SlideShare une entreprise Scribd logo
1  sur  27
Privacy Considerations  in Cloud Computing Lewis Oleinick, CIPP/G Chief Privacy and FOIA Officer Defense Logistics Agency Emerging Privacy Issues
Disclaimer The views presented herein are my own and do not represent the views of DoD or the Defense Logistics Agency.
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object]
What is “cloud computing?” ,[object Object],[object Object]
What is “Cloud Computing?” Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential  characteristics,  three  service models , and four  deployment models . From:  http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-def-v15.doc
A Picture of “Cloud Computing”
3 Types of Cloud Computing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
4 Cloud Deployment Models* ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],* From Aug. 12, 2009 NIST presentation on “Effectively and Securely Using the Cloud Computing Paradigm,” by Peter Mell and Tim Grance on  http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-computing-v25.ppt
Risks for Each Deployment Model
Cost/Benefit of Cloud Computing Models
Privacy Policy Issues in the Cloud Data Security Privacy Act E-Gov’t Act (PIA) Breach Reporting International Privacy Law Federal Records Act
Some Technology Solutions for  Security in the Cloud * Encrypted Swap / No Swap Encrypted File Systems Encrypted Data Transit (In/Out) Secured, Fit for Purpose Machine Image *  Ideas From July 15, 2009 Nat’l Def. Univ Presentation on Cloud Computing Architectures by  Hal Stern , Vice President Global Systems Engineering, Sun Microsystems.
Tim O’Reilly on Personal Information “ The prospect of ‘my’ data disappearing or being unavailable is far more alarming than, for example, the disappearance of a service that merely hosts an aggregated view of data that is available elsewhere say Yahoo! search or Microsoft live maps.”
Possible Structures of a Public “Cloud” or, “Dude! Where is my Data?” What you think you are getting. What you may actually be getting. Trans-border data flow of personal information? To India, Malaysia or China?
Cloud Computing Examples ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Apps.gov: OMB/GSA One-Stop  Cloud Computing Store ,[object Object],[object Object],[object Object],[object Object],[object Object]
DOE - STAR Experiment ,[object Object],[object Object],[object Object],[object Object],[object Object]
Dept. of Interior Nat’l Business Center NBC’s Cloud Offerings include : Cloud Offering Description NBCGrid NBC’s IaaS offering. Will allow end-user provisioning of a variety of types of servers and operating systems through a single website. NBCGrid will provide technology-agnostic server hosting, with a variety of pricing models, including metered and pre-paid, based on the customer’s usage of RAM or CPU per hour. NBCFiles NBC’s Cloud storage offering. Allows variable storage capacity on a metered, pay-per-gigabyte price model. Multiple security tiers drive pricing. NBCApps ,[object Object],[object Object],[object Object],[object Object]
Army and Census use of SalesForce.com Agency / Application Use  Time to Implement  ,[object Object],[object Object],[object Object],[object Object],[object Object],3 months  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3 months
DoD DISA Cloud infrastructure ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],User Self-service
Washington Post - PaaS ,[object Object],[object Object],[object Object],[object Object]
GE use of Google Apps - SaaS ,[object Object],[object Object],[object Object],[object Object]
Password Cracking in the Cloud.  ,[object Object],[object Object],[object Object],# Characters in Password Cost to Crack Password in 1 Hour Eight-character password without special characters. $45 Eight-character password with 1 special character. $100,000 10-character complex password with special characters $10 million
Botnet controlled from Amazon Cloud ,[object Object],[object Object],[object Object],[object Object],[object Object]
Where is this all going? Data  Collection Web 2.0 Cloud Computing Logistics Info e-Discovery Where is privacy?
Take-aways ,[object Object],[object Object],[object Object],[object Object]
Lew Oleinick, CIPP/G Chief Privacy and FOIA Officer Defense Logistics Agency Questions

Contenu connexe

Tendances

Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computingiosrjce
 
Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...SlideTeam
 
cloud computing final year project
cloud computing final year projectcloud computing final year project
cloud computing final year projectAmeya Vashishth
 
Introduction to Cloud Computing and Security
Introduction to Cloud Computing and SecurityIntroduction to Cloud Computing and Security
Introduction to Cloud Computing and SecurityOran Epelbaum
 
Unit 1.4 working of cloud computing
Unit 1.4 working of cloud computingUnit 1.4 working of cloud computing
Unit 1.4 working of cloud computingeShikshak
 
Cloud Computing Documentation Report
Cloud Computing Documentation ReportCloud Computing Documentation Report
Cloud Computing Documentation ReportUsman Sait
 
Lecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud ComputingLecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud Computingragibhasan
 
Final Year IEEE Project 2013-2014 - Cloud Computing Project Title and Abstract
Final Year IEEE Project 2013-2014  - Cloud Computing Project Title and AbstractFinal Year IEEE Project 2013-2014  - Cloud Computing Project Title and Abstract
Final Year IEEE Project 2013-2014 - Cloud Computing Project Title and Abstractelysiumtechnologies
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issuesAleem Mohammed
 
Cloud computing Basics
Cloud computing BasicsCloud computing Basics
Cloud computing BasicsSagar Sane
 
Cloud Computing By Faisal Shehzad
Cloud Computing By Faisal ShehzadCloud Computing By Faisal Shehzad
Cloud Computing By Faisal ShehzadFaisal Shehzad
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
Disadvantages of Cloud Computing
Disadvantages of Cloud ComputingDisadvantages of Cloud Computing
Disadvantages of Cloud ComputingMaikel Mardjan
 
Cloud Computing Assignment 3
Cloud Computing Assignment 3Cloud Computing Assignment 3
Cloud Computing Assignment 3Gurpreet singh
 
Synopsis on cloud computing by Prashant upta
Synopsis on cloud computing by Prashant uptaSynopsis on cloud computing by Prashant upta
Synopsis on cloud computing by Prashant uptaPrashant Gupta
 

Tendances (20)

Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computing
 
Presentation on Cloud computing
Presentation on Cloud computingPresentation on Cloud computing
Presentation on Cloud computing
 
Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...
 
cloud computing final year project
cloud computing final year projectcloud computing final year project
cloud computing final year project
 
Introduction to Cloud Computing and Security
Introduction to Cloud Computing and SecurityIntroduction to Cloud Computing and Security
Introduction to Cloud Computing and Security
 
Unit 1.4 working of cloud computing
Unit 1.4 working of cloud computingUnit 1.4 working of cloud computing
Unit 1.4 working of cloud computing
 
Cloud Computing Documentation Report
Cloud Computing Documentation ReportCloud Computing Documentation Report
Cloud Computing Documentation Report
 
cloud computing basics
cloud computing basicscloud computing basics
cloud computing basics
 
Sla in cloud
Sla in cloudSla in cloud
Sla in cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Lecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud ComputingLecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud Computing
 
Final Year IEEE Project 2013-2014 - Cloud Computing Project Title and Abstract
Final Year IEEE Project 2013-2014  - Cloud Computing Project Title and AbstractFinal Year IEEE Project 2013-2014  - Cloud Computing Project Title and Abstract
Final Year IEEE Project 2013-2014 - Cloud Computing Project Title and Abstract
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing Basics
Cloud computing BasicsCloud computing Basics
Cloud computing Basics
 
Cloud Computing By Faisal Shehzad
Cloud Computing By Faisal ShehzadCloud Computing By Faisal Shehzad
Cloud Computing By Faisal Shehzad
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Disadvantages of Cloud Computing
Disadvantages of Cloud ComputingDisadvantages of Cloud Computing
Disadvantages of Cloud Computing
 
Cloud Computing Assignment 3
Cloud Computing Assignment 3Cloud Computing Assignment 3
Cloud Computing Assignment 3
 
Synopsis on cloud computing by Prashant upta
Synopsis on cloud computing by Prashant uptaSynopsis on cloud computing by Prashant upta
Synopsis on cloud computing by Prashant upta
 

En vedette

Ubiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy IssuesUbiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy IssuesHongseok Kim
 
Privacy issues in network environments
Privacy issues in network environmentsPrivacy issues in network environments
Privacy issues in network environmentsJosef Noll
 
open source software, open access and open transfer
open source software, open access and open transferopen source software, open access and open transfer
open source software, open access and open transferCaroline B Ncube
 
ICAB - ITA Chapter 1 class 4 - E Commerce & EDI
ICAB - ITA Chapter 1 class 4 - E Commerce & EDIICAB - ITA Chapter 1 class 4 - E Commerce & EDI
ICAB - ITA Chapter 1 class 4 - E Commerce & EDIMohammad Abdul Matin Emon
 
Network security & information security maintainence modified
Network security & information security maintainence modifiedNetwork security & information security maintainence modified
Network security & information security maintainence modifiedKeerthan Shetty
 
Electronic Transactions Law - Lecture 3: contracts
Electronic Transactions Law - Lecture 3: contractsElectronic Transactions Law - Lecture 3: contracts
Electronic Transactions Law - Lecture 3: contractsCaroline B Ncube
 
Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computingRam kumar
 
Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networkingBryan Tran
 
Data and Message Security
Data and Message SecurityData and Message Security
Data and Message SecurityNrapesh Shah
 
Security issues associated with big data in cloud
Security issues associated  with big data in cloudSecurity issues associated  with big data in cloud
Security issues associated with big data in cloudsornalathaNatarajan
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacyvinyas87
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & securitynadikari123
 
Types of electronic contracts
Types of electronic contractsTypes of electronic contracts
Types of electronic contractsVijay Dalmia
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7AfiqEfendy Zaen
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesPierluigi Paganini
 

En vedette (20)

Ubiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy IssuesUbiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy Issues
 
Edi new
Edi newEdi new
Edi new
 
Privacy issues in network environments
Privacy issues in network environmentsPrivacy issues in network environments
Privacy issues in network environments
 
open source software, open access and open transfer
open source software, open access and open transferopen source software, open access and open transfer
open source software, open access and open transfer
 
ICAB - ITA Chapter 1 class 4 - E Commerce & EDI
ICAB - ITA Chapter 1 class 4 - E Commerce & EDIICAB - ITA Chapter 1 class 4 - E Commerce & EDI
ICAB - ITA Chapter 1 class 4 - E Commerce & EDI
 
Electronic Contracts
Electronic ContractsElectronic Contracts
Electronic Contracts
 
Network security & information security maintainence modified
Network security & information security maintainence modifiedNetwork security & information security maintainence modified
Network security & information security maintainence modified
 
Electronic Transactions Law - Lecture 3: contracts
Electronic Transactions Law - Lecture 3: contractsElectronic Transactions Law - Lecture 3: contracts
Electronic Transactions Law - Lecture 3: contracts
 
E commerce & contracts
E commerce & contractsE commerce & contracts
E commerce & contracts
 
Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computing
 
Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networking
 
Data and Message Security
Data and Message SecurityData and Message Security
Data and Message Security
 
E contracts
E contractsE contracts
E contracts
 
Security issues associated with big data in cloud
Security issues associated  with big data in cloudSecurity issues associated  with big data in cloud
Security issues associated with big data in cloud
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
 
Types of electronic contracts
Types of electronic contractsTypes of electronic contracts
Types of electronic contracts
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 

Similaire à Privacy Issues of Cloud Computing in the Federal Sector

Similaire à Privacy Issues of Cloud Computing in the Federal Sector (20)

Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Sami-Cloud
Sami-CloudSami-Cloud
Sami-Cloud
 
Cloud Computing Essays
Cloud Computing EssaysCloud Computing Essays
Cloud Computing Essays
 
Cloud computing course and tutorials
Cloud computing course and tutorialsCloud computing course and tutorials
Cloud computing course and tutorials
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
ReactJS Test Questions Answers.pdf
ReactJS Test Questions Answers.pdfReactJS Test Questions Answers.pdf
ReactJS Test Questions Answers.pdf
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
云计算及其应用
云计算及其应用云计算及其应用
云计算及其应用
 
Cloud computing..
Cloud computing..Cloud computing..
Cloud computing..
 
Final
FinalFinal
Final
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing – An Overview
Cloud computing – An OverviewCloud computing – An Overview
Cloud computing – An Overview
 
CC01.pptx
CC01.pptxCC01.pptx
CC01.pptx
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
cloudcomputing(bashu).ppt
cloudcomputing(bashu).pptcloudcomputing(bashu).ppt
cloudcomputing(bashu).ppt
 
Cloud Computing: Overview and Examples
Cloud Computing: Overview and ExamplesCloud Computing: Overview and Examples
Cloud Computing: Overview and Examples
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud Computing Networks
Cloud Computing NetworksCloud Computing Networks
Cloud Computing Networks
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing Essay
Cloud Computing EssayCloud Computing Essay
Cloud Computing Essay
 

Dernier

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 

Dernier (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Privacy Issues of Cloud Computing in the Federal Sector

  • 1. Privacy Considerations in Cloud Computing Lewis Oleinick, CIPP/G Chief Privacy and FOIA Officer Defense Logistics Agency Emerging Privacy Issues
  • 2. Disclaimer The views presented herein are my own and do not represent the views of DoD or the Defense Logistics Agency.
  • 3.
  • 4.
  • 5. What is “Cloud Computing?” Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models , and four deployment models . From: http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-def-v15.doc
  • 6. A Picture of “Cloud Computing”
  • 7.
  • 8.
  • 9. Risks for Each Deployment Model
  • 10. Cost/Benefit of Cloud Computing Models
  • 11. Privacy Policy Issues in the Cloud Data Security Privacy Act E-Gov’t Act (PIA) Breach Reporting International Privacy Law Federal Records Act
  • 12. Some Technology Solutions for Security in the Cloud * Encrypted Swap / No Swap Encrypted File Systems Encrypted Data Transit (In/Out) Secured, Fit for Purpose Machine Image * Ideas From July 15, 2009 Nat’l Def. Univ Presentation on Cloud Computing Architectures by Hal Stern , Vice President Global Systems Engineering, Sun Microsystems.
  • 13. Tim O’Reilly on Personal Information “ The prospect of ‘my’ data disappearing or being unavailable is far more alarming than, for example, the disappearance of a service that merely hosts an aggregated view of data that is available elsewhere say Yahoo! search or Microsoft live maps.”
  • 14. Possible Structures of a Public “Cloud” or, “Dude! Where is my Data?” What you think you are getting. What you may actually be getting. Trans-border data flow of personal information? To India, Malaysia or China?
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. Where is this all going? Data Collection Web 2.0 Cloud Computing Logistics Info e-Discovery Where is privacy?
  • 26.
  • 27. Lew Oleinick, CIPP/G Chief Privacy and FOIA Officer Defense Logistics Agency Questions

Notes de l'éditeur

  1. One of the problems with “Cloud computing” is that the term itself means different things to different people. The reason for this confusion is that there are lots of different definitions for what “cloud computing” is. Here is the Wikipedia definition.
  2. Here is the NIST definition of “cloud computing.” My presentation’s notes contain the URL for it. For geeks, I think the first sentence of this definition is a pretty clear one for what constitutes “cloud computing.” We’ll discuss the delivery and deployment models later, but I want to touch on the “essential characteristics” of cloud computing. They are as follows: Essential Characteristics: On-demand self-service. Broad network access. Resource pooling. The provider’s computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. There is a sense of location independence in that the customer generally has no control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e.g., country, state, or datacenter). Rapid elasticity. Measured Service. From http://csrc.nist.gov/groups/SNS/cloud-computing/index.html
  3. For non-geeks, I think this is a better explanation.
  4. Tim O’Reilly, web-guru and coiner of the term “Web 2.0,” has defined 3 types of “cloud computing” Infrastructure as a Service – virtual machine instances Platform as a Service – this is where the virtual machine is hidden behind higher-level APIs Software as a Service – Google docs Mr. O’Reilly’s three “types” of cloud computing matches the NIST definitions three “delivery models.”
  5. The NIST Model has four (4) cloud Deployment Models Private cloud . The cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on premise or off premise. Community cloud . The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be managed by the organizations or a third party and may exist on premise or off premise. Public cloud . The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services. Hybrid cloud . The cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting).
  6. This great slide is from Dr. Ron Ritchey, at Booz Allen Hamilton, from a presentation he gave to NIST called “Governance Considerations for the Cloud,” at the October 2009 Security Content Automation Protocol (SCAP), 5th Annual IT Security Automation Conference Cloud Session entitled “ Using SCAP to Mitigate Risks in the Cloud ” It describes some of the risks for each of the NIST cloud deployment models.
  7. Graph from “Cloud Computing and the DoD CIO Storefront,” by Dan Risacher of the DoD CIO Enterprise Services and Integration Office, presented on Sep. 21, 2009 and available at slideshare.net. The way to read this graphic is that the upper-right quadrant (Dedicated Mission Capabilities) is the most costly and takes the longest to implement of all technologies. As you move down and to the left the costs decrease as does the time to complete the implement the project.
  8. Data security Cloud computing data centers consolidate multiple organizations -- become attractive targets for hackers. Federal Information Security Management Act (FISMA) (44 U.S.C. § 3502) – “Information Security” requirement on Gov’t and Contractors One key point that needs to be addressed in “cloud computing” – at least for Federal Gov’t activities -- is the Privacy Act nexus with FISMA. Specifically, the Privacy Act authorizes disclosure of PII “to those officers and employees of the agency which maintains the record who have a need for the record in the performance of their duties.” Without establishing specific access controls for information systems located in such shared workspaces, or “clouds,” it is not possible to ensure accurate tracking of who has had access to the PII and therefore it is not possible to state that only those “officers and employees of the agency” with a “need to know” have been provided access to those records. Therefore, an individual PIA should be conducted on each information system processing PII contained in such shared spaces or clouds. Privacy Act Cloud computing environs must comply with Privacy Act – (e)(10)’s requirements and its relation to access controls have been discussed above. Do cloud computing providers agree to use/not use data they host in compliance with the Privacy Act? How are the providers bound? TOS? Contract terms? E-Gov’t Act (PIA) Who should complete Privacy Impact Assessments for cloud environments? For Gov’t owned? Contracted? “Free”? Breach Reporting Who is responsible for providing PII breach reporting notifications? Credit monitoring? Which jurisdiction/domain is the provider in? International Privacy Law Data protection is a human right in EU and other Int’l Jurisdictions Directive 95/46/EC Federal Records Act Is the information in the cloud an official government record? Does it have a record retention policy covering it? These issues must be addressed in consultation with your Records Management Officer.
  9. Mr. O’Reilly’s quote sums up the public’s concerns with cloud computing “safety.” I think it could be expanded as summing up the public’s concerns with other “hidden” services such as Deep Packet Inspection, etc., where the “beneficiary” of the service has no understanding of the underlying technology’s threats, safeguards, or potential benefits.
  10. So, you want to implement a cloud computing initiative. What jurisdiction’s statutes, regulations, etc., apply? U.S.? E.U.? A.P.E.C.?
  11. There are already several examples of cloud computing being used in the Federal Gov’t, Private Sector, and by the “bad guys.” I hope to give you a flavor of these examples with short summaries in the following slides.
  12. Of note to Federal Agencies is OMB’s Pass-back Language requiring Federal Agencies to evaluate all new IT investments against cloud computing alternatives for the FY 11 budget submission and to evaluate all IT investments involving a significant change against cloud computing alternatives for the FY 12 budget submission. Of course, I have not actually seen OMB’s Pass-back Language, because to disclose that pass-back language would be against OMB policy.
  13. New simulation results were needed for a presentation. All computational resources were either committed or did not support the environment needed for STAR computations. Technology developed by the Nimbus team at the U.S. Dept. of Energy’s (DOE) Argonne National Lab, allowed the STAR researchers to dynamically provision virtual clusters on commercial cloud computers and run the additional computations just in time. With cloud computing, a 100-node STAR cluster can be online in minutes. In contrast, Grid resources available at sites not expressly dedicated to STAR can take months to configure. Overloaded STAR resources were elastically ‘extended’ by additional virtual clusters deployed on Amazon’s EC2. The run used more than 300 virtual nodes at a time to complete STAR computations just in time.
  14. LMS = Learning Management System DOI’s NBC is focused currently on it’s CPU and storage Infrastructure-as-a-Service offerings. It is developing Acquisition and HR Software-as-a-Service offerings. Their LMS would likely need to have a PIA and Privacy Act System of Records Notice.
  15. U.S. Army needed a tool to track potential recruits who visited its Army Experience Center -- a new, state-of-the-art recruiting facility that allows prospective recruits to undergo simulated experiences of an Army soldier in a casual and non-threatening environment. Recruiters required the ability to track potential recruits based on their preferences and activities at the Army Experience Center. The speed to implement of 3 months is the key on these two projects.
  16. Not only the good-guys are using the cloud to improve efficiency. This example is about how the bad-guys could use the cloud to enhance their attack sophistication.
  17. “ Web OS 2009” image from http://blogs.zdnet.com/Hinchcliffe While this is a great graphic, it is already way out of date. Looming on the horizon for Federal Agencies are: Electronic Document Management and E-Discovery issues associated with implementing NARA compliant Electronic Records Schedules. “ Users being users” -- working around rules to get their jobs done.  Collaborative tools coming online where the vendors have made the default setting for the collaborative space full access for everyone – typically a good thing for the private sector (perhaps), but not good when dealing with sensitive information such as PII or proprietary data.