Thursday, December 23, 2010

Weak current College】 【cloud computing endanger personal data privacy.

<br> According to a recent report said that, if the enterprise expectations through the use of cloud computing services to lower it costs and complexity, so first of all should ensure that this process will not create any potential privacy issues. <br> < .br> In the cloud computing concept, the computer is no longer a number of separate machine and is one of the nodes in the network and the network itself will be the computer. This will calculate the task to run Server network in the world, offers .a variety of convenient services, inevitable is the need to provide more detailed personal information, in order to achieve better service; but on the other hand, more and more personal information publicly available, makes human no privacy at all. The personal data lost is .primarily in three respects. <br> <br> 1, government agencies, and public service organizations to publish data containing personal information <br> <br> More and more personal information data is the Government institutions, and public service announcements. If you .do not have a credible privacy policy, then an attacker will use multiple data linkages to obtain personal information. For example, from specifically for government employees health insurance institution acquires medical information, from the agency responsible for the election to obtain voter information. The medical .information can be considered anonymous because not only the patient's name and logo information. When the attacker to medical information and voter information combined, by date of birth, zip code, gender of the match, you can attach a voter names and diseases linked to the .very privacy of personal information. This is personal data loss is one of the main ways. <br> <br> 2. password disclosure issues raised privacy lost <br> <br> Users use cloud computing online storage features, including documents, images .and other files related to trade secrets, privacy, such as multiple rights, once these files are stored in the cloud is the server side, with the ultimate protector of the actual line to a password. If the user's password is stolen, you may place .the trade secret theft, privacy, and other significant issues. exposure In the present network news, because the password is compromised, or theft of cases heard, if the cloud computing era, similar problems may occur with probability will significantly increase. <br> .<br> 3, handheld devices, at the request of the service to disclose personal information data <br> <br> As the popularity of the handheld device, people more and more use of location-based services, including emergency rescue services, location .-based games, mobile yellow pages services, which guarantee a real capacity for cloud computing will be displayed. Although the service provider does not require people to request services while sending their own unique logo such as your name, network address, etc., but .requires the user to send their current position, only more accurate personal location information, get more satisfactory service. In this case, the user's location to become a personal privacy information. Service provider (attackers) can put user location and maps for matching and certain .observation to discover the user experience of the true identity, and thus to the users of the service request, find the user's personal interests and other privacy. <br> <br> Therefore, in the context of cloud computing, user personal information is important .to protect out. In the data on the local hard disk are also enough safe today, how to ensure that all personal data for the public to the world, still ensuring personal privacy is not compromised, will be the cloud computing is to spread will conquer .one of the other challenges. <br> <br>.

No comments:

Post a Comment