The cloud understanding the security, privacy and trust challenges

This report discusses how policy-makers might address the challenges and risks in respect of the security, privacy and trust aspects of cloud computing that could undermine the attainment of broader economic and societal objectives across Europe

Bibliographic Details
Main Author: Robinson, Neil
Corporate Author: European Commission Information Society DG.
Format: eBook
Language:English
Published: Santa Monica Rand 2011, 2011
Series:Technical report
Subjects:
Online Access:
Collection: JSTOR Open Access Books - Collection details see MPG.ReNa
LEADER 04999nam a2200493 u 4500
001 EB001842766
003 EBX01000000000000001006755
005 00000000000000.0
007 tu|||||||||||||||||||||
008 180730 r ||| eng
020 |z 9780833059604 
020 |a 9780833059604 
020 |a 9786613530806 
020 |a 0833059602 
020 |a 6613530808 
020 |a 9781280126949 
020 |a 9780833059604 
020 |a 1280126949 
050 4 |a QA76.585 
100 1 |a Robinson, Neil 
245 0 0 |a The cloud  |h Elektronische Ressource  |b understanding the security, privacy and trust challenges  |c Neil Robinson [and others] 
260 |a Santa Monica  |b Rand  |c 2011, 2011 
300 |a xii, 122 pages 
505 0 |a Executive summary -- Synthesis -- ch. 1: Introduction -- ch. 2: Definitions and drivers -- ch. 3: Understanding the implications for security, privacy and trust --ch. 4: Security, privacy and trust challenges stemming from thetechnological underpinnings of cloud computing -- ch. 5: Security, privacy and trust challenges inherent to the legal and regulatory aspects of cloud computing -- ch. 6: Putting it all together: key risks and operational challenges -- ch. 7: Case studies -- ch. 8: Gap analysis -- ch. 9: Solving the challenges: recommendations and actions -- ch. 10: Conclusions -- References -- Appendices 
505 0 |a 4.2 Can the distributed models of computation characteristic of grid technology adequately serve the availability and interoperability needs ofcloud computing?; 4.3 Current state-of-the-art web services may not be sufficient to establishinteroperability for identity management in the cloud; 4.4 Trustworthiness in service-orientated architectures (SOAs); 4.5 Will web application frameworks (APIs and SDKs) be credible inproviding trust across distributed environments?; 4.6 The fragility of current encryption approaches in the cloud context; 4.7 Concluding remarks 
505 0 |a Chapter 5: Security, privacy and trust challenges inherent to the legaland regulatory aspects of cloud computing; 5.1 Horizontal perspective: applicable law and jurisdiction; 5.2 Vertical issues: main applicable laws; 5.3 The will of the parties: contractual provisions; 5.4 Overcoming legal barriers: key tools; 5.5 Concluding remarks; Chapter 6: Putting it all together: key risks and operational challenges; 6.1 Summary of legal and technical issues; 6.2 Migrating to the cloud: the operational challenges; Chapter 7: Case studies; 7.1 Introduction; 7.2 Initial classification of case studies 
505 0 |a 7.3 Observations on case studies in practice; 7.4 Matrix of case study typology; 7.5 Case Study 1: the Danish National IT and Telecom Agency; 7.6 Case study 2: the City of Los Angeles; 7.7 Case study 3: EU eHealth provider; 7.8 Implications; Chapter8: Gap analysis; Chapter 9: Solving the challenges: recommendations and actions; 9.1 Introduction; 9.2 Recommendations; 9.3 Specific actions; Chapter 10: Conclusions; References; Appendices 
505 0 |a Cover; Title Page; Copyright; Preface; Acknowledgements; Contents; Glossary; Executive Summary; Synthesis; Defining cloud computing; Defining security, privacy and trust; Issues arising from the reviewed literature; Risk control frameworks; Operational challenges; Implications from case studies; Gap analysis; Solving the challenges: observations and recommendations; Conclusions; Methodology; Structure of the report; Chapter 1: Introduction; Chapter 2: Definitions and drivers; 2.1 Definitions of cloud computing; 2.2 What's pushing cloud take-up? 
505 0 |a 2.3 The economics of cloud computing: implications for security 2.4 Concluding remarks; Chapter 3: Understanding the implications for security, privacy and trust; 3.1 Defining security, privacy and trust; 3.2 Growing focus on security, privacy and trust concerns; 3.3 Identifying key issues and possible enablers for security, trust and privacy in the cloud; Chapter 4: Security, privacy and trust challenges stemming from thetechnological underpinnings of cloud computing; 4.1 The linchpin of trust: the hypervisor 
505 0 |a Includes bibliographical references 
653 |a Privacy, Right of 
653 |a LAW / Public 
653 |a COMPUTERS / Internet / Security 
653 |a LAW / Constitutional 
710 2 |a European Commission  |b Information Society DG. 
041 0 7 |a eng  |2 ISO 639-2 
989 |b ZDB-39-JOA  |a JSTOR Open Access Books 
490 0 |a Technical report 
500 |a "Sponsored by the European Commission Directorate General Information Society and Media." 
776 |z 9780833059581 
776 |z 0833059580 
856 4 0 |u https://www.jstor.org/stable/10.7249/tr933ec  |x Verlag  |3 Volltext 
082 0 |a 342.40858 
520 |a This report discusses how policy-makers might address the challenges and risks in respect of the security, privacy and trust aspects of cloud computing that could undermine the attainment of broader economic and societal objectives across Europe