Privacy in Cloud Computing ITU Workshop on Vijay Mauree, Programme Coordinator, TSB,

advertisement
ITU Workshop on “Cloud Computing”
(Tunis, Tunisia, 18-19 June 2012)
Privacy in Cloud Computing
Vijay Mauree,
Programme Coordinator, TSB,
ITU
vijay.mauree@itu.int
Tunis, Tunisia, 18-19 June 2012
Agenda
Cloud Computing Challenges
What is privacy?
What is the data lifecycle?
Key privacy concerns
Privacy by design and PETs
Conclusions
Tunis, Tunisia, 18-19 June 2012
2
Privacy in Cloud Computing
ITU Technology Watch
Report – March 2012
Jointly with Stéphane
Guilloteau, France Telecom
Orange
The report
Surveys privacy issues in cloud
computing and best practices
to meet legal and regulatory
obligations.
Standardization activities
ongoing at international level
Tunis, Tunisia, 18-19 June 2012
3
Cloud Computing Challenges
The cloud is like a big black box, nothing inside
the cloud is visible to the clients
Data in the cloud are easier to manipulate
There could be malicious system admins who can
violate confidentiality and integrity
Clouds are still subject to traditional data
confidentiality, integrity, availability, and privacy
issues, plus some additional attacks
Tunis, Tunisia, 18-19 June 2012
4
Cloud Computing Challenges
Can cloud providers be trusted?
Are cloud servers reliable?
What happens if data get lost?
What about privacy?
Is it easy to switch to another cloud provider?
Tunis, Tunisia, 18-19 June 2012
5
Impact of cloud computing on the
governance structure of IT
organizations
Tunis, Tunisia, 18-19 June 2012
6
What is Privacy?
The concept of privacy varies widely among (and
sometimes within) countries, cultures, and
jurisdictions.
It is shaped by public expectations and legal
interpretations; as such, a concise definition is elusive
if not impossible.
No universally binding legislation covering all
countries
Europe and United States
Privacy
Right to self determination, i.e right of individuals to ‘know
what is known about them’
Be aware what information is stored about them, control how
information is communicated and prevent its abuse.
It is more than just confidentiality of information
7
What is Privacy?
Privacy rights or obligations are related to the
collection, use, disclosure, storage, and destruction of
personal data (or Personally Identifiable Information—
PII).
At the end of the day, privacy is about the
accountability of organizations to data subjects, as
well as the transparency to an organization’s practice
around personal information.
8
What is the data life cycle?
• Personal information should be
managed as part of the data used
by the organization
• Protection of personal
information should consider the
impact of the cloud on each phase
9
What Are the Key Privacy Concerns?
Typically mix security and privacy
Some considerations to be aware of:
Storage
Retention
Destruction
Auditing, monitoring and risk management
Privacy Breaches
Who is responsible for protecting privacy?
10
What Are the Key Privacy Concerns?
Data integrity and availability are essential
elements in the provision of cloud computing
services.
Article 17 EU Data Protection Directive
The controller and its processors must implement
technical and organizational measures to protect
personal data against accidental or unlawful
destruction or accidental loss, alteration,
unauthorized disclosure or access; having regard
to the state of the art and the cost of their
implementation, such measures must ensure a
level of security appropriate to the risks
represented by the processing and the nature of
the data to be protected
11
Example
Odense Municipality Case
use Google Apps within the school system
Danish Data Protection Agency rejected the
municipality plan to use Google Apps
The municipality does not know where the data are
physically located.
It is unclear how the following requirements of the
Danish Data Protection Act will be met:
Deletion of data so that it cannot be recreated.
Transmission and login: the municipality has not
made clear whether encryption will be used when
transferring data between the various data centres.
No information has been provided about what data
are logged or how long the log is stored.
Tunis, Tunisia, 18-19 June 2012
12
What Are the Key Privacy Concerns?
Cloud Deployment Models
Service as a Service (SaaS)
Platform as a Service (PaaS)
Infrastructure as a Service (IaaS)
SaaS
Customer has no influence over input data is processed
Customer can decide if personal data will be input
Customer can secure personal data before it is sent to
the SaaS.
PaaS
Provides tools supported by a cloud provider for
developers to deploy applications
Responsibility lies with the developer to use best
practices and privacy friendly tools
Developer relies on the trustworthiness of the PaaS
13
What Are the Key Privacy Concerns?
IaaS
Provides customer with computing resources to run
applications
IaaS provider will secure data centres, network and also
ensure employees and procedures comply with
applicable laws and procedures
IaaS provider will not provide data-level compliance e.g
geographic restriction of data transfers.
Responsibility lies with the cloud user to maintain
compliance controls
E.g if the IaaS is based on virtualization, it should be
possible for the user to express that IaaS provider
should migrate the virtual machines from EU based data
centres to US based data centres.
14
The Madrid Resolution
Madrid Resolution (2009) approved by data
protection authorities of 50 countries
Framework for international standards on privacy
and data protection
Defines a set of principles and rights
for protecting privacy with regards to processing of
personal data and
Facilitate international flow of personal data
Encourages countries to implement proactive
measures to promote better compliance with data
protection laws and adapt information systems
for processing of personal data
15
Privacy By Design
EU review of Data Protection Directive in 2011
Principle of privacy by design
Implement privacy enhancing technologies (PETs)
Privacy by default settings
EU rules must apply if personal data is handled abroad
by companies active in EU market
Privacy by design binding for
Data controllers
Developers
Business partners
Need for standardized privacy protection
measures
Tunis, Tunisia, 18-19 June 2012
16
Privacy By Design
7 principles
Data minimization
Controllability
Transparency
User friendly systems
Data confidentiality
Data quality
Use limitation
Tunis, Tunisia, 18-19 June 2012
17
Privacy By Design
Data Flow Table
Type of data
Persons entitled to process personal data
Operating platform
Processing application
Purpose of data processing
Protection mode
Storage lifetime and disposal measure
Data recipients
Indicate destination country if data is
transferred outside the country.
Tunis, Tunisia, 18-19 June 2012
18
PETs
No common definition for PETs.
Main characteristics
Reduce the risk of breaching privacy principles
Minimize amount of data held about people
Allow individuals to retain control of information about
themselves
Includes
Opacity tools e.g encryption, anonymization
Transparency enhancing tools which provides users with
information about privacy policies or granting them
online access to their personal data.
Tunis, Tunisia, 18-19 June 2012
19
PETs
Data life cycle
Privacy principles
Collection/Generation Proportionality and
purpose specification
Privacy protection
measures
Examples of PETs
and ICT standards
Data minimization
Anonymous
communication
Anonymous
credential
Group and blind
signatures
ISO/IEC JTC1/SC27
WG2 and WG5
Storage
Sharing and
processing
Deletion
Accountability,
Security measures
Sensitive data
Lawfulness and
fairness, consent,
right of access
Openness, right to
delete
Confidentiality
Encryption
AES NIST (FIPS 197)
Data access control
Privacy dashboard
Confidentiality
OASIS XACML, ITU-T
X.1142
Deletion
Anonymization
protocol
Hash functions
Tunis, Tunisia, 18-19 June 2012
20
Conclusions
Privacy concerns are increasingly important
Privacy issues are different depending on cloud
deployment model used
Madrid Resolution provides an international
framework for privacy standards
A security risk assessment is essential before
switching to cloud based environment.
Embedding privacy by design and PETs for cloud
services is strongly supported by Data Protection
Authorities.
Privacy by design and PETs will play an important
role in cloud services
Tunis, Tunisia, 18-19 June 2012
21
Download