Page 1019 - Cloud computing: From paradigm to operation
P. 1019

Security                                                   7


            2)      Data protection

                    Data protection ensures that CSC data and cloud service derived data held in a cloud computing
                    environment is appropriately secured so that it can only be accessed or changed as authorized by
                    the CSC (or according to applicable law). This protection may include some combination of access
                    control lists, integrity verification, error correction/data recovery, encryption and other appropriate
                    mechanisms. When a CSP provides storage encryption for CSCs, this function can be client-side
                    encryption (e.g., within a CSP application) or server-side encryption.
            3)      Confidentiality protection
                    Private information can include personally identifiable information (PII) and confidential corporate
                    data. The collection, use, transfer, handling, storage and destruction of private information can be
                    subject to confidentiality regulations or laws. This restriction applies to both CSPs and their CSCs,
                    e.g., a CSC must be able to permanently delete a data table containing private information, even
                    though the CSP is not aware of the table contents. CSPs may also need to support information
                    handling, e.g., searching of CSC data in its transformed or encrypted form.
                    Confidentiality protection extends to private information that may be observed or derived from CSC
                    activities, such as business trends, relationships or communications with other parties, and activity
                    levels and patterns.

                    Confidentiality protection is also responsible for ensuring that all private information (including
                    observed or derived data) is used only for those purposes that have been agreed between a CSC and
                    a CSP.
                    A risk assessment of private information (called a "confidentiality risk assessment") can assist a CSP
                    in identifying the specific risks of confidentiality breaches involved in an envisaged operation. The
                    CSP should identify and implement capabilities to address the confidentiality risks identified by the
                    risk assessment and treatment of private information.
                    NOTE – In some jurisdictions, individual natural persons (i.e., human users) are treated separately from their
                    employers for confidentiality purposes. In such circumstances, confidentiality of the CSU will be appropriately
                    protected in addition to that of the CSC or tenant.

            6.4     Data security lifecycle

            Based on the actual situation of cloud service, the CSC data security lifecycle includes:
            1)      Creation: This is probably better named creation/update because it applies to creating or changing
                    a data/content element, not just a document or database. Creation is the generation of new digital
                    content, or the alteration/updating of existing content.
            2)      Transmission: This is the communication process of transferring data from one place to another.
            3)      Storage: Storage is the act of committing the digital data to some sort of repository, and typically
                    occurs nearly simultaneously with creation.
            4)      Use: Data is viewed, processed, shared or otherwise used in some sort of activity.
            5)      Migration: Data migration is the process of transferring data between storage types, formats, or
                    computer  systems.  It  is  a  key  consideration  for  any  system  implementation,  upgrade,  or
                    consolidation. Data migration occurs for a variety of reasons, including: server or storage equipment
                    replacements or upgrades; website consolidation; server maintenance; and data centre relocation.
            6)      Destruction: Data is permanently destroyed using physical or digital means (e.g., crypto shredding).
            7)      Backup and restoration: Users can create data backups and restore data from backups.














                                                                                                        1011
   1014   1015   1016   1017   1018   1019   1020   1021   1022   1023   1024