customers’ data to external parties (Pearson, 2013),
and that a certification scheme inevitably will emerge,
much like we see for the Payment Card Industry Data
Security Standard (PCI-DSS, 2013).
ACKNOWLEDGEMENTS
This work has been partly funded from the Euro-
pean Commissions Seventh Framework Programme
(FP7/2007-2013) under grant agreement no: 317550
(A4CLOUD) Cloud Accountability Project, and
builds substantially on our previous journal paper
(Jaatun et al., 2016) and project deliverables (Gittler
et al., 2016) Thanks to all our A4Cloud partners, and
particularly Fr
´
ed
´
eric Gittler, Ronald Leenes, Maartje
Niezen, Niamh Gleeson and Dimitra Stefanatou for
their contribution to the research reported in this pa-
per.
REFERENCES
Accountability Phase, I. (2010). Demonstrating and mea-
suring accountability a discussion document.
Bennett, C. (1995). Implementing privacy codes of practice.
CSA - PLUS 8830-95.
Bennett, C. J. (2012). The accountability approach to pri-
vacy and data protection: Assumptions and caveats. In
Managing privacy through accountability, pages 33–
48. Springer.
Cattaneo, G., Kolding, M., Bradshaw, D., and Folco, G.
(2012). Quantitative estimates of the demand for
cloud computing in europe and the likely barriers to
take-up. Technical Report SMART 2011/0045 D2 In-
terim Report, IDC.
CIPL (2009). Data Protection Accountability: The Es-
sential Elements - A Document for Discussion (the
Galway project). http://www.huntonfiles.com/files/
webupload/CIPL Galway Accountability Paper.pdf.
EU (2016). Regulation (EU) 2016/679 of the European Par-
liament and of the Council of 27 April 2016 on the
protection of natural persons with regard to the pro-
cessing of personal data and on the free movement of
such data, and repealing Directive 95/46/EC (General
Data Protection Regulation). L, 119.
Felici, M., Pearson, S., Dziminski, B., Gittler, F., Koulouris,
T., Leenes, R., Niezen, M., Nu
˜
nez, D., Pannetrat,
A., Royer, J.-C., Stefanatou, D., and Tountopoulos,
V. (2014). Conceptual framework. Technical Report
D:C-2.1, A4Cloud Project.
Gittler, F., Pearson, S., Brown, R. M., Koulouris, T., Leenes,
R., Niezen, M., Nu
˜
nez, D., Pannetrat, A., Royer, J.-
C., Stefanatou, D., Tountopoulos, V., Luna, J., Had-
dad, M., Sellami, M., Azraoui, M., Elkhiyaoui, K.,
´
’Onen, M., Gleeson, N., Vranaki, A., Oliveira, A.
S. D., Bernsmed, K., Jaatun, M. G., Corte, L. D., and
Gago, C. F. (2016). Reference architecture. Technical
Report D:D-2.4, A4Cloud Project.
ICO (2012). Guidance on the use of cloud computing.
Jaatun, M. G., Pearson, S., Gittler, F., Leenes, R., and
Niezen, M. (2016). Enhancing accountability in the
cloud. International Journal of Information Manage-
ment.
Lampson, B. W. (2004). Computer security in the real
world. Computer, 37(6):37–46.
nymity (2014). Privacy management accountability frame-
work.
PCI-DSS (2013). Payment Card Industry Data Security
Standard.
Pearson, S. (2013). On the relationship between the differ-
ent methods to address privacy issues in the cloud. In
Meersman, R., Panetto, H., Dillon, T., Eder, J., Bellah-
sene, Z., Ritter, N., Leenheer, P., and Dou, D., editors,
On the Move to Meaningful Internet Systems: OTM
2013 Conferences, volume 8185 of Lecture Notes in
Computer Science, pages 414–433. Springer Berlin
Heidelberg.
Pearson, S. (2017). Strong accountability and its contribu-
tion to trustworthy data handling in the information
society. In Stegh
¨
ofer, J.-P. and Esfandiari, B., ed-
itors, Trust Management XI, pages 199–218, Cham.
Springer International Publishing.
Pr
¨
ufer, J. (2013). How to Govern the Cloud? Characterizing
the Optimal Enforcement Institution that Supports Ac-
countability in Cloud Computing. In Cloud Comput-
ing Technology and Science (CloudCom), 2013 IEEE
5th International Conference on, volume 2, pages 33–
38.
Rong, C., Nguyen, S. T., and Jaatun, M. G. (2013). Be-
yond lightning: A survey on security challenges in
cloud computing. Computers & Electrical Engineer-
ing, 39(1).
Vranaki, A. A. (2016). Learning lessons from cloud inves-
tigations in europe: Bargaining enforcement and mul-
tiple centers of regulation in data protection. U. Ill. JL
Tech. & Pol’y, page 245.
Weitzner, D. J., Abelson, H., Berners-Lee, T., Feigenbaum,
J., Hendler, J., and Sussman, G. J. (2008). Infor-
mation accountability. Communications of the ACM,
51(6):82.
APPENDIX
Abbreviations
BCR: Binding Corporate Rules
CBPR: Cross-Border Privacy Rules
CSA: Cloud Security Alliance
CSP: Cloud Service Provider
DC: Data Controller
DP: Data Processor
DPA: Data Protection Authority
Putting the "Account” into Cloud Accountability
17