2. IS CLOUD MODEL
RELIABLE
CLOUD
COMPUTING
2
Reliability in cloud computing can mean different things to different people. For some,
the reliability of cloud computing is measured by the frequency of component failures
or cloud service downtimes; while, for others, cloud computing reliability is measured
by cost-efficiency, performance, and security.
The following factors describe how much cloud models are reliably.
Majority of cloud computing services are time tested.
Large and multiple data centers are used in cloud models.
There is service level agreement that require 99.99% better up-time.
Meet the quality of service (QoS) requirement in there agreement.
Open standards and open source software are used.
Accessible from every where and any time using internet connection.
3. LEGAL ISSUES
CLOUD
COMPUTING
3
These are major issues in Cloud Computing:
Privacy
Compliance
Security
Sustainability
Abuse
Higher cost
Recovery of lost data
Management of cloud
Lack of resources/skilled expertise
Pay per use service charges
4. LEGAL ISSUES
CLOUD
COMPUTING
4
Recently there have been some efforts to create and unify the legal
environment specific to the cloud. For example, the United States–
European Union Safe Harbor Act provides a seven-point framework
of requirements for U.S. companies that may use data from other
parts of the world, namely, the European Union. This framework
sets forth how companies can participate and certify their
compliance and is defined in detail on the U.S. Department of
Commerce and Federal Trade Commission web sites.
5. LEGAL ISSUES
CLOUD
COMPUTING
5
The following seven Safe Harbor Principles or has implemented its own privacy policies
that conform with these principles:
Notify individuals about the purposes for which information is collected and used.
Give individuals the choice of whether their information can be disclosed to a third
party.
Ensure that if it transfers personal information to a third party, that third party also
provides the same level of privacy protection.
Allow individuals access to their personal information.
Take reasonable security precautions to protect collected data from loss, misuse, or
disclosure.
Take reasonable steps to ensure the integrity of the data collected.
Have in place an adequate enforcement mechanism.