Privacy in Cloud Computing
Table of contents
I. Introduction
2. Cloud computing paradigm and privacy
3. Challenges to privacy in cloud computing
3.1 Complexity of risk assessment
3.2 Emergence of new business models and implications for consumer privacy
3.3 Regulatory compliance
4. Privacy by design
5. Using PETs to implement privacy by design
5.1 Description of data processing flows
5.2 Using PETs
6. Standardization activities
6.1 International Telecommunication Union (ITU)
6.2 International Organization for Standardization (ISO)
6.3 Organization for the Advancement of Structured Information Standards (OASIS)
6.4 Cloud Security Alliance (CSA)
7. Conclusion
Bibliography