SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Downloaden Sie, um offline zu lesen
Data Protection 2011                                                            Data Protection in the Clouds




                Data Protection 2011                                          24 February 2011




                             Data Protection in the Clouds



                                                  Kuan Hon
                                                Cloud Legal Project
                        Centre for Commercial Law Studies, Queen Mary, University of London
                               www.cloudlegal.ccls.qmul.ac.uk / w.k.hon@qmul.ac.uk




                Introduction

                   Cloud Legal Project
                       Cloud terms of service analysis paper
                   Questions we will tackle today –
                       What information in the cloud is regulated under data
                       protection laws?
                       Who is responsible for personal data?
                       Where is personal data processed?
                       Whose laws apply in a dispute?




Kuan Hon
Data Protection 2011                                                Data Protection in the Clouds




                Maturity - Gartner hype cycle Oct 2010 (as at Aug 2010)




                But first… what is cloud computing?
                • It usually involves the provision of scalable IT resources
                  (data storage, application hosting, etc.) on demand,
                  delivered via the internet
                • Cloud Legal Project definition:
                  • Provides flexible, location-independent access to
                  computing resources that are quickly and seamlessly
                  allocated or released in response to demand.
                  • Services (especially infrastructure) are abstracted and
                  typically virtualised, generally being allocated from a pool
                  shared as a fungible resource with other customers.
                  • Charging, where present, is commonly on an access
                  basis, often in proportion to the resources used.




Kuan Hon
Data Protection 2011                                           Data Protection in the Clouds




                Government cloud – some recent papers

                  ENISA - Security and Resilience in Governmental
                  Clouds http://www.enisa.europa.eu/act/rm/emerging-
                  and-future-risk/deliverables/security-and-resilience-in-
                  governmental-clouds - p.41ff on data protection
                  UK - G-Cloud Report: Data Centre Strategy G-Cloud and
                  The Applications Store for Government - Commercial
                  Strategy Team
                  http://www.computerweekly.com/Articles/2011/02/07/245
                  289/G-Cloud-Report-Data-Centre-Strategy-G-Cloud-
                  and-The-Applications-Store-for-Government-
                  Commercial.htm - ANNEX C: Data Protection, including
                  consideration of the US Patriot Act




Kuan Hon
Data Protection 2011                                          Data Protection in the Clouds




                   Key cloud computing
                         concepts




                Virtualisation
                   • Virtualisation = many things but in this context
                     mainly involves multiple “virtual machines” running on
                     shared hardware via the internet




Kuan Hon
Data Protection 2011                                                     Data Protection in the Clouds




                Data centers

                       Massive data centres are being built, often containing sealed
                       shipping containers, themselves containing pre-configured
                       servers: “The trucks back ’em in, rack ’em and stack ’em”
                       (Ray Ozzie: Microsoft’s former Chief Software Architect)
                       Huge requirements for power / cooling / connectivity
                       Google has patented a “water-based data center” - a system that
                       includes “a floating platform-mounted computer data center
                       comprising a plurality of computing units, a sea-based electrical
                       generator in electrical connection with the plurality of computing
                       units, and one or more sea-water cooling units for providing
                       cooling to the plurality of computing units.”




                Google’s “water-based data
                center”
                So just when we thought we had
                identified all the technical,
                commercial and legal risks
                associated with outsourcing and
                offshore data processing …
                …we have to tackle maritime law
                …and the risk of meeting real
                pirates on the high seas!




Kuan Hon
Data Protection 2011                                                                           Data Protection in the Clouds




                Types of service
                 •    Software as a Service (SaaS) (eg. Oracle CRM on demand; Gmail,
                      Hotmail, Yahoo! Mail; Google Apps, Microsoft Office 365; Facebook,
                      Flickr)
                 •    Infrastructure as a Service (IaaS) = delivery of servers, software,
                      storage, etc as a fully outsourced service, typically billed on a utility
                      computing basis (eg. Amazon Web Services, Rackspace)
                 •    Platform as a Service (PaaS) = web-based environment for developing
                      and deploying applications (eg. Google App Engine, Microsoft Windows
                      Azure or Force.com which provides a set of tools and applications for
                      customising the Salesforce.com apps)
                 •    Storage as a Service (also SaaS!) = convenient way of storing /
                      backing-up data online (eg. box.net)
                 •    NB ecosystem of players – hardware, software, support, consultancy…




                Possible architectures




                     From
                     http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-computing-v26.ppt




Kuan Hon
Data Protection 2011                                  Data Protection in the Clouds




                Deployment models:
                private, community, public and hybrid clouds…




                       Data protection law
                             issues




Kuan Hon
Data Protection 2011                                                           Data Protection in the Clouds




                Key features for data protection law purposes
                  Storage and processing
                       May be split up and geographically-distributed (might in practice to be
                       local(ish), for latency reasons - but might not…)
                  Sharding – data may be fragmented
                       a fragment may contain personal data (or it may not?)
                  Data replication
                  Data deletion
                  Design and access – encrypted? Can provider access user’s
                  account? Internal controls on such access?
                  Multiple parties possible – transparency?
                  Other – shared “multi-tenant” infrastructure, eg. running same
                  application instance, sharing same database; reliance on provider




                Foundational issues

                  What information in the clouds is regulated
                  under data protection laws? (“personal data”)
                  Who is responsible for personal data?
                  Where is personal data processed?
                  Whose laws apply in a dispute?
                  Issues may differ for cloud users, cloud
                  providers and data subjects




Kuan Hon
Data Protection 2011                                                    Data Protection in the Clouds




                What is regulated - “personal data” in the clouds

                  Not “personal data” = no data protection law restrictions
                  Processing “anonymised” data in the cloud:
                       By cloud user, after “anonymisation” eg. by aggregation
                       By cloud provider – may be integral to business model
                  Encrypted data – status?
                       Key-coded data analogy. Pro Life Alliance; Craigdale.
                  The “personal data” definition is critical – but
                  insufficiently clear
                  Anonymisation/encryption procedures – status?
                       Source Informatics.




                Who is responsible for personal data in the cloud?

                  Cloud user
                       If data controller, remains data controller
                  Cloud provider
                       Metadata regarding cloud service usage, where cloud
                       user is individual etc - provider is controller
                       Personal data processed in the cloud by cloud user –
                       what’s the provider’s status?
                        o It depends on the facts! Advertising, sale…




Kuan Hon
Data Protection 2011                                                             Data Protection in the Clouds




                Who is actually responsible for data in clouds?
                “...you acknowledge that you bear sole responsibility for
                adequate security, protection and backup of Your Content and
                Applications. We strongly encourage you, where available and
                appropriate, to (a) use encryption technology to protect Your
                Content from unauthorized access, (b) routinely archive Your
                Content, and (c) keep your Applications or any software that you
                use or run with our Services current with the latest security
                patches or updates. We will have no liability to you for any
                unauthorized access or use, corruption, deletion, destruction or
                loss of any of Your Content or Applications.”

                Q. Will that be good enough?
                A. It depends what the cloud user is going to use the service for
                (and how)




                Where is data stored - can you control where your
                data are stored in clouds?
                •   It depends!
                •   Some service providers can’t, for technical reasons, or won’t, for
                    commercial reasons, let you choose
                •   Other service providers are designing their clouds so as to offer customers
                    a choice between ‘regions’ (eg. Amazon Web Services)
                •   Other service providers, if asked, say they currently store customer data
                    by default in the customer’s local region (eg. Decho Mozy Inc)
                •   Geolocation may become a critical differentiator for customers concerned
                    about where their data are stored (eg. because of disclosure risks
                    associated with litigation or regulators) or subject to restrictions on data
                    transfers (such as national rules based on Articles 25 + 26 of the DP Dir.)
                •   An amorphous cloud may not be appropriate for regulated data, eg. if you
                    don’t know where the data will be processed and by whom




Kuan Hon
Data Protection 2011                                                              Data Protection in the Clouds




                But… should location of data really matter?

                   With storage virtualisation & sharding – will seizing one
                   server necessarily afford access to intelligible data…?
                   In practice, what may be more important is:
                       whether the system’s design allows the cloud provider to access
                       user data (eg. by logging into their account), cf. full encryption
                       (where provider has no access to decryption key), and
                       who can effectively assert jurisdiction over the provider (eg. the
                       location of the provider, rather than of its servers)




                 What about disclosure of cloud users’ data to third
                 parties?
                 Would a cloud user feel more comfortable signing up to this…
                 “The Receiving Party [Salesforce.com] may disclose Confidential
                 Information of the Disclosing Party [the customer] if it is compelled by
                 law to do so, provided the Receiving Party gives the Disclosing Party
                 prior notice of such compelled disclosure (to the extent legally
                 permitted) and reasonable assistance, at the Disclosing Party's cost, if
                 the Disclosing Party wishes to contest the disclosure.”
                 … or this?
                 “You authorize ADrive to disclose any information about You to law
                 enforcement or other government officials as ADrive, in its sole
                 discretion, believes necessary, prudent or appropriate, in connection
                 with an investigation of fraud, intellectual property infringement, or other
                 activity that is illegal or may expose ADrive to legal liability.”




Kuan Hon
Data Protection 2011                                                                                Data Protection in the Clouds




                 Whose laws apply if you have a cloud dispute?
                 Choice of law specified by cloud provider…                                              Number *
                 US State: California (most common), Massachusetts (Akamai),                                15
                 Washington (Amazon), Utah (Decho), Texas (The Planet)
                 English law, probably because service provider based there                                 4
                 English law, for customers in Europe / EMEA                                                4
                 Other EU jurisdictions (for European customers): eg. Ireland (Apple),                      2
                 Luxembourg (some Microsoft services)
                 Scottish law (Flexiant)                                                                    1
                 The customer’s local law                                                                   2
                 No choice of law expressed or implied, or ambiguous choice                                 3
                 (eg. “UK Law” for g.ho.st)
                 * Number in each category is out of 31 contracts analysed by QMUL Cloud Legal Project
                 http://www.cloudlegal.ccls.qmul.ac.uk/




                In practice
                    Location, location, location
                         In some situations, choose only provider that allows zoning?
                    Contract
                        procurement process?
                        the provider “stack”
                    Contract terms – standard (multiple sources); negotiate? Including:
                        Exclusions/disclaimers
                        Disclosure/monitoring
                        Data location
                    Encryption, encryption, encryption
                        Simple scenarios only – storage
                          o NB has provider access to key? (eg. for indexing/searching)
                        If cloud applications run on data – data must be decrypted before they
                        can be worked on, currently




Kuan Hon
Data Protection 2011                                                              Data Protection in the Clouds




                Forthcoming papers

                  Next few weeks –
                       What data is regulated as “personal data” in cloud computing?
                       Who is responsible for “personal data” in the cloud?
                  Published -
                       Information ownership in the cloud
                       http://www.cloudlegal.ccls.qmul.ac.uk/Research/researchpapers/37187.html
                       Cloud terms of service analysis
                       http://www.cloudlegal.ccls.qmul.ac.uk/Research/researchpapers/37188.html
                  Future –
                       Law enforcement access (soon)
                       International transfers of data
                       Governance




                Thanks for listening!

                Any questions…

                Kuan Hon
                Cloud Legal Project, CCLS,
                Queen Mary, University of London

                w.k.hon@qmul.ac.uk

                www.cloudlegal.ccls.qmul.ac.uk
                (or http://bit.ly/cloudlegal)




Kuan Hon

Weitere ähnliche Inhalte

Was ist angesagt?

Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environmentsijfcstjournal
 
Data Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingData Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingRitesh Dwivedi
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computingSonali Jain
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security Akhila Param
 
Ensuring data security in cloud computing. - Anusha Tuke
Ensuring data security in  cloud computing. - Anusha TukeEnsuring data security in  cloud computing. - Anusha Tuke
Ensuring data security in cloud computing. - Anusha TukeAnusha Chavan
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computingprachupanchal
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud ComputingJyotika Pandey
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud IBM Security
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud ComputingAshish Patel
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksWilliam McBorrough
 
Introduction to Cloud Computing and Security
Introduction to Cloud Computing and SecurityIntroduction to Cloud Computing and Security
Introduction to Cloud Computing and SecurityOran Epelbaum
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security IssuesStelios Krasadakis
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issuesJyoti Srivastava
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNithin Raj
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportVivek Maurya
 
On technical security issues in cloud computing
On technical security issues in cloud computingOn technical security issues in cloud computing
On technical security issues in cloud computingsashi799
 

Was ist angesagt? (20)

Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
Security issues in cloud database
Security  issues  in cloud   database Security  issues  in cloud   database
Security issues in cloud database
 
Data Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingData Confidentiality in Cloud Computing
Data Confidentiality in Cloud Computing
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computing
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
 
Ensuring data security in cloud computing. - Anusha Tuke
Ensuring data security in  cloud computing. - Anusha TukeEnsuring data security in  cloud computing. - Anusha Tuke
Ensuring data security in cloud computing. - Anusha Tuke
 
Cloud Computing Security Issues
Cloud Computing Security Issues Cloud Computing Security Issues
Cloud Computing Security Issues
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and Risks
 
Introduction to Cloud Computing and Security
Introduction to Cloud Computing and SecurityIntroduction to Cloud Computing and Security
Introduction to Cloud Computing and Security
 
Authentication cloud
Authentication cloudAuthentication cloud
Authentication cloud
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security Issues
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issues
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
 
On technical security issues in cloud computing
On technical security issues in cloud computingOn technical security issues in cloud computing
On technical security issues in cloud computing
 

Ähnlich wie Data protection in cloud computing - Data Protection Conference 2011

wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125Gabor Bokor
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securityMamta Saxena
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Kim Jensen
 
Cloud Expo 2010 Cloud Computing in DoD
Cloud Expo 2010 Cloud Computing in DoDCloud Expo 2010 Cloud Computing in DoD
Cloud Expo 2010 Cloud Computing in DoDGovCloud Network
 
Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Kim Jensen
 
Cloud computing..
Cloud computing..Cloud computing..
Cloud computing..manoj kumar
 
Taking Account of Privacy When Designing Cloud Computing Services
Taking Account of Privacy When Designing Cloud Computing ServicesTaking Account of Privacy When Designing Cloud Computing Services
Taking Account of Privacy When Designing Cloud Computing Serviceswhite paper
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youGlobal Business Events
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSHREYASSRINATH94
 
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMMCloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMMHector Del Castillo, CPM, CPMM
 
Science international journal
Science international journalScience international journal
Science international journalSarita30844
 
The Complexities of Cloud Computing - The Rules are New, But is the Game
The Complexities of Cloud Computing - The Rules are New, But is the GameThe Complexities of Cloud Computing - The Rules are New, But is the Game
The Complexities of Cloud Computing - The Rules are New, But is the GameJanine Anthony Bowen, Esq.
 
A220113
A220113A220113
A220113irjes
 
Fog computing document
Fog computing documentFog computing document
Fog computing documentsravya raju
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 

Ähnlich wie Data protection in cloud computing - Data Protection Conference 2011 (20)

wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011
 
Slides 530 a2
Slides 530 a2Slides 530 a2
Slides 530 a2
 
Cloud Expo 2010 Cloud Computing in DoD
Cloud Expo 2010 Cloud Computing in DoDCloud Expo 2010 Cloud Computing in DoD
Cloud Expo 2010 Cloud Computing in DoD
 
Cloud.ppt
Cloud.pptCloud.ppt
Cloud.ppt
 
Cloud.ppt
Cloud.pptCloud.ppt
Cloud.ppt
 
Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011
 
Cloud computing..
Cloud computing..Cloud computing..
Cloud computing..
 
B1802041217
B1802041217B1802041217
B1802041217
 
Taking Account of Privacy When Designing Cloud Computing Services
Taking Account of Privacy When Designing Cloud Computing ServicesTaking Account of Privacy When Designing Cloud Computing Services
Taking Account of Privacy When Designing Cloud Computing Services
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are you
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
 
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMMCloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
 
Science international journal
Science international journalScience international journal
Science international journal
 
The Complexities of Cloud Computing - The Rules are New, But is the Game
The Complexities of Cloud Computing - The Rules are New, But is the GameThe Complexities of Cloud Computing - The Rules are New, But is the Game
The Complexities of Cloud Computing - The Rules are New, But is the Game
 
A220113
A220113A220113
A220113
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 

Mehr von Cloud Legal Project

Data Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud ComputingData Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud ComputingCloud Legal Project
 
Cloud Computing Contracts and Services: What's Really Happening Out There? T...
Cloud Computing Contracts and Services:  What's Really Happening Out There? T...Cloud Computing Contracts and Services:  What's Really Happening Out There? T...
Cloud Computing Contracts and Services: What's Really Happening Out There? T...Cloud Legal Project
 
Cloud computing: opportunities and risks
Cloud computing: opportunities and risksCloud computing: opportunities and risks
Cloud computing: opportunities and risksCloud Legal Project
 
Cloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risksCloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risksCloud Legal Project
 
Cloud Computing Contracts and Services: What’s Really Happening Out There?
Cloud Computing Contracts and Services:  What’s Really Happening Out There?Cloud Computing Contracts and Services:  What’s Really Happening Out There?
Cloud Computing Contracts and Services: What’s Really Happening Out There?Cloud Legal Project
 
Information ownership in the cloud
Information ownership in the cloudInformation ownership in the cloud
Information ownership in the cloudCloud Legal Project
 
Cloud computing - competition law issues
Cloud computing  - competition law issuesCloud computing  - competition law issues
Cloud computing - competition law issuesCloud Legal Project
 
Cloud computing - cooperating with law enforcement
Cloud computing - cooperating with law enforcementCloud computing - cooperating with law enforcement
Cloud computing - cooperating with law enforcementCloud Legal Project
 

Mehr von Cloud Legal Project (8)

Data Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud ComputingData Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud Computing
 
Cloud Computing Contracts and Services: What's Really Happening Out There? T...
Cloud Computing Contracts and Services:  What's Really Happening Out There? T...Cloud Computing Contracts and Services:  What's Really Happening Out There? T...
Cloud Computing Contracts and Services: What's Really Happening Out There? T...
 
Cloud computing: opportunities and risks
Cloud computing: opportunities and risksCloud computing: opportunities and risks
Cloud computing: opportunities and risks
 
Cloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risksCloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risks
 
Cloud Computing Contracts and Services: What’s Really Happening Out There?
Cloud Computing Contracts and Services:  What’s Really Happening Out There?Cloud Computing Contracts and Services:  What’s Really Happening Out There?
Cloud Computing Contracts and Services: What’s Really Happening Out There?
 
Information ownership in the cloud
Information ownership in the cloudInformation ownership in the cloud
Information ownership in the cloud
 
Cloud computing - competition law issues
Cloud computing  - competition law issuesCloud computing  - competition law issues
Cloud computing - competition law issues
 
Cloud computing - cooperating with law enforcement
Cloud computing - cooperating with law enforcementCloud computing - cooperating with law enforcement
Cloud computing - cooperating with law enforcement
 

Kürzlich hochgeladen

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 

Kürzlich hochgeladen (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 

Data protection in cloud computing - Data Protection Conference 2011

  • 1. Data Protection 2011 Data Protection in the Clouds Data Protection 2011 24 February 2011 Data Protection in the Clouds Kuan Hon Cloud Legal Project Centre for Commercial Law Studies, Queen Mary, University of London www.cloudlegal.ccls.qmul.ac.uk / w.k.hon@qmul.ac.uk Introduction Cloud Legal Project Cloud terms of service analysis paper Questions we will tackle today – What information in the cloud is regulated under data protection laws? Who is responsible for personal data? Where is personal data processed? Whose laws apply in a dispute? Kuan Hon
  • 2. Data Protection 2011 Data Protection in the Clouds Maturity - Gartner hype cycle Oct 2010 (as at Aug 2010) But first… what is cloud computing? • It usually involves the provision of scalable IT resources (data storage, application hosting, etc.) on demand, delivered via the internet • Cloud Legal Project definition: • Provides flexible, location-independent access to computing resources that are quickly and seamlessly allocated or released in response to demand. • Services (especially infrastructure) are abstracted and typically virtualised, generally being allocated from a pool shared as a fungible resource with other customers. • Charging, where present, is commonly on an access basis, often in proportion to the resources used. Kuan Hon
  • 3. Data Protection 2011 Data Protection in the Clouds Government cloud – some recent papers ENISA - Security and Resilience in Governmental Clouds http://www.enisa.europa.eu/act/rm/emerging- and-future-risk/deliverables/security-and-resilience-in- governmental-clouds - p.41ff on data protection UK - G-Cloud Report: Data Centre Strategy G-Cloud and The Applications Store for Government - Commercial Strategy Team http://www.computerweekly.com/Articles/2011/02/07/245 289/G-Cloud-Report-Data-Centre-Strategy-G-Cloud- and-The-Applications-Store-for-Government- Commercial.htm - ANNEX C: Data Protection, including consideration of the US Patriot Act Kuan Hon
  • 4. Data Protection 2011 Data Protection in the Clouds Key cloud computing concepts Virtualisation • Virtualisation = many things but in this context mainly involves multiple “virtual machines” running on shared hardware via the internet Kuan Hon
  • 5. Data Protection 2011 Data Protection in the Clouds Data centers Massive data centres are being built, often containing sealed shipping containers, themselves containing pre-configured servers: “The trucks back ’em in, rack ’em and stack ’em” (Ray Ozzie: Microsoft’s former Chief Software Architect) Huge requirements for power / cooling / connectivity Google has patented a “water-based data center” - a system that includes “a floating platform-mounted computer data center comprising a plurality of computing units, a sea-based electrical generator in electrical connection with the plurality of computing units, and one or more sea-water cooling units for providing cooling to the plurality of computing units.” Google’s “water-based data center” So just when we thought we had identified all the technical, commercial and legal risks associated with outsourcing and offshore data processing … …we have to tackle maritime law …and the risk of meeting real pirates on the high seas! Kuan Hon
  • 6. Data Protection 2011 Data Protection in the Clouds Types of service • Software as a Service (SaaS) (eg. Oracle CRM on demand; Gmail, Hotmail, Yahoo! Mail; Google Apps, Microsoft Office 365; Facebook, Flickr) • Infrastructure as a Service (IaaS) = delivery of servers, software, storage, etc as a fully outsourced service, typically billed on a utility computing basis (eg. Amazon Web Services, Rackspace) • Platform as a Service (PaaS) = web-based environment for developing and deploying applications (eg. Google App Engine, Microsoft Windows Azure or Force.com which provides a set of tools and applications for customising the Salesforce.com apps) • Storage as a Service (also SaaS!) = convenient way of storing / backing-up data online (eg. box.net) • NB ecosystem of players – hardware, software, support, consultancy… Possible architectures From http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-computing-v26.ppt Kuan Hon
  • 7. Data Protection 2011 Data Protection in the Clouds Deployment models: private, community, public and hybrid clouds… Data protection law issues Kuan Hon
  • 8. Data Protection 2011 Data Protection in the Clouds Key features for data protection law purposes Storage and processing May be split up and geographically-distributed (might in practice to be local(ish), for latency reasons - but might not…) Sharding – data may be fragmented a fragment may contain personal data (or it may not?) Data replication Data deletion Design and access – encrypted? Can provider access user’s account? Internal controls on such access? Multiple parties possible – transparency? Other – shared “multi-tenant” infrastructure, eg. running same application instance, sharing same database; reliance on provider Foundational issues What information in the clouds is regulated under data protection laws? (“personal data”) Who is responsible for personal data? Where is personal data processed? Whose laws apply in a dispute? Issues may differ for cloud users, cloud providers and data subjects Kuan Hon
  • 9. Data Protection 2011 Data Protection in the Clouds What is regulated - “personal data” in the clouds Not “personal data” = no data protection law restrictions Processing “anonymised” data in the cloud: By cloud user, after “anonymisation” eg. by aggregation By cloud provider – may be integral to business model Encrypted data – status? Key-coded data analogy. Pro Life Alliance; Craigdale. The “personal data” definition is critical – but insufficiently clear Anonymisation/encryption procedures – status? Source Informatics. Who is responsible for personal data in the cloud? Cloud user If data controller, remains data controller Cloud provider Metadata regarding cloud service usage, where cloud user is individual etc - provider is controller Personal data processed in the cloud by cloud user – what’s the provider’s status? o It depends on the facts! Advertising, sale… Kuan Hon
  • 10. Data Protection 2011 Data Protection in the Clouds Who is actually responsible for data in clouds? “...you acknowledge that you bear sole responsibility for adequate security, protection and backup of Your Content and Applications. We strongly encourage you, where available and appropriate, to (a) use encryption technology to protect Your Content from unauthorized access, (b) routinely archive Your Content, and (c) keep your Applications or any software that you use or run with our Services current with the latest security patches or updates. We will have no liability to you for any unauthorized access or use, corruption, deletion, destruction or loss of any of Your Content or Applications.” Q. Will that be good enough? A. It depends what the cloud user is going to use the service for (and how) Where is data stored - can you control where your data are stored in clouds? • It depends! • Some service providers can’t, for technical reasons, or won’t, for commercial reasons, let you choose • Other service providers are designing their clouds so as to offer customers a choice between ‘regions’ (eg. Amazon Web Services) • Other service providers, if asked, say they currently store customer data by default in the customer’s local region (eg. Decho Mozy Inc) • Geolocation may become a critical differentiator for customers concerned about where their data are stored (eg. because of disclosure risks associated with litigation or regulators) or subject to restrictions on data transfers (such as national rules based on Articles 25 + 26 of the DP Dir.) • An amorphous cloud may not be appropriate for regulated data, eg. if you don’t know where the data will be processed and by whom Kuan Hon
  • 11. Data Protection 2011 Data Protection in the Clouds But… should location of data really matter? With storage virtualisation & sharding – will seizing one server necessarily afford access to intelligible data…? In practice, what may be more important is: whether the system’s design allows the cloud provider to access user data (eg. by logging into their account), cf. full encryption (where provider has no access to decryption key), and who can effectively assert jurisdiction over the provider (eg. the location of the provider, rather than of its servers) What about disclosure of cloud users’ data to third parties? Would a cloud user feel more comfortable signing up to this… “The Receiving Party [Salesforce.com] may disclose Confidential Information of the Disclosing Party [the customer] if it is compelled by law to do so, provided the Receiving Party gives the Disclosing Party prior notice of such compelled disclosure (to the extent legally permitted) and reasonable assistance, at the Disclosing Party's cost, if the Disclosing Party wishes to contest the disclosure.” … or this? “You authorize ADrive to disclose any information about You to law enforcement or other government officials as ADrive, in its sole discretion, believes necessary, prudent or appropriate, in connection with an investigation of fraud, intellectual property infringement, or other activity that is illegal or may expose ADrive to legal liability.” Kuan Hon
  • 12. Data Protection 2011 Data Protection in the Clouds Whose laws apply if you have a cloud dispute? Choice of law specified by cloud provider… Number * US State: California (most common), Massachusetts (Akamai), 15 Washington (Amazon), Utah (Decho), Texas (The Planet) English law, probably because service provider based there 4 English law, for customers in Europe / EMEA 4 Other EU jurisdictions (for European customers): eg. Ireland (Apple), 2 Luxembourg (some Microsoft services) Scottish law (Flexiant) 1 The customer’s local law 2 No choice of law expressed or implied, or ambiguous choice 3 (eg. “UK Law” for g.ho.st) * Number in each category is out of 31 contracts analysed by QMUL Cloud Legal Project http://www.cloudlegal.ccls.qmul.ac.uk/ In practice Location, location, location In some situations, choose only provider that allows zoning? Contract procurement process? the provider “stack” Contract terms – standard (multiple sources); negotiate? Including: Exclusions/disclaimers Disclosure/monitoring Data location Encryption, encryption, encryption Simple scenarios only – storage o NB has provider access to key? (eg. for indexing/searching) If cloud applications run on data – data must be decrypted before they can be worked on, currently Kuan Hon
  • 13. Data Protection 2011 Data Protection in the Clouds Forthcoming papers Next few weeks – What data is regulated as “personal data” in cloud computing? Who is responsible for “personal data” in the cloud? Published - Information ownership in the cloud http://www.cloudlegal.ccls.qmul.ac.uk/Research/researchpapers/37187.html Cloud terms of service analysis http://www.cloudlegal.ccls.qmul.ac.uk/Research/researchpapers/37188.html Future – Law enforcement access (soon) International transfers of data Governance Thanks for listening! Any questions… Kuan Hon Cloud Legal Project, CCLS, Queen Mary, University of London w.k.hon@qmul.ac.uk www.cloudlegal.ccls.qmul.ac.uk (or http://bit.ly/cloudlegal) Kuan Hon

Hinweis der Redaktion

  1. ‘ Amazon Web Services Customer Agreement’ Clause 7.2, available online at http:// aws.amazon.com/agreement/