Skip to main content

Security and Privacy Concerns Revisited

  • Chapter
Moving to the Cloud Corporation

Abstract

The most frequently raised concerns about cloud computing relate to the security and privacy of data held in the cloud. In some cases, we found that these concerns were actually preventing the adoption of cloud services, a point confirmed by Everest Group research in 2013 (see chapter 1). In other cases, security and privacy increased the costs of adopting cloud by requiring increased diligence in assessing cloud suppliers. Finally, there is also the perspective, uncovered in our interviews, that these concerns can be exaggerated by IT departments who are reluctant to cede further control over, or out of, the IT function — departments, perhaps, that have learned their own lessons from the outsourcing revolution.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 29.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 37.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 44.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Notes

  1. Information Commissioner’s Office (2013) Key Definitions for the Data Protection Act. Archived at www.ico.org.uk/for_organizations/data_protection/the_guide/key_definitions.

    Google Scholar 

  2. Ibid.

    Google Scholar 

  3. Information Commissioner’s Office (2012) Outsourcing: A Guide for Small and Mediumsized Businesses. Archived at www.ico.org.uk/for_organizations/data_protection/the_guide/~/media/documents/library/Data_Protection/Detailed_specialist_guides/outsourcing_guide_for_smes.ashx.

    Google Scholar 

  4. Ibid.

    Google Scholar 

  5. See the discussion in Article 29 Data protection working party (London, Information Commissioner’s Office, 2010) about the distinction between data controller and data processor.

    Google Scholar 

  6. Davies, S. (2013)’ sweden’s Data Protection Authority Bans Google Cloud Services over Privacy Concerns’ (13 June). Archived at www.privacysurgeon.org/blog/incision/swedens-data-protection-authority-bans-google-apps/.

  7. Ibid.

    Google Scholar 

  8. Davies, S. (2012) ‘Why Norway’s Rigorous Stance on Cloud Computing Highlights the Primacy of Strong Privacy Policies’ (13 June). Archived at www.privacysurgeon.org/blog/incision/why-norways-rigorous-stance-on-cloud-computing-highlights-the-crucial-importance-of-strong-privacy-policies/.

  9. European Commission (2012) Digital Agenda: New Strategy to Drive European Business and Government Productivity Via Cloud Computing (27 September). Archived at http://europa.eu/rapid/press-release_IP-12-1025_en.htm.

  10. Kroes, N. (2013) ‘How we’re boosting trust in the cloud, post-PRISM.’ Archived at http://blogs.ec.europa.eu/neelie-kroes/cloud-contract-term/.

  11. Ibid.

    Google Scholar 

  12. International Working Group on Data Protection in Telecommunications (2012)’ sopot memorandum.’ Working paper on cloud computing — Privacy and data protection issues (April 24).

    Google Scholar 

  13. European Parliament (2012) Fighting Cyber Crime and Protecting Privacy in the Cloud. Directorate General for Internal Policies; Policy Department C: Citizens’ Rights and Constitutional Affairs (October). Archived at www.europarl.europa.eu/committees/en/studiesdownload.html?languageDocument=EN&file=79050.

  14. International Working Group on Data Protection in Telecommunications, op. cit.

    Google Scholar 

  15. Ibid.

    Google Scholar 

  16. Ibid.

    Google Scholar 

  17. Information Commissioner’s Office (2012) Guidance on the Use of Cloud Computing (February 10). Information Commissioner’s Office (2012) Outsourcing.

    Google Scholar 

  18. European Parliament, op. cit.

    Google Scholar 

  19. Ibid.

    Google Scholar 

  20. Ibid.

    Google Scholar 

  21. Ibid.

    Google Scholar 

  22. Prism (2013) The Guardian (June 7). Archived at www.guardian.co.uk/world/prism.

  23. European Commission, op. cit.

    Google Scholar 

  24. Information Commissioner’s Office (2008) Privacy by Design. Archived at www.ico.org.uk/for_organizations/data_protection/topic_guides/~/media/documents/pdb_report_html/PRIVACY_BY_DESIGN_REPORT_V2.ashx.

  25. See, for example, JISC (2010) Identity Management Toolkit (June 30). Archived at www.jisc.ac.uk/whatwedo/programmes/aim/idmtoolkit.aspx.

  26. Kern, T., Willcocks, L. P. and van Heck, E. (2002) ‘The Winner’s Curse in IT Outsourcing: Strategies for Avoiding Relational Trauma’. California Management Review, 44(2): 47–69.

    Article  Google Scholar 

  27. See, for example, Wang, R. (2011) ‘Monday’s Musings: Lessons Learned From Amazon’s Cloud Outage’ (April 25). Archived at www.forbes.com/sites/ciocentral/2011/04/25/mondays-musings-lessons-learned-from-amazons-cloud-outage/.

  28. Anthes, G. (2010)’ security in the Cloud.’ Communications of the ACM, 53(11): 16–18.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Copyright information

© 2014 Leslie Willcocks, Will Venters and Edgar A. Whitley

About this chapter

Cite this chapter

Willcocks, L., Venters, W., Whitley, E.A. (2014). Security and Privacy Concerns Revisited. In: Moving to the Cloud Corporation. Palgrave Macmillan, London. https://doi.org/10.1057/9781137347473_5

Download citation

Publish with us

Policies and ethics