The problem of 'personal data' in cloud computing: what information is regulated?-the cloud of unknowing

被引:30
作者
Hon, W. Kuan [1 ]
Millard, Christopher [1 ,2 ,3 ]
Walden, Ian [4 ]
机构
[1] CLP, London, England
[2] CCLS, Privacy & Informat Law, London, England
[3] Univ Oxford, Oxford Internet Inst, Oxford, England
[4] CCLS, Informat & Commun Law, London, England
关键词
D O I
10.1093/idpl/ipr018
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
Cloud computing service providers, even those based outside Europe, may become subject to the EU Data Protection Directive's extensive and complex regime purely through their customers' choices, of which they may have no knowledge or control. + This article considers the definition and application of the EU 'personal data' concept in the context of anonymization/pseudonymization, encryption, and data fragmentation in cloud computing. It argues that the 'personal data' definition should be based on the realistic risk of identification, and that applicability of data protection rules should be based on risk of harm and its likely severity. In particular, the status of encryption and anonymization/pseudonymization procedures should be clarified to promote their use as privacy-enhancing techniques, and data encrypted and secured to recognized standards should not be considered 'personal data' in the hands of those without access to the decryption key, such as many cloud computing providers. Unlike, for example, social networking sites, Infrastructure as a Service and Platform as a Service providers (and certain Software as a Service providers) offer no more than utility infrastructure services, and may not even know if information processed using their services is 'personal data' (hence, the 'cloud of unknowing'); so it seems inappropriate for such cloud infrastructure providers to become arbitrarily subject to EU data protection regulation due to their customers' choices.
引用
收藏
页码:211 / 228
页数:18
相关论文
共 46 条
  • [1] Anderson Ross, 2008, SECURITY ENG GUIDE B
  • [2] [Anonymous], 2009, ELECT ALCHEMY 1030
  • [3] [Anonymous], 2010, WINDOWS AZURE T 1111
  • [4] Baker Jennifer, 2011, NETWORKWORLD 0705
  • [5] Barroso LA, 2010, SYNTHESIS LECT COMPU, P16
  • [6] Blaze M., 1996, MINIMAL KEY LENGTHS
  • [7] Bradshaw S., 2010, 632010 QUEEN MARY SC
  • [8] Cameron Kim, 2010, IDENTITY WEBLOG 0703
  • [9] Carey Peter, 2009, DATA PROTECTION PRAC, P86
  • [10] Catteddu Daniele, 2009, CLOUD COMPUTING BENE, P55