Lost in the Cloud: Cloud. Storage, Privacy, and Suggestions for Protecting Users' Data

被引:0
|
作者
Johnson, Eric
机构
关键词
D O I
暂无
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
In the digital age, users store vast amounts of data often data considered to be private in the cloud. The privacy of this data is increasingly determined by the policies of the companies storing it. But how does the law currently protect that data from law enforcement? Do users maintain a reasonable expectation of privacy in the information they have uploaded to the cloud? And if so, can service providers' terms of service affect users' reasonable expectations of privacy? This Note answers those questions by examining the main legal protections relevant to data stored in the cloud: the Stored Communications Act and the Fourth Amendment. After analyzing these protections, this Note determines that data stored in the cloud may be protected by the Act. But more importantly, this Note analyzes the history of the third-party doctrine and determines that users do have a reasonable expectation of privacy in information stored in the cloud until the third-party doctrine is triggered. And this triggering can occur due to provider access pursuant to the terms of service. In light of these findings, this Note concludes by suggesting that providers implement standard, scope, and notice provisions in their privacy policies or terms of service in order to enhance the protection of user privacy while also providing reasonable means for providers to secure and maintain their networks.
引用
收藏
页码:867 / 909
页数:43
相关论文
共 50 条
  • [1] A Framework for Protecting Users' Privacy in Cloud
    Sodiya, Adesina S.
    Adegbuyi, B.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2016, 10 (04) : 33 - 43
  • [2] Protecting Location Privacy for Outsourced Spatial Data in Cloud Storage
    Tian, Feng
    Gui, Xiaolin
    An, Jian
    Yang, Pan
    Zhao, Jianqiang
    Zhang, Xuejun
    [J]. SCIENTIFIC WORLD JOURNAL, 2014,
  • [3] Data Security and Privacy in Cloud Storage
    Xinhua Dong
    Ruixuan Li
    Wanwan Zhou
    Dongjie Liao
    Shuoyi Zhao
    [J]. ZTE Communications, 2013, 11 (02) : 18 - 23
  • [4] Protecting the privacy and security of sensitive customer data in the cloud
    King, Nancy J.
    Raja, V. T.
    [J]. COMPUTER LAW & SECURITY REVIEW, 2012, 28 (03) : 308 - 319
  • [5] Protecting Users' Privacy in Healthcare Cloud Computing with APB-TTP
    Salih, Raed M.
    Lilien, Leszek T.
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATION WORKSHOPS (PERCOM WORKSHOPS), 2015, : 236 - 238
  • [6] Security and Privacy Implications of Cloud Computing - Lost in the Cloud
    Tchifilionova, Vassilka
    [J]. OPEN RESEARCH PROBLEMS IN NETWORK SECURITY, 2011, 6555 : 149 - 158
  • [7] A New Scheme for protecting the Privacy and Integrity of Spatial Data on the Cloud
    Ba-Hutair, Mohammed N.
    Kamel, Ibrahim
    [J]. 2016 IEEE SECOND INTERNATIONAL CONFERENCE ON MULTIMEDIA BIG DATA (BIGMM), 2016, : 394 - 397
  • [8] Protecting Data in Personal Cloud Storage with Security Classifications
    Yahya, Fara
    Walters, Robert J.
    Wills, Gary B.
    [J]. 2015 SCIENCE AND INFORMATION CONFERENCE (SAI), 2015, : 838 - 843
  • [9] On Protecting Data Storage in Mobile Cloud Computing Paradigm
    Abdalla, Al-kindy Athman
    Pathan, Al-Sakib Khan
    [J]. IETE TECHNICAL REVIEW, 2014, 31 (01) : 82 - 91
  • [10] Protecting location privacy in cloud services
    Kumar, Sarvesh
    Srivastava, Prabhat Kumar
    Pal, Atul Kumar
    Mishra, Vinay Priy
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (04): : 1053 - 1062