In the next section of my theoretical discussion about the development of Hybrid Cloud Computing, I will discuss the implications of this technology on security- questioning whether our data is safe and secure and data privacy, political implications- how this technology is legislated and utilised via the government and the problems around where the ‘data center’ physically is. Andrejevic’s (2009) digital enclosure is defined as the “creation of an interactive realm wherein every action, interaction and transaction generates information about itself…” and that as customers participate in the new digital enclosures, it opens you up to surveillance and monitoring. Finally, I will discuss the future of cloud computing before summarising my discussion.
A major issue in Cloud Computing is security. Kuyoro, IbIkunle and Awodele (2011) imply most cloud computing services are provided by a third-party provider whom owns the infrastructure thereby, having access to stored data which they may use for capital gain in their own organisations. It is important for trust in a Cloud environment, which has been slow to gain by those producing Cloud platforms as individuals and organisations prefer to be in strict control of their own information while a Cloud platform removes that control placing data on servers around the world. Zissis and Lekkas (2012) state it is “impossible to place a virtual moat around an organisations castle…ability to clearly identify, authenticate, authorise who or what is accessing the assets of an organisation…” inferring that it is impossible to completely secure the data organisations store on the cloud and, that Cloud organisations or the third-parties who store the data need access to keep your data secure further, implying trust is important in the Cloud environment.
There is a threat of data compromise as more parties, devices and applications are accessing the stored data. This is because the more access points to the data, the less secure it becomes which allows hackers/criminals and uninvited organisations access to the stored data. Also, a question around ownership, arises in the analysis of security. Kannankott and Gupta (2016) say that the person who uploaded or stored the data, owns the data however, they have no control where the data is placed within the Cloud environment. Furthermore, they analyse data privacy regarding this question of ownership and indicate multiple legal concerns: for instance, when the data is moved around the system by crossing jurisdictions. Data location is important in consideration of security issues because it is subject to privacy laws in the country it resides, but not necessarily in the place where the headquarters are stationed (Winkler, 2011). Developers in Hybrid Cloud Computing claim this system gives the customer more control however, these security issues such as privacy, data location and third-party access have plagued each version of Cloud Computing hence, it is probable it will plague the next generation of Cloud software too. Through accessing customer’s private data-a breach of privacy, or allowing third-parties to, security carries also ethical implications consumers should consider.
Please click here to continue reading my commentary on Hybrid Cloud Computing