Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 515))

Abstract

Features of cloud services that users’ data is remotely in obscure machine is neither owned nor controlled by user. For adoption of services, from users’ point of view, cloud security and arbitration are significant. Security gap among different tiers causes privacy issues, customer concern about losing sensitive data available in a cloud computing infrastructure. Disagreement among different components of cloud can be mitigated by Online Dispute Resolution (ODR) to great extent. In this paper, we are focusing mainly on three factors, first trying to identify the customer threats, concerns and cross-border conflicts while using cloud computing. Second on ODR (Online Dispute Resolution) and its mechanisms. Finally on required regulatory framework between consumer, industry, and geographic boundaries. An accepted regulatory framework across participants/consumers/providers is currently at a premature stage but as imperative adoption to cloud computing increases across industry there will be paradigm shift in effort sooner than later to build the same.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kuan W. H., Hörnle, J., and Millard, C.: Data protection jurisdiction and cloud computing–when are cloud users and providers subject to EU data protection law? The cloud of unknowing. International Review of Law, Computers & Technology,26(3), 129–164 (2012).

    Google Scholar 

  2. Kandukuri, B.R., Rakshit, A.: Cloud security issues, Services Computing. In: IEEE International Conference on Services Computing, pp. 517–520 (2009).

    Google Scholar 

  3. Kaufman L.M.: Data security in the world of cloud computing. IEEE Security & Privacy. 7(4), 61–64 (2009).

    Google Scholar 

  4. Hassan Takabi, H., James Joshi, B.D., and Ahn, G. J.: Security and privacy challenges in cloud computing environments, IEEE Security & Privacy, 8(6), 24–31(2010).

    Google Scholar 

  5. Jaatun, M.G., Pearson, S., Gittler, F. and Leenes, R.: Towards Strong Accountability for Cloud Service Providers. In: CloudCom, pp. 1001–1006 (2014).

    Google Scholar 

  6. Benghabrit, W., Grall, H., Jean-Claude Royer, J.C., Sellami, M., Azraoui, M., Elkhiyaoui, K., Melek Önen, Anderson Santana De Oliveira, and Bernsmed, B.: A Cloud Accountability Policy Representation Framework. In: CLOSER, 4th International Conference on Cloud Computing and Services Science, pp. 489–498 (2014).

    Google Scholar 

  7. Xiao, Z., and Yang, X.: Security and privacy in cloud computing. IEEE Communications Surveys & Tutorials. 15(2), 843–859 (2013).

    Google Scholar 

  8. Sundareswaran, S., Squicciarini, A. C., and Lin, D.: Ensuring distributed accountability for data sharing in the cloud. IEEE Transactions on Dependable and Secure Computing. 9(4), 556–568 (2012).

    Google Scholar 

  9. Padhy R. P., Patra, M. R. and Satapathy, S. C.: Cloud computing: security issues and research challenges. International Journal of Computer Science and Information Technology & Security (IJCSITS), 136–146(2011).

    Google Scholar 

  10. Ullah, K. and Khan, M. N. A.: Security and Privacy Issues in Cloud Computing Environment: A Survey Paper. International Journal of Grid and Distributed Computing, 7(2), 89–98(2014).

    Google Scholar 

  11. Subashini, S., and Kavitha, V.: A survey on security issues in service delivery models of cloud computing. Journal of network and computer applications, 34(1), 1–11(2011).

    Google Scholar 

  12. Zissis, D., and Lekkas, D.: Addressing cloud computing security issues. Future Generation computer systems, 28(3), 583–592(2012).

    Google Scholar 

  13. Jena, T., Mohanty, J. R., Sahoo, R.: Paradigm Shift to Green Cloud Computing. Journal of Theoretical & Applied Information Technology, 77(3), 394–402 (2015).

    Google Scholar 

  14. Flaherty, P. D., & Ruscio, G.: Stormy Weather: Jurisdiction over Privacy and Data Protection in the Cloud, Internet and E Commerce Law in Canada, (2013).

    Google Scholar 

  15. Hörnle, J.: Online dispute resolution in business to consumer e-commerce transactions. Journal of Information, Law and Technology, 2, (2002).

    Google Scholar 

  16. National Institute of Standards and Technology, https://scap.nist.gov/publications/index.html

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tamanna Jena .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Jena, T., Mohanty, J.R. (2017). Cloud Security and Jurisdiction: Need of the Hour. In: Satapathy, S., Bhateja, V., Udgata, S., Pattnaik, P. (eds) Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications . Advances in Intelligent Systems and Computing, vol 515. Springer, Singapore. https://doi.org/10.1007/978-981-10-3153-3_42

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3153-3_42

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3152-6

  • Online ISBN: 978-981-10-3153-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics