Achieving Regulatory Compliance for Data Protection in the Cloud

被引:0
|
作者
Rivis, Mark [1 ]
Zhu, Shao Ying [1 ]
机构
[1] Univ Derby, Sch Comp & Math, Derby, England
关键词
cloud computing; data protection legislation; Data Protection Act 1998; homomorphic encryption; data privacy; symmetric encryption;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The advent of cloud computing has enabled organizations to take advantage of cost-effective, scalable and reliable computing platforms. However, entrusting data hosting to third parties has inherent risks. Where the data in question can be used to identify living individuals in the UK, the Data Protection Act 1998 (DPA) must be adhered to. In this case, adequate security controls must be in place to ensure privacy of the data. Transgressions may be met with severe penalties. This paper outlines the data controller's obligations under the DPA and, with respect to cloud computing, presents solutions for possible encryption schemes. Using traditional encryption can lead to key management challenges and limit the type of processing which the cloud service can fulfill. Improving on this, the evolving area of homomorphic encryption is presented which promises to enable useful processing of data whilst it is encrypted. Current approaches in this field have limited scope and an impractical processing overhead. We conclude that organizations must thoroughly evaluate and manage the risks associated with processing personal data in the cloud.
引用
收藏
页码:162 / 167
页数:6
相关论文
共 50 条
  • [1] Data protection and legal compliance in cloud computing
    Udo Helmbrecht
    [J]. Datenschutz und Datensicherheit - DuD, 2010, 34 (8) : 554 - 556
  • [2] Achieving Flexible and Self-Contained Data Protection in Cloud Computing
    Lang, Bo
    Wang, Jinmiao
    Liu, Yanxi
    [J]. IEEE ACCESS, 2017, 5 : 1510 - 1523
  • [3] Risk Management for Cloud Compliance with the EU General Data Protection Regulation
    Duncan, Bob
    Zhao, Yuan
    [J]. PROCEEDINGS 2018 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS), 2018, : 664 - 671
  • [4] Health-Care Security Strategies for Data Protection and Regulatory Compliance
    Kwon, Juhee
    Johnson, M. Eric
    [J]. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2013, 30 (02) : 41 - 65
  • [5] Data solutions for regulatory compliance
    Houlton, S
    [J]. MANUFACTURING CHEMIST, 2001, 72 (07): : 29 - 30
  • [6] LOCATION TECHNOLOGY APPLIED TO SCIENTIFIC RESEARCH: REGULATORY COMPLIANCE REGARDING THE PROTECTION OF PERSONAL DATA
    Campillo, Lorena Perez
    [J]. REVISTA DE DERECHO POLITICO, 2023, (117): : 311 - 340
  • [7] TOWARDS DATA PROTECTION COMPLIANCE
    Zannone, Nicola
    Petkovic, Milan
    Etalle, Sandro
    [J]. SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 213 - 216
  • [8] Achieving data privacy on hybrid cloud
    Huang, Xueli
    Du, Xiaojiang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3771 - 3781
  • [9] Practical Data Compliance for Cloud Storage
    Henze, Martin
    Matzutt, Roman
    Hiller, Jens
    Muehmer, Erik
    Ziegeldorf, Jan Henrik
    van der Giet, Johannes
    Wehrle, Klaus
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2017), 2017, : 252 - 258
  • [10] CHEMICAL-DATA FOR REGULATORY COMPLIANCE
    GREEN, MR
    [J]. ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 1993, 206 : 3 - CHAS