud applications (tosca) tc. https://www.oasis-open.org/committees/tc_home.php?wg_abbrev=tosca
Davis, D., & Pilz, G. (2012). Cloud infrastructure management interface (cimi) model and rest interface over http.
Pearson, S. (2009). Taking account of privacy when designing cloud computing services. In Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing (pp. 44–52). IEEE Computer Society.
Godbole, N. S., & Lamb, J. (2013). The triple challenge for the healthcare industry: Sustainability, privacy, and cloud-centric regulatory compliance. 10th International Conference and Expo on Emerging Technologies for a Smarter World (CEWIT 2013), pp. 1–6, IEEE.
Khan, K. M., & Bai, Y. (2013). Automatic verification of health regulatory compliance in cloud computing. 2013 I.E. 15th International Conference on e-Health Networking, Applications & Services (Healthcom), pp. 719–721, IEEE.
Boer, A., Winkels, R., & Vitali, F. (2008). Metalex xml and the legal knowledge interchange format. Berlin: Springer.
World encyclopedia of law—sdu-bwb. http://lawin.org/sdu-bwb/
Tucker, H. (2004). Lex dania-white paper. A system of XML schemas for Danish legislative documentation.
Association e-justice.ch—chlexml. http://www.svri.ch/de/CHLexML.html
Schefbeck, P. A. E. (2006). The e-law project in Austria.
Francesconi, E. (2006). Norme in rete project: Standards and tools for italian legislation. International Journal of Legal Information, 34, 358.
Institute of legal information theory and techniques. www.ittig.cnr.it/
Vitali, F., & Zeni, F. (2007). Towards a country-independent data format: The akoma ntoso experience. In Proceedings of the V legislative XML workshop (pp. 67–86). Florence, Italy: European Press Academic Publishing.
Gullickson, K. (2008). Drafting legislation using xml in the us house of representatives. World e-Parliament Conference, pp. 25–26.
McClure, J. (2006). Legal-rdf vocabularies, requirements & design rationale. In Proceedings of the V Legislative XML Workshop (pp. 149–159).
Arnold-Moore, T., Clemes, J., & Tadd, M. (2000). Connected to the law: Tasmanian legislation using enact. Journal of Information, Law and Technology, 1, 00–1.
Ogawa, Y., Inagaki, S., & Toyama, K. (2008). Automatic consolidation of Japanese statutes based on formalization of amendment sentences. In Y. Ogawa, S. Inagaki, & K. Toyama (Eds.), New frontiers in artificial intelligence (pp. 363–376). Berlin: Springer.
Maeda, M. (2003). Workbook hosei shitsumu (Rev. ed.). Gyosei, Tokyo.
Ogawa, Y., Yamada, M., Kato, R., & Toyama, K. (2011). Design and compilation of syntactically tagged corpus of Japanese statutory sentences. In Y. Ogawa, M. Yamada, R. Kato, & K. Toyama (Eds.), New frontiers in artificial intelligence (pp. 141–152). Berlin: Springer.
Ministry of internal affairs and communications, horei data teikyo system. http://law.e-gov.go.jp/cgi-bin/idxsearch.cgi
Di Martino, B., Esposito, A., & Cretella, G. (2015). Semantic representation of cloud patterns and services with automated reasoning to support cloud application portability. IEEE Transactions on Cloud Computing, PP(99), 1–1.
Acknowledgments
This research has been supported by the European Community’s Seventh Framework Programme (FP7/2007–2013) under grant agreement n 256910 (mOSAIC Project), by PRIST 2009, Fruizione assistita e context aware di siti archeologici complessi mediante dispositivi mobili, and CoSSMic (Collaborating Smart Solar-powered Micro-grids—FP7-SMARTCITIES-2013).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Di Martino, B., Cretella, G., Esposito, A. (2017). Legislation-Aware Cloud Computing: An Overview. In: Corsi, K., Castellano, N., Lamboglia, R., Mancini, D. (eds) Reshaping Accounting and Management Control Systems. Lecture Notes in Information Systems and Organisation, vol 20. Springer, Cham. https://doi.org/10.1007/978-3-319-49538-5_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-49538-5_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49537-8
Online ISBN: 978-3-319-49538-5
eBook Packages: Business and ManagementBusiness and Management (R0)