期刊文献+

云计算领域隐私权保护的现实困境分析 被引量:4

Dilemma Analysis of the Protection of Privacy in Cloud Computing
下载PDF
导出
摘要 近年来,各国因采用云计算技术而频繁发生的信息和数据泄露事件严重侵犯了用户的隐私权,为此,国家进行了相应的立法保护,监督云计算提供商的行为,并敦促云计算提供商改进技术,结果却收效甚微。鉴于此,本文从云计算的特点、行业自律、立法、经济发展、政府介入这5个维度对云计算领域隐私权保护的现实困境进行分析,试图探究云计算领域隐私权难以保护的深层次原因,为云计算领域隐私权保护对策的制定提供思路上的参考和借鉴。 In recent years, information and data breaches have occurred frequenfly in many countries due to cloud comput- ing technology. It has severely violated the privacy of users. States have carried out the appropriate legislative protection, moni- toring the behavior of cloud providers, urged the cloud computing provider to improve techniques, but the results have little effect. In view of this, the article makes a dilemma analysis of the protection of privacy in cloud computing from the aspect of the charac- teristics of cloud computing, industry self- regulation, legislation, economic development, and government intervention. The author attempts to explore the deep - seated reasons for the difficulty of cloud computing privacy protection and provide ideas for the protection measures.
作者 陶涛
出处 《现代情报》 CSSCI 2014年第2期162-167,共6页 Journal of Modern Information
关键词 云计算 隐私权 立法 行业自律 云产业 政府政策 cloud computing privacy legislation industry self- regulation cloud industry government policy
  • 相关文献

参考文献20

  • 1(美)卡尔.IT不再重要[M].闰鲜宁,译.北京:中信出版社.2008:90-120.
  • 2Ariel Joseph Feldman. Privacy and Integrity in the Untnlsted Cloud, 2012: 3-4.
  • 3Deyan Chen, Data Security and Privacy Protection Issues in Cloud Computing. International Conference on Computer Science and E]ec- tronics Engineering, 2012: 647- 648.
  • 4Nicole A.Ozer, Chris Cordey. Cloud Computing: Storm Wanting for Privacy? The ACLU of Northera California, 2010: 4-5.
  • 5Han'y Katzan, Jr. On the Privacy of Cloud Computing [ J]. Intema- fianal Journal of M:t & Informatian Systems - Second Quarter, 2010, 14 (2): 1-2.
  • 6Dan Svantesson, Roger Cla&e. Privacy and consumer risks in cloud computing. Cou:uter Law & Security Review, 2010:391 - 397.
  • 7Siani Pearson. Taking Account of Privacy when Des/gning Cloud Com- puting Services. CLOUD'09, May 23, 2009, Vancouver, Canada: 44 - 52.
  • 8中国电子学会云计算专家委员会.云计算技术发展报告[M].北京:科学出版社,2011.
  • 9徐光侠,陈蜀宇.面向移动云计算弹性应用的安全模型[J].计算机应用,2011,31(4):952-955. 被引量:8
  • 10常健,郭薇.行业自律的定位、动因、模式和局限[J].南开学报(哲学社会科学版),2011(1):133-140. 被引量:33

二级参考文献93

  • 1然后.CPO是干什么的?[J].管理知慧,2005(3):10-12. 被引量:1
  • 2赵秋雁.网络隐私权保护模式的构建[J].求是学刊,2005,32(3):79-82. 被引量:17
  • 3[1]Miehelfelder D P.The moral value of informational privacy in cyberspace[J].Ethics and Information Technology,2001(3)
  • 4[4]OPA News.Online privacy alliance will serve as vanguard of industry efforts to protect privacy in cyberspace:cross-industry coalition of American companies and associations announces common commitment,new privacy initiatives[N-OL].(1998-06-22)[2008-05-02].http://www.privacyalliance.org/news/06221998.shtml
  • 5[5]Guidelines for online privacy policies[EB/OL].[2008-05-23].http://www.privaeyalliance.org/resources/ppguidelines.shtml
  • 6[7]TRUSTe program requirements[EB/0L].[2008-05-23].http://www.truste.org/requimments.php#req3
  • 7[8]BBBOnLine's new privacy seal program opens for business:helps Websites assure visitors that their privacy is respected[N/OL].(1999-03-17)[2008-05-27].http://www.bbbonline.org/about/press/1999/3-17-99.asp
  • 8[9]Welcome to BBBonline's consumer safe shopping site[EB/OL].[2008-05-28].http://www.bbbonline.org/consumer/
  • 9[10]Platform for privacy preferences(P3P)project:enabling stoatter privacy tools for the Web[EB/OL].[2008-05-28].http://www.w3.org/P3P/
  • 10[14]张蔚文.加快城市信息化基础设施建设构筑通向未来之路[EB/OL].[2008-05-28].http://unpanl.un.org/intradoc/groups/public/documents/APCITY/UNPAN004437.pdf

共引文献127

同被引文献74

  • 1新华网.云计算从概念走向应用至2015年收人将突破1800亿美元[EB/OL].(2013-12-20)[2014-10-05].http;//news,xinhuanet.com/info/2013-12/20/c_132982365.htm.
  • 2中国工业和信息化部.云计算安全问题及对策[EB/OL].[2014-10-05].http://www.miit.gov.cn/n11293472/n11293832/n15214847/n15218234/15475208.
  • 3新华网.大数据和云计算使的个人隐私四面楚歌[EB/OL].(2013-11-20)[2014-10-05].http://news,xinhuanet.com/info/2013-11/20/c_132902969.htm.
  • 4Columbus L.IDG cloud computing survey:security,integration challenge growth[EB/OL].(2013-08-13)[2014-10-05].http://www.forbcs.com/site.s/louiscolumbus/2013/08/13/idg-cloud-computing-survcy-security-integration-challenge-growth/.
  • 5中文国际.摩根大通数据泄露影响8300 万客户[EB/OL].(2014-10-03)[2014-10-05].http:/ / www.chinadaily.com.cn/hqgj/jryw/2014-10-03/content_12481331.html.
  • 6互动百科.隐私[EB/OL].[2014-10-05],www.baike.com/wiki/隐私.
  • 7Liu F,Tong J,Mao J,et al.NIST cloud computing reference architecture[J].NIST Special Publication,2011,500:292.
  • 8ZDNct.Enterprise cloud outlook:inevitably hybrid,surprisingly agile and(eventually)cheap[EB/OL].(2014-04-03)[2014-10-05].http://www.zdnet.com/enterprise-cloud-outlook-inevitably-hybrid-surprisingly-agile-and-eventually-cheap-7000028032/.
  • 9IBM.IBM hybrid cloud solution[EB/OL].[2014-10-05].http://www-01.ibm.com/software/tivoli/products/hybrid-cloud/.
  • 10Zhang K H,Zhou X Y,Chen Y Y,et al.Sedic:privacy-aware data intensive computing on hybrid clouds[C]//CCS.Proceedings of the 18th ACM conference on computer and communications security.New York:ACM,2011:515-526.

引证文献4

二级引证文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部