Technological threats to privacy are not limited to data protection. Social Network Applications (SNA) and ubiquitous computing or Ambient Intelligence face other privacy risks. The business model of SNA and the improvement of data mining allow social computation. SNA Regulation should then favor privacy-by design and Privacy Enhancing Technologies (PET). Default friendly-privacy policies should also be adopted. The data portability of the applications shifts SNA into a new field of ubiquitous computing. Therefore, the solutions of the Ambient Intelligence should be also analyzed in the context of SNA.
In today's increasingly digital world, data has become the lifeblood of the enterprise. It's critical to the future of any organisation and its volume continues to grow, with IDC predicting that the world will be creating 175 zettabytes of data a year by 2025. As it's Data Privacy Day, there's no better time to take a look into how enterprises are currently protecting their data. For many years there was a drought of innovation when it came to how data was protected, particularly when it came to the backup and recovery space. Then, along came cloud which, in many respects, demanded innovation.
The growth of cloud computing has led to a corresponding growth of user data stored on third party servers, while, at the same time, U.S. privacy law has significant limitations in the protection of aggregated data--precisely the type of much of cloud computing data. This position paper provides an overview of cloud computing and current privacy law, policies and practices, presenting ideas for modernizing privacy protection for cloud computing users, with the goal of instilling trust in the use of cloud computing and fostering further development of innovations in cloud computing applications.
As big data becomes increasingly pervasive and cloud computing utilization becomes the norm, the security and privacy of our systems and data becomes more critical with emerging security and privacy threats and challenges. This book presents a comprehensive view on how to advance security and privacy in big data, cloud computing, and their applications. Topics include cryptographic tools, SDN security, big data security in IoT, privacy preserving in big data, security architecture based on cyber kill chain, privacy-aware digital forensics, trustworthy computing, privacy verification based on machine learning, and chaos-based communication systems. This book is an essential reading for networking, computing, and communications professionals, researchers, students and engineers, working with big data and cloud computing.
Apple now lets users download any data the iPhone maker has collected on them. On Wednesday, Apple launched a dedicated privacy portal for US users that lets them request a copy of their data, correct any errors and pause or delete their Apple account. It follows the launch of a privacy portal for European users in May, as part of Apple's compliance with the new General Data Protection Regulation rules, which require firms to have a data portability tool, among other things to protect users and their data. In addition to US users, customers in Canada, Australia and New Zealand can also take advantage of the portal. Users can see and search through the data collected, which many include things like photos, iCloud data, calendar entries, documents, App Store purchases and a history of repairs on your devices, along with other information.