Nowadays the development of the Internet is growing rapidly, and it is accepted as big portion of human civilization. The big paradigm of Internet has passed through Web 2.0 and is headed to Web 3.0, which the core technology placed in the center of i...
Nowadays the development of the Internet is growing rapidly, and it is accepted as big portion of human civilization. The big paradigm of Internet has passed through Web 2.0 and is headed to Web 3.0, which the core technology placed in the center of its Cloud Computing.
Recently, “cloud computing” has established itself as a new model in the IT industry, and as a new concept whereby companies can freely utilize the third infrastructure as if it were their own infrastructure, instead of developing and using their own proprietary system with their infrastructure. The appearance of new technology like Cloud computer, computer users too not only own the information. Cloud computing is essentially a term given to some new information technology services provided over the Internet. These can include storage of data, provision of software and infrastructure as a utility.
However, users are very concerned about unforeseen service interruptions or malfunctions as the data is saved and managed by the service operated by the cloud service provider. Also, there is concern about dependency due to leaks of confidential information (as the data is saved outside) and insufficient compatibility among cloud computing.
There are a number of privacy questions that we need to address when assessing the business case and risks of entering into cloud computing arrangements that extend beyond traditional computing risks.
Data subjects have a right to know what personal information is held and, in some cases, can make a request to stop processing it. This is especially important with regard to marketing activities; in some jurisdictions, marketing activities are subject to additional regulations and are almost always addressed in the end user privacy policy for applicable organizations. In the cloud, the main concern is the organization’s ability to provide the individual with access to all personal information, and to comply with stated requests.
The information not only be activated by the Internet energetically but is distributed by various personalized services, but as the information flow, the information becomes out-flowed, distorted and being illegally acquired. Out-flow of the information can occur infringement of one’s privacy, illegal use of one’s Internet ID, and fraud of web documents; forgery and falsification.
It can also harm other’s life and body as the information society grows more.
Moreover, as new Internet environment is continuously growing, out-flow of personal information is also growing more, but the awareness of protecting personal information is surprisingly low. New technologies are being developed from country to country but the consciousness of protecting the law is far behind.
As above facts, I would like to discuss about the Cloud computer that is leading the big change of the Internet atmosphere and would like to discuss about protection of personal information, which the importance is growing, and the way to protect personal information under the new Internet atmosphere of Cloud computer.
We need to select and discuss target areas and technologies for standardization in detail, in order to secure the interoperability of cloud computing in detail. In particular, the standard framework should be established and applied as quickly as possible to secure cloud computing interoperability among public bodies and between the public and private sectors, with regard to the government’s plan to introduce cloud computing. The government also needs to support the efforts of the private sector to standardize cloud computing.
This study reviewed various policy protection methods to resolve the privacy concerns that may arise from the perspective of consumers, such as the consumer’s limited right of choice due to insufficient interoperability among cloud computing services.
However, the market cannot be promoted with protection by the policy. If too excessive obligations are imposed on the service provider to protect the consumers, it could hinder market promotion. Therefore, improvements to the relevant law and policies regarding promotion of the cloud computing market should be made in consideration of market development and maturity; in addition, more diverse policy support is required to promote the market, such as technical development and stimulation of market demand.
Therefore, various policy support policies designed to promote market demand and strengthen the development capability of service providers should be implemented. The cloud computing market is expected to grow continuously, and its level and scope will be expanded broadly to include mobile devices like a smart phones as well as PC.
However, unlimited challenges and opportunities are driven by major global companies. As such, local IT companies and Software companies must establish strategies for a new take-off, while the government must respond wisely in the fresh-blown new market.