SlideShare a Scribd company logo
Privacy	
  in	
  the	
  Cloud	
  
Nessrine	
  Omrani,	
  Serge	
  Pajak	
  
RITM,	
  University	
  Paris	
  Sud	
  
Privacy	
  in	
  the	
  Cloud	
  
•  Research	
   part	
   of	
   a	
   PAIP	
   project,	
   funded	
   by	
   the	
   Paris-­‐Saclay	
  
Idex,	
  InsFtute	
  for	
  a	
  Digital	
  Society	
  
•  Interdisciplinary	
   approach:	
   Economics,	
   Law	
   and	
   Computer	
  
Science	
  
Internship	
  at	
  the	
  department,	
  Simon	
  Bouget	
  ENS	
  Rennes	
  
The	
  Services	
  We	
  Focus	
  On:	
  
Automated	
  services	
  for	
  remote	
  storage	
  
and/or	
  synchroniza6on	
  between	
  devices	
  	
  
	
  
•  Highly	
  ‘privacy-­‐relevant’	
  since	
  personal	
  data	
  are	
  stored	
  
remotely	
  
•  Aimed	
  at	
  the	
  general	
  public	
  
–  Remember	
  the	
  privacy	
  paradox:	
  people	
  say	
  they	
  care	
  about	
  privacy,	
  
but	
  act	
  as	
  if	
  they	
  do	
  not	
  
–  Privacy	
  charters	
  are	
  difficult	
  to	
  read	
  (and	
  are	
  hardly	
  read	
  at	
  all…)	
  
•  Goal:	
  classificaFon	
  of	
  cloud	
  services,	
  related	
  to	
  performance	
  
Cloud	
  services	
  
•  50	
  services	
  
– Digital	
  giants:	
  Google,	
  MicrosoZ,	
  …	
  
– Leaders	
  of	
  the	
  industry:	
  Dropbox,	
  Box.com,	
  …	
  
– Open-­‐source	
  projects:	
  Cozy,	
  Sparkleshare,	
  …	
  
Two	
  steps…	
  
•  Working	
  tools:	
  Terms	
  of	
  use	
  and	
  Privacy	
  terms	
  
of	
  the	
  cloud	
  services’	
  websites	
  	
  
•  Two	
  steps:	
  
1.  Defining	
  the	
  classificaFon	
  grid	
  	
  
2.  RelaFng	
  the	
  variables	
  of	
  interest	
  to	
  measure	
  of	
  
performance	
  or	
  other	
  topic	
  
ClassificaFon	
  grid	
  
•  The	
  reading	
  grid	
  includes	
  the	
  following	
  variables:	
  
–  Intellectual	
  property:	
  Is	
  informaFon	
  about	
  I.P.	
  included?	
  	
  
–  Usage	
  permission:	
  The	
  clarity	
  of	
  the	
  usage	
  permission	
  
–  Data	
  access:	
  Who	
  have	
  access	
  to	
  the	
  data?	
  
–  Data	
  diffusion:	
  To	
  whom	
  the	
  data	
  is	
  disseminated?	
  
–  Data	
  backup:	
  Is	
  the	
  data	
  retenFon	
  period	
  indicated?	
  
–  Warranty:	
  InformaFon	
  about	
  the	
  warranty’s	
  degree	
  
–  Liability:	
   The	
   degree	
   of	
   liability	
   regarding	
   the	
   services’	
  
content	
  
–  Cookies:	
   Is	
   there	
   informaFon	
   about	
   the	
   existence	
   of	
  
cookies?	
  
ClassificaFon	
  grid:	
  
technical	
  part	
  
Source:	
  Simon	
  Bouget,	
  Jan.	
  2014	
  
The	
  aim	
  of	
  this	
  
classificaFon	
  effort	
  
•  Giving	
   a	
   becer	
   understanding	
   of	
   the	
   Privacy	
  
sedngs	
  of	
  the	
  cloud	
  services	
  
•  Trying	
   to	
   provide	
   a	
   ‘Privacy	
   dicFonnary’	
   for	
  
cloud	
  services’	
  users	
  

More Related Content

What's hot

T closeness through microaggregation strict privacy with enhanced utility pre...
T closeness through microaggregation strict privacy with enhanced utility pre...T closeness through microaggregation strict privacy with enhanced utility pre...
T closeness through microaggregation strict privacy with enhanced utility pre...
LeMeniz Infotech
 
170131 tryggve-at ssi-biobanks-ap
170131 tryggve-at ssi-biobanks-ap170131 tryggve-at ssi-biobanks-ap
170131 tryggve-at ssi-biobanks-ap
anttipursula
 
Michael Enescu - Cloud + IoT at IEEE
Michael Enescu - Cloud + IoT at IEEEMichael Enescu - Cloud + IoT at IEEE
Michael Enescu - Cloud + IoT at IEEE
Michael Enescu
 
A Model to Enable Application-scoped Access Control as a Service for IoT Usin...
A Model to Enable Application-scoped Access Control as a Service for IoT Usin...A Model to Enable Application-scoped Access Control as a Service for IoT Usin...
A Model to Enable Application-scoped Access Control as a Service for IoT Usin...
Federico Fernández Moreno
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
ijcga
 
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
ijwscjournal
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
ijcga
 
Fog
FogFog
Bn31437444
Bn31437444Bn31437444
Bn31437444
IJERA Editor
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
ijcga
 
Cloud computing tp ny
Cloud computing tp nyCloud computing tp ny
Cloud computing tp ny
prekubatortto
 
secued cloud ppt
 secued cloud ppt secued cloud ppt
secued cloud ppt
Devyani Vaidya
 
Week13
Week13Week13
Week13
GroupB
 
Secued Cloud
 Secued  Cloud Secued  Cloud
Secued Cloud
Devyani Vaidya
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
Peter Wood
 
Braveheart Cloud Storage 2014 Student Showcase
Braveheart Cloud Storage 2014 Student ShowcaseBraveheart Cloud Storage 2014 Student Showcase
Braveheart Cloud Storage 2014 Student Showcase
Travis McAdams
 
Open Archive with Sun Microsystems and Symantec
Open Archive with Sun Microsystems and SymantecOpen Archive with Sun Microsystems and Symantec
Open Archive with Sun Microsystems and Symantec
Walter Moriconi
 
from data to artificial intelligence, from laboratory to industry
from data to artificial intelligence, from laboratory to industryfrom data to artificial intelligence, from laboratory to industry
from data to artificial intelligence, from laboratory to industry
Widy Widyawan
 
Call for Papers - International Conference on Big Data, Blockchain and Securi...
Call for Papers - International Conference on Big Data, Blockchain and Securi...Call for Papers - International Conference on Big Data, Blockchain and Securi...
Call for Papers - International Conference on Big Data, Blockchain and Securi...
IJNSA Journal
 
International Conference on Big Data, Blockchain and Security (BDBS 2020)
International Conference on Big Data, Blockchain and Security (BDBS 2020)International Conference on Big Data, Blockchain and Security (BDBS 2020)
International Conference on Big Data, Blockchain and Security (BDBS 2020)
IJDKP
 

What's hot (20)

T closeness through microaggregation strict privacy with enhanced utility pre...
T closeness through microaggregation strict privacy with enhanced utility pre...T closeness through microaggregation strict privacy with enhanced utility pre...
T closeness through microaggregation strict privacy with enhanced utility pre...
 
170131 tryggve-at ssi-biobanks-ap
170131 tryggve-at ssi-biobanks-ap170131 tryggve-at ssi-biobanks-ap
170131 tryggve-at ssi-biobanks-ap
 
Michael Enescu - Cloud + IoT at IEEE
Michael Enescu - Cloud + IoT at IEEEMichael Enescu - Cloud + IoT at IEEE
Michael Enescu - Cloud + IoT at IEEE
 
A Model to Enable Application-scoped Access Control as a Service for IoT Usin...
A Model to Enable Application-scoped Access Control as a Service for IoT Usin...A Model to Enable Application-scoped Access Control as a Service for IoT Usin...
A Model to Enable Application-scoped Access Control as a Service for IoT Usin...
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
 
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
 
Fog
FogFog
Fog
 
Bn31437444
Bn31437444Bn31437444
Bn31437444
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
 
Cloud computing tp ny
Cloud computing tp nyCloud computing tp ny
Cloud computing tp ny
 
secued cloud ppt
 secued cloud ppt secued cloud ppt
secued cloud ppt
 
Week13
Week13Week13
Week13
 
Secued Cloud
 Secued  Cloud Secued  Cloud
Secued Cloud
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
 
Braveheart Cloud Storage 2014 Student Showcase
Braveheart Cloud Storage 2014 Student ShowcaseBraveheart Cloud Storage 2014 Student Showcase
Braveheart Cloud Storage 2014 Student Showcase
 
Open Archive with Sun Microsystems and Symantec
Open Archive with Sun Microsystems and SymantecOpen Archive with Sun Microsystems and Symantec
Open Archive with Sun Microsystems and Symantec
 
from data to artificial intelligence, from laboratory to industry
from data to artificial intelligence, from laboratory to industryfrom data to artificial intelligence, from laboratory to industry
from data to artificial intelligence, from laboratory to industry
 
Call for Papers - International Conference on Big Data, Blockchain and Securi...
Call for Papers - International Conference on Big Data, Blockchain and Securi...Call for Papers - International Conference on Big Data, Blockchain and Securi...
Call for Papers - International Conference on Big Data, Blockchain and Securi...
 
International Conference on Big Data, Blockchain and Security (BDBS 2020)
International Conference on Big Data, Blockchain and Security (BDBS 2020)International Conference on Big Data, Blockchain and Security (BDBS 2020)
International Conference on Big Data, Blockchain and Security (BDBS 2020)
 

Viewers also liked

From Grid to Cloud: Economic Model Evolution and Policy Implications
From Grid to Cloud: Economic Model Evolution and Policy ImplicationsFrom Grid to Cloud: Economic Model Evolution and Policy Implications
From Grid to Cloud: Economic Model Evolution and Policy Implications
Thierry Rayna
 
Sjaak Brinkkemper: Visual Business Modeling Techniques for the Software Industry
Sjaak Brinkkemper: Visual Business Modeling Techniques for the Software IndustrySjaak Brinkkemper: Visual Business Modeling Techniques for the Software Industry
Sjaak Brinkkemper: Visual Business Modeling Techniques for the Software Industry
CBOD ANR project U-PSUD
 
Magdalena Balazinska: Data pricing and data license agreements
Magdalena Balazinska: Data pricing and data license agreementsMagdalena Balazinska: Data pricing and data license agreements
Magdalena Balazinska: Data pricing and data license agreements
CBOD ANR project U-PSUD
 
Adel Ben Youssef: Determinants of the adoption of cloud computing by tunisian...
Adel Ben Youssef: Determinants of the adoption of cloud computing by tunisian...Adel Ben Youssef: Determinants of the adoption of cloud computing by tunisian...
Adel Ben Youssef: Determinants of the adoption of cloud computing by tunisian...
CBOD ANR project U-PSUD
 
Lorraine Morgan: Factors affecting the adoption of cloud computing
Lorraine Morgan: Factors affecting the adoption of cloud computingLorraine Morgan: Factors affecting the adoption of cloud computing
Lorraine Morgan: Factors affecting the adoption of cloud computing
CBOD ANR project U-PSUD
 
Maurizio Naldi: Cloud computing modelling and adoption
Maurizio Naldi:  Cloud computing modelling and adoptionMaurizio Naldi:  Cloud computing modelling and adoption
Maurizio Naldi: Cloud computing modelling and adoption
CBOD ANR project U-PSUD
 
Sebatien Tran: Le SI et ses utilisatueurs…perspectives sur la stratégie; it d...
Sebatien Tran: Le SI et ses utilisatueurs…perspectives sur la stratégie; it d...Sebatien Tran: Le SI et ses utilisatueurs…perspectives sur la stratégie; it d...
Sebatien Tran: Le SI et ses utilisatueurs…perspectives sur la stratégie; it d...
CBOD ANR project U-PSUD
 
Nabil Sultan. The disruptive and democratizing credentials of cloud computing
Nabil Sultan. The disruptive and democratizing credentials of  cloud computingNabil Sultan. The disruptive and democratizing credentials of  cloud computing
Nabil Sultan. The disruptive and democratizing credentials of cloud computing
CBOD ANR project U-PSUD
 
Omar el sawy: Digital business models in networked abundance
Omar el sawy: Digital business models in networked abundanceOmar el sawy: Digital business models in networked abundance
Omar el sawy: Digital business models in networked abundance
CBOD ANR project U-PSUD
 
Cyril Bartolo: European Users’ recommendations for the success of Public Clou...
Cyril Bartolo: European Users’ recommendations for the success of Public Clou...Cyril Bartolo: European Users’ recommendations for the success of Public Clou...
Cyril Bartolo: European Users’ recommendations for the success of Public Clou...
CBOD ANR project U-PSUD
 
Victor Chang: Cloud computing business framework
Victor Chang: Cloud computing business frameworkVictor Chang: Cloud computing business framework
Victor Chang: Cloud computing business framework
CBOD ANR project U-PSUD
 
Margherita Pagani: Digital business strategy & value creation
Margherita Pagani: Digital business strategy & value creationMargherita Pagani: Digital business strategy & value creation
Margherita Pagani: Digital business strategy & value creation
CBOD ANR project U-PSUD
 

Viewers also liked (12)

From Grid to Cloud: Economic Model Evolution and Policy Implications
From Grid to Cloud: Economic Model Evolution and Policy ImplicationsFrom Grid to Cloud: Economic Model Evolution and Policy Implications
From Grid to Cloud: Economic Model Evolution and Policy Implications
 
Sjaak Brinkkemper: Visual Business Modeling Techniques for the Software Industry
Sjaak Brinkkemper: Visual Business Modeling Techniques for the Software IndustrySjaak Brinkkemper: Visual Business Modeling Techniques for the Software Industry
Sjaak Brinkkemper: Visual Business Modeling Techniques for the Software Industry
 
Magdalena Balazinska: Data pricing and data license agreements
Magdalena Balazinska: Data pricing and data license agreementsMagdalena Balazinska: Data pricing and data license agreements
Magdalena Balazinska: Data pricing and data license agreements
 
Adel Ben Youssef: Determinants of the adoption of cloud computing by tunisian...
Adel Ben Youssef: Determinants of the adoption of cloud computing by tunisian...Adel Ben Youssef: Determinants of the adoption of cloud computing by tunisian...
Adel Ben Youssef: Determinants of the adoption of cloud computing by tunisian...
 
Lorraine Morgan: Factors affecting the adoption of cloud computing
Lorraine Morgan: Factors affecting the adoption of cloud computingLorraine Morgan: Factors affecting the adoption of cloud computing
Lorraine Morgan: Factors affecting the adoption of cloud computing
 
Maurizio Naldi: Cloud computing modelling and adoption
Maurizio Naldi:  Cloud computing modelling and adoptionMaurizio Naldi:  Cloud computing modelling and adoption
Maurizio Naldi: Cloud computing modelling and adoption
 
Sebatien Tran: Le SI et ses utilisatueurs…perspectives sur la stratégie; it d...
Sebatien Tran: Le SI et ses utilisatueurs…perspectives sur la stratégie; it d...Sebatien Tran: Le SI et ses utilisatueurs…perspectives sur la stratégie; it d...
Sebatien Tran: Le SI et ses utilisatueurs…perspectives sur la stratégie; it d...
 
Nabil Sultan. The disruptive and democratizing credentials of cloud computing
Nabil Sultan. The disruptive and democratizing credentials of  cloud computingNabil Sultan. The disruptive and democratizing credentials of  cloud computing
Nabil Sultan. The disruptive and democratizing credentials of cloud computing
 
Omar el sawy: Digital business models in networked abundance
Omar el sawy: Digital business models in networked abundanceOmar el sawy: Digital business models in networked abundance
Omar el sawy: Digital business models in networked abundance
 
Cyril Bartolo: European Users’ recommendations for the success of Public Clou...
Cyril Bartolo: European Users’ recommendations for the success of Public Clou...Cyril Bartolo: European Users’ recommendations for the success of Public Clou...
Cyril Bartolo: European Users’ recommendations for the success of Public Clou...
 
Victor Chang: Cloud computing business framework
Victor Chang: Cloud computing business frameworkVictor Chang: Cloud computing business framework
Victor Chang: Cloud computing business framework
 
Margherita Pagani: Digital business strategy & value creation
Margherita Pagani: Digital business strategy & value creationMargherita Pagani: Digital business strategy & value creation
Margherita Pagani: Digital business strategy & value creation
 

Similar to Nessrine Omrani & Serge Pajak: Privacy in the cloud

Cloud security issues and concerns
Cloud security   issues and concernsCloud security   issues and concerns
Cloud security issues and concerns
Mrinal Baowaly
 
Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computing
Ahmed Nour
 
The National Archives cloud storage and digital preservation
The National Archives cloud storage and digital preservationThe National Archives cloud storage and digital preservation
The National Archives cloud storage and digital preservation
The-National-Archives
 
Adoption of Cloud Computing in Scientific Research
Adoption of Cloud Computing in Scientific ResearchAdoption of Cloud Computing in Scientific Research
Adoption of Cloud Computing in Scientific Research
Yehia El-khatib
 
privacy-preserving and content-protecting location based queries
privacy-preserving and content-protecting location based queriesprivacy-preserving and content-protecting location based queries
privacy-preserving and content-protecting location based queries
swathi78
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
IJCERT JOURNAL
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
GovCloud Network
 
The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think
Uni Systems S.M.S.A.
 
Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)
Zuhair Haroon khan
 
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
acemindia
 
Cloud and challenges isacakenya
Cloud and challenges   isacakenyaCloud and challenges   isacakenya
Cloud and challenges isacakenya
Tonny Omwansa
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
Mark Williams
 
The Cloud Security Landscape
The Cloud Security LandscapeThe Cloud Security Landscape
The Cloud Security Landscape
Peter Wood
 
The Science Cloud Users: Challenges and Needs
The Science Cloud Users: Challenges and NeedsThe Science Cloud Users: Challenges and Needs
The Science Cloud Users: Challenges and Needs
Helix Nebula The Science Cloud
 
Ijariie1196
Ijariie1196Ijariie1196
Ijariie1196
IJARIIE JOURNAL
 
Azure Brain: 4th paradigm, scientific discovery & (really) big data
Azure Brain: 4th paradigm, scientific discovery & (really) big dataAzure Brain: 4th paradigm, scientific discovery & (really) big data
Azure Brain: 4th paradigm, scientific discovery & (really) big data
Microsoft Technet France
 
3.pptx
3.pptx3.pptx
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
IRJET Journal
 
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
1crore projects
 
LDSS for mobile cloud
LDSS for mobile cloud  LDSS for mobile cloud
LDSS for mobile cloud
sreelekshmi kishna
 

Similar to Nessrine Omrani & Serge Pajak: Privacy in the cloud (20)

Cloud security issues and concerns
Cloud security   issues and concernsCloud security   issues and concerns
Cloud security issues and concerns
 
Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computing
 
The National Archives cloud storage and digital preservation
The National Archives cloud storage and digital preservationThe National Archives cloud storage and digital preservation
The National Archives cloud storage and digital preservation
 
Adoption of Cloud Computing in Scientific Research
Adoption of Cloud Computing in Scientific ResearchAdoption of Cloud Computing in Scientific Research
Adoption of Cloud Computing in Scientific Research
 
privacy-preserving and content-protecting location based queries
privacy-preserving and content-protecting location based queriesprivacy-preserving and content-protecting location based queries
privacy-preserving and content-protecting location based queries
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think
 
Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)
 
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
 
Cloud and challenges isacakenya
Cloud and challenges   isacakenyaCloud and challenges   isacakenya
Cloud and challenges isacakenya
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
The Cloud Security Landscape
The Cloud Security LandscapeThe Cloud Security Landscape
The Cloud Security Landscape
 
The Science Cloud Users: Challenges and Needs
The Science Cloud Users: Challenges and NeedsThe Science Cloud Users: Challenges and Needs
The Science Cloud Users: Challenges and Needs
 
Ijariie1196
Ijariie1196Ijariie1196
Ijariie1196
 
Azure Brain: 4th paradigm, scientific discovery & (really) big data
Azure Brain: 4th paradigm, scientific discovery & (really) big dataAzure Brain: 4th paradigm, scientific discovery & (really) big data
Azure Brain: 4th paradigm, scientific discovery & (really) big data
 
3.pptx
3.pptx3.pptx
3.pptx
 
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
 
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
 
LDSS for mobile cloud
LDSS for mobile cloud  LDSS for mobile cloud
LDSS for mobile cloud
 

Recently uploaded

Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......
SocioCosmos
 
HOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa CreditoHOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa Credito
ClarissaAlanoCredito
 
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
Febless Hernane
 
EASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANE
Febless Hernane
 
Surat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculumSurat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculum
digitalcourseshop4
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAMLORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
lorraineandreiamcidl
 
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
ryxqoswi
 
Project Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docxProject Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docx
zeqirielmedina8
 
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing AgencyThe Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
Digital Marketing Lab
 
Transform Your Presence Now!..............
Transform Your Presence Now!..............Transform Your Presence Now!..............
Transform Your Presence Now!..............
SocioCosmos
 
Lifecycle of a GME Trader: From Newbie to Diamond Hands
Lifecycle of a GME Trader: From Newbie to Diamond HandsLifecycle of a GME Trader: From Newbie to Diamond Hands
Lifecycle of a GME Trader: From Newbie to Diamond Hands
mediavestfzllc
 
HOW TO USE THREADS an Instagram App_ by Clarissa Credito
HOW TO USE THREADS an Instagram App_ by Clarissa CreditoHOW TO USE THREADS an Instagram App_ by Clarissa Credito
HOW TO USE THREADS an Instagram App_ by Clarissa Credito
ClarissaAlanoCredito
 
Dominate Reddit Discussions.............
Dominate Reddit Discussions.............Dominate Reddit Discussions.............
Dominate Reddit Discussions.............
SocioCosmos
 
HMS Facebook Stories All V1 06092024.docx
HMS Facebook Stories All V1 06092024.docxHMS Facebook Stories All V1 06092024.docx
HMS Facebook Stories All V1 06092024.docx
Charles Bayless
 

Recently uploaded (14)

Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......
 
HOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa CreditoHOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa Credito
 
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
 
EASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANE
 
Surat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculumSurat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculum
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAMLORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
 
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
 
Project Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docxProject Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docx
 
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing AgencyThe Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
 
Transform Your Presence Now!..............
Transform Your Presence Now!..............Transform Your Presence Now!..............
Transform Your Presence Now!..............
 
Lifecycle of a GME Trader: From Newbie to Diamond Hands
Lifecycle of a GME Trader: From Newbie to Diamond HandsLifecycle of a GME Trader: From Newbie to Diamond Hands
Lifecycle of a GME Trader: From Newbie to Diamond Hands
 
HOW TO USE THREADS an Instagram App_ by Clarissa Credito
HOW TO USE THREADS an Instagram App_ by Clarissa CreditoHOW TO USE THREADS an Instagram App_ by Clarissa Credito
HOW TO USE THREADS an Instagram App_ by Clarissa Credito
 
Dominate Reddit Discussions.............
Dominate Reddit Discussions.............Dominate Reddit Discussions.............
Dominate Reddit Discussions.............
 
HMS Facebook Stories All V1 06092024.docx
HMS Facebook Stories All V1 06092024.docxHMS Facebook Stories All V1 06092024.docx
HMS Facebook Stories All V1 06092024.docx
 

Nessrine Omrani & Serge Pajak: Privacy in the cloud

  • 1. Privacy  in  the  Cloud   Nessrine  Omrani,  Serge  Pajak   RITM,  University  Paris  Sud  
  • 2. Privacy  in  the  Cloud   •  Research   part   of   a   PAIP   project,   funded   by   the   Paris-­‐Saclay   Idex,  InsFtute  for  a  Digital  Society   •  Interdisciplinary   approach:   Economics,   Law   and   Computer   Science   Internship  at  the  department,  Simon  Bouget  ENS  Rennes  
  • 3. The  Services  We  Focus  On:   Automated  services  for  remote  storage   and/or  synchroniza6on  between  devices       •  Highly  ‘privacy-­‐relevant’  since  personal  data  are  stored   remotely   •  Aimed  at  the  general  public   –  Remember  the  privacy  paradox:  people  say  they  care  about  privacy,   but  act  as  if  they  do  not   –  Privacy  charters  are  difficult  to  read  (and  are  hardly  read  at  all…)   •  Goal:  classificaFon  of  cloud  services,  related  to  performance  
  • 4. Cloud  services   •  50  services   – Digital  giants:  Google,  MicrosoZ,  …   – Leaders  of  the  industry:  Dropbox,  Box.com,  …   – Open-­‐source  projects:  Cozy,  Sparkleshare,  …  
  • 5. Two  steps…   •  Working  tools:  Terms  of  use  and  Privacy  terms   of  the  cloud  services’  websites     •  Two  steps:   1.  Defining  the  classificaFon  grid     2.  RelaFng  the  variables  of  interest  to  measure  of   performance  or  other  topic  
  • 6. ClassificaFon  grid   •  The  reading  grid  includes  the  following  variables:   –  Intellectual  property:  Is  informaFon  about  I.P.  included?     –  Usage  permission:  The  clarity  of  the  usage  permission   –  Data  access:  Who  have  access  to  the  data?   –  Data  diffusion:  To  whom  the  data  is  disseminated?   –  Data  backup:  Is  the  data  retenFon  period  indicated?   –  Warranty:  InformaFon  about  the  warranty’s  degree   –  Liability:   The   degree   of   liability   regarding   the   services’   content   –  Cookies:   Is   there   informaFon   about   the   existence   of   cookies?  
  • 7. ClassificaFon  grid:   technical  part   Source:  Simon  Bouget,  Jan.  2014  
  • 8. The  aim  of  this   classificaFon  effort   •  Giving   a   becer   understanding   of   the   Privacy   sedngs  of  the  cloud  services   •  Trying   to   provide   a   ‘Privacy   dicFonnary’   for   cloud  services’  users