Pre-Proceedings of International Workshop on Trustworthiness, Accountability and Forensics in the Cloud (TAFC)
نویسنده
چکیده
The notion of “accountability” is a currently fashionable within the community of scholars, regulators and activists concerned with privacy and data protection. At one level, it has always been a central principle within these laws and policies, and is implicit if not explicit in every attempt to make organizations more responsible for the personal data they collect and process. At one level, there is nothing new. At another level, however, accountability has come to represent a distinct policy approach to the vexing problem of the regulation of international personal data processing, in the past termed “data exports” or “transborder data flows.” Over the last few years, the debate on international data protection has become somewhat polarized between those who would continue to support the EU approach, essentially a prohibition on transfers to countries which do not have an “adequate level” of data protection, and the “accountability approach” which focuses more on the protection afforded by individual data controllers. Scholars of public administration have spilled a lot of ink over the many meanings of the word “accountability.” However, there seems to be a consensus that the process must involve being called “to account” by some authority for one’s actions. Accountability implies a process of transparent interaction, in which an external body seeks answers and possible rectification. That external agent is presumed to have rights of authority over those who are accountable – including the rights to demand answers and impose sanctions if the organization’s “account” is not accurate or complete. If there is no possibility of external compulsion to change practices, there can be no accountability. Thus, there must be a common understanding of who is accountable, for what and to whom. The recent policy discussions about accountability and privacy protection, especially in the context of cloud computing, have not been precise with the result that the word has been expanded and distorted to serve a variety of political and economic interests. Nobody can be against “accountability” in the abstract. But when the concept becomes framed in political discourse, there are a number of questions that need to be raised about its meaning and its relationship to the central goal of protecting privacy. How policy problems get framed shapes how they will be resolved. In this talk, I first review briefly the history of trying to regulate international flows of personal data, with a view to understanding how the “accountability” approach arose. I then review some of the assumptions (implicit and explicit) upon which this current emphasis on accountability seems to be based, and with particular reference to another imprecise phenomenon – “cloud computing”.
منابع مشابه
Crime and Punishment in the Cloud
DIMACS/BIC/A4Cloud/CSA International Workshop on Trustworthiness, Accountability and Forensics in the Cloud (TAFC) 2013 Abstract. The goal of this work is to reason on the complexity of the relationship between three non-functional requirements in cloud computing; privacy, accountability, and transparency. We provide insights on the complexity of this relationship from the perspectives of end-u...
متن کاملStaas Clouds Using the Open Cloud Forensics Model
The rapid adoption of cloud computing to meet storage and computation needs has changed the way computing services and resources are used. However, because of the black-box nature and multi-tenant usage models of clouds, existing digital forensics science cannot cope with current state-of-the-art cloud architectures. Because of the fundamental characteristics of such clouds, many assumptions of...
متن کاملFECloud: A Trustworthy Forensics-Enabled Cloud Architecture
The rapid migration from traditional computing and storage model to the cloud model creates the necessity of supporting reliable forensics in the cloud. However, today’s cloud computing architectures often lack support for forensic investigations because many of the assumptions that are taken for granted in traditional digital forensics do not apply to clouds. Hence, the existing digital forens...
متن کاملComputational Forensics, Third International Workshop, IWCF 2009, The Hague, The Netherlands, August 13-14, 2009. Proceedings
That's it, a book to wait for in this month. Even you have wanted for long time for releasing this book computational forensics third international workshop iwcf 2009 the hague the netherlands august 13 14 2009 proceedings lecture notes in computer science; you may not be able to get in some stress. Should you go around and seek fro the book until you really get it? Are you sure? Are you that f...
متن کاملThe Effects of On-the-job and Workshop Training Methods on Performance of Midwives in Report Writing
Background & aim: One of the most important professional duties of midwives is writing the reports, which considered as legal documents. Incomplete reports can resulted in misunderstanding and even lead to filing charges against midwives by the legal authorities. Therefore, this study aimed to investigate the effects of on-the-job training (OJT) and workshop training m...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013