WILL THE CLOUD MAKE THE CITIZEN MORE VULNERABLE? - Risk and Vulnerability Assessment in Times of Cloud-computing

Stefan Scheer, Ioannis Kounelis, Jan Loeschner

2012

Abstract

Through digital traces that are left behind citizens are more and more exposing their personal data, digital identities to third parties in a conscious or mostly unconscious way. The latter is particularly the case for a variety of cloud computing applications implicitly used by a default citizen. To interact in a digital world and to give away personalized information opens the door for several hazards that may occur – deliberately or not. Consequently a citizen becomes vulnerable in various dimensions. Current research tries to re-apply well-known risk analysis strategies within the new context and in particular to cloud-computing scenarios. Final aim would be to identify individual risks in a qualitative and quantitative manner.

References

  1. Crichton, D.: The Risk Triangle, in: J.Ingleton ed., Natural Disaster Management, London: Tudor Rose, pp.102- 103 (1999).
  2. United Nations Development Programme (UNDP): Reducing Disaster Risk. A Challenge for Development. A Global Report: UNDP - Bureau for Crisis Prevention and Recovery (BRCP), New York, 2004. Available at: http://www.undp.org/bcpr/ disred/rdr.htm .
  3. Wright, D., Safeguards in a World of Ambient Intelligence, Chapter 4: Threats and Vulnerabilities. Springer, 2010.
  4. Jeffery, K., Neidecker-Lutz, B. (eds.): The Future of Cloud Computing, Opportunities for European cloud computing beyond 2010. Expert Group Report, public version 1.0. European Commission, DG Information society and Media, 2010.
  5. Parnell, B.A., Millions face Megaupload data deletion by Thursday, in: <http://www.theregister.co.uk/2012/01/ 30/megaupload_users_to_lose_data/>, 2012. Accessed 6/3/2012.
  6. Parnell, B.A., Microsoft's Azure cloud down and out for 8 hours, in< http://www.theregister.co.uk/2012/02/29/ windows_azure_outage/>, 2012. Accessed 6/3/2012.
  7. McKendrick, J.: Eight cloud computing risks, and how to quash them, in: <http://www.zdnet.com/blog/serviceoriented/eight-cloud-computing-risks-and-how-toquash-them/7752>, 2011. Accessed 5/3/2012.
  8. Bishop, Matt, “Computer Security: Art and Science”. Boston, MA: Addison-Wesley, 2003, pp. 348-349.
Download


Paper Citation


in Harvard Style

Scheer S., Kounelis I. and Loeschner J. (2012). WILL THE CLOUD MAKE THE CITIZEN MORE VULNERABLE? - Risk and Vulnerability Assessment in Times of Cloud-computing . In Proceedings of the 2nd International Conference on Cloud Computing and Services Science - Volume 1: CLOSER, ISBN 978-989-8565-05-1, pages 173-176. DOI: 10.5220/0003960801730176


in Bibtex Style

@conference{closer12,
author={Stefan Scheer and Ioannis Kounelis and Jan Loeschner},
title={WILL THE CLOUD MAKE THE CITIZEN MORE VULNERABLE? - Risk and Vulnerability Assessment in Times of Cloud-computing},
booktitle={Proceedings of the 2nd International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,},
year={2012},
pages={173-176},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003960801730176},
isbn={978-989-8565-05-1},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 2nd International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,
TI - WILL THE CLOUD MAKE THE CITIZEN MORE VULNERABLE? - Risk and Vulnerability Assessment in Times of Cloud-computing
SN - 978-989-8565-05-1
AU - Scheer S.
AU - Kounelis I.
AU - Loeschner J.
PY - 2012
SP - 173
EP - 176
DO - 10.5220/0003960801730176