Pre-Proceedings of International Workshop on Trustworthiness, Accountability and Forensics in the Cloud (TAFC)

نویسنده

  • Colin J. Bennett
چکیده

The notion of “accountability” is a currently fashionable within the community of scholars, regulators and activists concerned with privacy and data protection. At one level, it has always been a central principle within these laws and policies, and is implicit if not explicit in every attempt to make organizations more responsible for the personal data they collect and process. At one level, there is nothing new. At another level, however, accountability has come to represent a distinct policy approach to the vexing problem of the regulation of international personal data processing, in the past termed “data exports” or “transborder data flows.” Over the last few years, the debate on international data protection has become somewhat polarized between those who would continue to support the EU approach, essentially a prohibition on transfers to countries which do not have an “adequate level” of data protection, and the “accountability approach” which focuses more on the protection afforded by individual data controllers. Scholars of public administration have spilled a lot of ink over the many meanings of the word “accountability.” However, there seems to be a consensus that the process must involve being called “to account” by some authority for one’s actions. Accountability implies a process of transparent interaction, in which an external body seeks answers and possible rectification. That external agent is presumed to have rights of authority over those who are accountable – including the rights to demand answers and impose sanctions if the organization’s “account” is not accurate or complete. If there is no possibility of external compulsion to change practices, there can be no accountability. Thus, there must be a common understanding of who is accountable, for what and to whom. The recent policy discussions about accountability and privacy protection, especially in the context of cloud computing, have not been precise with the result that the word has been expanded and distorted to serve a variety of political and economic interests. Nobody can be against “accountability” in the abstract. But when the concept becomes framed in political discourse, there are a number of questions that need to be raised about its meaning and its relationship to the central goal of protecting privacy. How policy problems get framed shapes how they will be resolved. In this talk, I first review briefly the history of trying to regulate international flows of personal data, with a view to understanding how the “accountability” approach arose. I then review some of the assumptions (implicit and explicit) upon which this current emphasis on accountability seems to be based, and with particular reference to another imprecise phenomenon – “cloud computing”.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Crime and Punishment in the Cloud

DIMACS/BIC/A4Cloud/CSA International Workshop on Trustworthiness, Accountability and Forensics in the Cloud (TAFC) 2013 Abstract. The goal of this work is to reason on the complexity of the relationship between three non-functional requirements in cloud computing; privacy, accountability, and transparency. We provide insights on the complexity of this relationship from the perspectives of end-u...

متن کامل

Staas Clouds Using the Open Cloud Forensics Model

The rapid adoption of cloud computing to meet storage and computation needs has changed the way computing services and resources are used. However, because of the black-box nature and multi-tenant usage models of clouds, existing digital forensics science cannot cope with current state-of-the-art cloud architectures. Because of the fundamental characteristics of such clouds, many assumptions of...

متن کامل

FECloud: A Trustworthy Forensics-Enabled Cloud Architecture

The rapid migration from traditional computing and storage model to the cloud model creates the necessity of supporting reliable forensics in the cloud. However, today’s cloud computing architectures often lack support for forensic investigations because many of the assumptions that are taken for granted in traditional digital forensics do not apply to clouds. Hence, the existing digital forens...

متن کامل

Computational Forensics, Third International Workshop, IWCF 2009, The Hague, The Netherlands, August 13-14, 2009. Proceedings

That's it, a book to wait for in this month. Even you have wanted for long time for releasing this book computational forensics third international workshop iwcf 2009 the hague the netherlands august 13 14 2009 proceedings lecture notes in computer science; you may not be able to get in some stress. Should you go around and seek fro the book until you really get it? Are you sure? Are you that f...

متن کامل

The Effects of On-the-job and Workshop Training Methods on Performance of Midwives in Report Writing

Background & aim: One of the most important professional duties of midwives is writing the reports, which considered as legal documents. Incomplete reports can resulted in misunderstanding and even lead to filing charges against midwives by the legal authorities. Therefore, this study aimed to investigate the effects of on-the-job training (OJT) and workshop training m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013