Abstract
The most frequently raised concerns about cloud computing relate to the security and privacy of data held in the cloud. In some cases, we found that these concerns were actually preventing the adoption of cloud services, a point confirmed by Everest Group research in 2013 (see chapter 1). In other cases, security and privacy increased the costs of adopting cloud by requiring increased diligence in assessing cloud suppliers. Finally, there is also the perspective, uncovered in our interviews, that these concerns can be exaggerated by IT departments who are reluctant to cede further control over, or out of, the IT function — departments, perhaps, that have learned their own lessons from the outsourcing revolution.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Notes
Information Commissioner’s Office (2013) Key Definitions for the Data Protection Act. Archived at www.ico.org.uk/for_organizations/data_protection/the_guide/key_definitions.
Ibid.
Information Commissioner’s Office (2012) Outsourcing: A Guide for Small and Mediumsized Businesses. Archived at www.ico.org.uk/for_organizations/data_protection/the_guide/~/media/documents/library/Data_Protection/Detailed_specialist_guides/outsourcing_guide_for_smes.ashx.
Ibid.
See the discussion in Article 29 Data protection working party (London, Information Commissioner’s Office, 2010) about the distinction between data controller and data processor.
Davies, S. (2013)’ sweden’s Data Protection Authority Bans Google Cloud Services over Privacy Concerns’ (13 June). Archived at www.privacysurgeon.org/blog/incision/swedens-data-protection-authority-bans-google-apps/.
Ibid.
Davies, S. (2012) ‘Why Norway’s Rigorous Stance on Cloud Computing Highlights the Primacy of Strong Privacy Policies’ (13 June). Archived at www.privacysurgeon.org/blog/incision/why-norways-rigorous-stance-on-cloud-computing-highlights-the-crucial-importance-of-strong-privacy-policies/.
European Commission (2012) Digital Agenda: New Strategy to Drive European Business and Government Productivity Via Cloud Computing (27 September). Archived at http://europa.eu/rapid/press-release_IP-12-1025_en.htm.
Kroes, N. (2013) ‘How we’re boosting trust in the cloud, post-PRISM.’ Archived at http://blogs.ec.europa.eu/neelie-kroes/cloud-contract-term/.
Ibid.
International Working Group on Data Protection in Telecommunications (2012)’ sopot memorandum.’ Working paper on cloud computing — Privacy and data protection issues (April 24).
European Parliament (2012) Fighting Cyber Crime and Protecting Privacy in the Cloud. Directorate General for Internal Policies; Policy Department C: Citizens’ Rights and Constitutional Affairs (October). Archived at www.europarl.europa.eu/committees/en/studiesdownload.html?languageDocument=EN&file=79050.
International Working Group on Data Protection in Telecommunications, op. cit.
Ibid.
Ibid.
Information Commissioner’s Office (2012) Guidance on the Use of Cloud Computing (February 10). Information Commissioner’s Office (2012) Outsourcing.
European Parliament, op. cit.
Ibid.
Ibid.
Ibid.
Prism (2013) The Guardian (June 7). Archived at www.guardian.co.uk/world/prism.
European Commission, op. cit.
Information Commissioner’s Office (2008) Privacy by Design. Archived at www.ico.org.uk/for_organizations/data_protection/topic_guides/~/media/documents/pdb_report_html/PRIVACY_BY_DESIGN_REPORT_V2.ashx.
See, for example, JISC (2010) Identity Management Toolkit (June 30). Archived at www.jisc.ac.uk/whatwedo/programmes/aim/idmtoolkit.aspx.
Kern, T., Willcocks, L. P. and van Heck, E. (2002) ‘The Winner’s Curse in IT Outsourcing: Strategies for Avoiding Relational Trauma’. California Management Review, 44(2): 47–69.
See, for example, Wang, R. (2011) ‘Monday’s Musings: Lessons Learned From Amazon’s Cloud Outage’ (April 25). Archived at www.forbes.com/sites/ciocentral/2011/04/25/mondays-musings-lessons-learned-from-amazons-cloud-outage/.
Anthes, G. (2010)’ security in the Cloud.’ Communications of the ACM, 53(11): 16–18.
Author information
Authors and Affiliations
Copyright information
© 2014 Leslie Willcocks, Will Venters and Edgar A. Whitley
About this chapter
Cite this chapter
Willcocks, L., Venters, W., Whitley, E.A. (2014). Security and Privacy Concerns Revisited. In: Moving to the Cloud Corporation. Palgrave Macmillan, London. https://doi.org/10.1057/9781137347473_5
Download citation
DOI: https://doi.org/10.1057/9781137347473_5
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-1-349-46733-4
Online ISBN: 978-1-137-34747-3
eBook Packages: Palgrave Business & Management CollectionBusiness and Management (R0)