Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

PRIVACY REGULATION IN CLOUD

*Gagandeep Sodhi, **Milan Sharma


UID:*22MCC20175, **22MCC20042
*MCA – Cloud Computing & DevOps, UIC, Chandigarh University
Research Mentor: *Dr.Disha Handa
using cloud computing because of its
adaptability, scalability, and affordability.
Abstract The usage of cloud computing, however,
Today's world is dominated by cloud also prompts questions about the
computing, which has changed how security and privacy of data held there.
businesses run by giving them access to The necessity of regulating the privacy of
adaptable and affordable computer data kept in the cloud has come to light
resources. The usage of cloud more recently.
computing, however, also prompts Regulation of privacy in cloud
questions about the security and privacy computing:
of data held there. In this essay, we
discuss the numerous privacy laws that The many laws, rules, and standards that
apply to cloud computing and the control the gathering, use, and
difficulties that enterprises encounter in disclosure of personally identifiable
adhering to these laws. We also talk information kept in the cloud are
about some of the new developments in referred to as privacy regulation in cloud
privacy law and how they affect cloud computing. Protecting the privacy of
computing. people whose data is kept in the cloud is
the main focus of privacy regulation in
Keywords cloud computing. Cloud computing has a
Cloud Computing, Cloud Service number of privacy laws, including:
Provider, Public Cloud, Privacy  General Data Protection
Regulation Regulation (GDPR): On May 25,
2018, a European Union (EU)
Introduction
regulation known as the GDPR
With the help of the ground-breaking went into effect. The GDPR
technology known as cloud computing, restricts the gathering, use, and
users can now access computer disclosure of personal data with
resources through the internet without the intention of protecting the
the need for on-site hardware and privacy of EU people. No matter
software. Increasingly more people are where the organization is
situated, it must comply with the  Complexity: To guarantee
GDPR whenever it collects, uses, compliance with the cloud
or stores the personal data of EU computing industry's complicated
persons. privacy requirements, firms must
put in place particular
organizational and technical
 Consumer Privacy Act of safeguards.
California (CCPA): A California  Problems with Jurisdiction: The
state law called the CCPA went location of the company, the
into force on January 1st, 2020. location of the data's storage,
The CCPA limits the gathering, and the location of the data
use, and dissemination of subject all affect how privacy
personal information about laws in cloud computing apply.
California residents in order to
 Limits of Cloud Service Providers
safeguard their privacy. No
(CSPs): CSPs may have
matter where an organization is
restrictions on the kinds of data
located, it must comply with the
they can store as well as
CCPA if it collects, uses, or stores
restrictions on where they can
personal data of California
store that data.
residents.
New Developments in Privacy
 Health Insurance Portability and Law:
Accountability Act (HIPAA):
HIPAA is a US federal legislation
 Global privacy regulation, which
that controls how protected
tries to unify privacy rules across
health information (PHI) about
several jurisdictions, is a
individuals is collected, used, and
movement that is becoming
disclosed. Health plans,
more prevalent. The GDPR, which
healthcare clearinghouses, and
is applicable to all businesses that
healthcare providers who keep
keep the personal data of EU
PHI are all subject to HIPAA
people regardless of where the
regulations.
business is situated, reflects this
tendency.
Compliance with Privacy Rules
 Privacy by Design is a design
Challenges:
strategy that aims to integrate
privacy concerns into the
Organizations may find it difficult
creation of systems, goods, and
to comply with privacy laws while
services. The GDPR, which
using cloud computing for a
mandates that businesses
number of reasons:
incorporate privacy by design
principles, reflects this emerging Organizations" The General Data
trend in privacy law. Protection Regulation (GDPR) and
 Data localization: The act of healthcare organizations in the
storing data locally is referred to United States are discussed in
as data localization. this study, with an emphasis on
the difficulties of compliance and
the potential advantages for
Literature Review patients.

A wide range of legal, technical, and


moral concerns with the gathering, use, iv. (2018) author Natasha Singer's
and disclosure of personal information "The Cambridge Analytica
are covered by the topic of privacy Scandal, in 3 Paragraphs" An
regulation. The number and scope of overview of the Cambridge
privacy legislation have significantly Analytica controversy, which
increased in recent years, largely as a exposed the ways in which
result of worries about data breaches, personal information can be used
identity theft, and other privacy crimes. for
i. Daniel J. Solove (2006) wrote political gain, is given in this New
"The Development of Privacy York Times article.
Law: A Personal Perspective": The
history of privacy law in the v. Jens Grossklags and Alessandro
United States is briefly discussed Acquisti's "Privacy by Design: A
in this essay, which also makes Counterfactual Analysis of Google
the case that the current and Facebook Privacy Incidents"
regulatory system is unable to (2011): This essay examines the
handle the problems brought on idea of "privacy by design," which
by contemporary technology. emphasizes the value of
incorporating privacy safeguards
into technology at the outset as
ii. Samuel D. Warren and Louis D. opposed to depending on
Brandeis' "The Right to Privacy" corrective measures after the
(1890): The legal foundation for fact.
the right to privacy in the United
States was established by this vi. Avi Goldfarb and Catherine
seminal piece of literature. Tucker's "Privacy Regulation and
Online Advertising" (2011): This
iii. By Daniel Fabbri et al. (2018): study looks at how privacy
"The GDPR and Its Potential regulations affect internet
Impact on U.S. Healthcare advertising. It makes the case
that, despite privacy concerns
having the potential to reduce of artificial intelligence,
the efficiency of targeted emphasizing the need for a
advertising, customers can still thoughtful strategy that respects
benefit from improved openness individual privacy without limiting
and control over their personal innovation.
data.
Overall, these papers and articles
vii. By Eleonora L. Sanzaro and offer a variety of viewpoints on
Pierluigi Stefanini (2018), "Data privacy legislation, illustrating
Protection and Privacy: The both the advantages and
European Regulation, the Italian difficulties of legal frameworks
Implementation, and the Impact for safeguarding private data in
on the Healthcare Sector": This the digital world.
study investigates the effects of
the GDPR on the Italian
healthcare industry, emphasizing
both the difficulties in putting the
rule into practice and the
possible advantages for patients.

viii. By Jason Shao and Edward


Santow, "The Impact of Data
Protection Regulation on Artificial
Intelligence" (2019): This study
examines how data protection
laws affect the creation and use

Here is a Table of 11 Quick Literature Surveys

Title of Paper and Methodology Input Parameters Findings of the


Authors Used Study
V. Privacy after Legal analysis of the GLBA, FTC guidelines The author
GLBA [1] Gramm-Leach- provides an analysis
Bliley Act and FTC of how the Gramm-
guidelines Leach-Bliley Act and
the FTC Fair
Information
Practice Principles
impact online
transactions and
suggests ways to
reconcile the two
regulations.
Above the Clouds Literature review Cloud computing The authors
[2] and case study provide an
analysis overview of cloud
computing and its
benefits and
challenges, as well
as a case study of
the Google cluster
architecture. They
also discuss the
research challenges
and opportunities
in the field.
A Gift of Fire [3] Literature review Ethics, law The author
and ethical analysis discusses various
ethical, legal, and
social issues related
to computing and
the internet, such
as privacy,
intellectual
property, and
freedom of speech.
She provides
examples of real-
world scenarios to
illustrate the
complexity of these
issues and
encourages readers
to think critically
about them.
Internet Privacy Comparative legal Privacy laws The authors
Law [4] analysis compare the
privacy laws and
regulations in the
United States and
the European Union
and highlight the
key similarities and
differences. They
discuss the
implications of
these differences
for businesses and
individuals who
operate in both
regions.
Binding Corporate Case study analysis Binding corporate The authors analyze
Rules for Cross- and legal review rules the binding
Border Data corporate rules
Transfer [5] (BCRs) that
companies can use
to transfer personal
data across
borders. They
provide a case
study of a
multinational
company that
implements BCRs
and discuss the
benefits and
challenges of this
approach.
The EU Data Legal analysis and EU Data Protection The author
Protection Directive historical review provides a historical
[6] overview of the
development of the
EU Data Protection
Directive and its
impact on privacy
laws and
regulations in
Europe and
beyond. He
discusses the
challenges of
implementing the
directive and the
potential benefits
of a global privacy
regime.
Conclusion preserving the security and privacy of
individual data by cooperating.
In the last several years, the issue of
privacy laws in relation to cloud References
computing has drawn a lot of attention.
[1]D. Annecharico, "Notes & Comments:
Cloud computing has several advantages,
V. Privacy after GLBA: Online
including scalability and cost-
Transactions: Squaring the Gramm-
effectiveness, but it also poses a variety
Leach-Bliley Act Privacy Provisions With
of privacy issues, such as the possibility
the FTC Fair Information Practice
of data breaches, unauthorized access to
Principles." 637–695 in North Carolina
personal information, and a lack of
Banking Institute 6, 2002.
transparency and control over data.
[2]In addition to M. Armbrust, other
The challenges of compliance and
authors include A. Fox, R. Griffith, A.
enforcement, as well as the technical
Joseph, R. Katz, A. Konwinski, G. Lee, D.
and organizational steps that can be
Patterson, A. Rabkin, I. Stoica, and
taken to protect personal information in
others. The title of the article is "Above
the cloud, have all been the subject of
the clouds: A Berkeley view of cloud
research on privacy regulation in cloud
computing." University of California,
computing. Overall, the body of research
Berkeley, EECS Department, Technical
indicates that while privacy law is a
Report UCB/EECS-2009-28, 2009.
crucial tool for safeguarding individual
data in the cloud, it is not a magic fix. [3]In A Gift of Fire: Social, Legal, and
The specific problems that cloud Ethical Issues for Computing and the
computing presents must be addressed Internet, S. Baase discuss these issues.
through regulatory frameworks, 2007; Prentice Hall.
including concerns about data
[4]Internet Privacy Law: A Comparison
ownership, access, and management. To
between the United States and the
guarantee that personal information is
European Union, D. Baumer, J. Earp, and
safeguarded throughout its lifespan in
J. Poindexter. 400–412 in Computers &
the cloud, organizational and technical
Security 23, 5 (2004).
precautions must also be adopted.
[5]D. Bender and L. Ponemon, "Binding
Going forward, it will be crucial for
Corporate Rules for Cross-Border Data
academics and politicians to keep
Transfer." (2006) Rutgers Journal of Law
investigating fresh ideas for cloud
and Public Policy
privacy legislation, keeping in mind how
cloud computing is developing and how [6]M. Birnhack, "The EU Data Protection
the legal environment is shifting. Directive: An Engine of a Global
Stakeholders can guarantee that cloud Regime." Journal of Computer Law and
computing continues to provide its Security 24, no. 6 (2008).
numerous advantages while also

You might also like