Data Privacy in Cloud Computing - An Empirical Study in the Financial Industry

Cloud computing is of growing interest due to its potential for delivering scalable and self-managed services. Financial institutions, as “critical users” of cloud computing services, are still slow-going and careful in the usage of clouds, since outsourcing data from a “secure” internal IT infrastructure to an external cloud poses multiple data privacy issues. This paper provides an assessment of the relevance of data privacy requirements, based on interviews with eight representatives of a global international German bank that operates in over 50 countries. Our results indicate that despite technical advancement, administrative countermeasures and legal agreements, certain data privacy issues still form obstacles for the adoption of cloud computing by financial institutions.

[1]  Martin Knahl,et al.  Sicherheitsprobleme für IT-Outsourcing durch Cloud Computing , 2014, HMD Praxis der Wirtschaftsinformatik.

[2]  Ulrich Lampe,et al.  On the Relevance of Security Risks for Cloud Adoption in the Financial Industry , 2013, AMCIS.

[3]  Geoff Walsham,et al.  Interpretive case studies in IS research: nature and method , 1995 .

[4]  Haiyan Zhan,et al.  Applying cloud computing in financial service industry , 2010, 2010 International Conference on Intelligent Control and Information Processing.

[5]  S. K. Dubey,et al.  Security and Privacy in Cloud Computing: A Survey , 2013 .

[6]  Michael Amberg,et al.  IT-Outsourcing & Compliance , 2013, HMD Praxis der Wirtschaftsinformatik.

[7]  Sylwia Męcfal Recenzja książki. Robert K. yin, Case Study Research. Design and Methods (fourth Edition), thousand Oaks, CA: Sage Publications, 2009 , 2012 .

[8]  Christoph Heinle,et al.  IaaS Adoption Determinants in Enterprises , 2010, GECON.

[9]  Paula Kotzé,et al.  Secure cloud computing: Benefits, risks and controls , 2011, 2011 Information Security for South Africa.

[10]  Jochen Gläser,et al.  Experteninterviews und qualitative Inhaltsanalyse , 2010 .

[11]  Marten van Dijk,et al.  On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing , 2010, HotSec.

[12]  John W. Rittinghouse,et al.  Cloud Computing: Implementation, Management, and Security , 2009 .

[13]  Deborah Bunker,et al.  An Empirical Analysis of Cloud, Mobile, Social and Green Computing: Financial Services IT Strategy and Enterprise Architecture , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.

[14]  Graeme G. Shanks,et al.  Successfully completing case study research: combining rigour, relevance and pragmatism , 1998, Inf. Syst. J..

[15]  Javier González,et al.  Multi-layer Monitoring for Cloud Computing , 2011, 2011 IEEE 13th International Symposium on High-Assurance Systems Engineering.

[16]  Anonymisierung von Unternehmensdaten: Ein Überblick und beispielhafte Darstellung anhand des Mannheimer Innovationspanels , 2002 .

[17]  Nico d'Heureuse,et al.  Towards holistic multi-tenant monitoring for virtual data centers , 2010, 2010 IEEE/IFIP Network Operations and Management Symposium Workshops.

[18]  James Michael Stewart,et al.  CISSP: Certified Information Systems Security Professional Study Guide, 2nd Edition , 2004 .

[19]  Eric Conrad,et al.  CISSP Study Guide , 2010 .

[20]  Stephan Sädtler Aktuelle Rechtsfragen des Datenschutzes und der Datensicherheit im Cloud Computing , 2013, PIK Prax. Informationsverarbeitung Kommun..

[21]  Craig Gentry,et al.  A fully homomorphic encryption scheme , 2009 .

[22]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .

[23]  Alexander Benlian,et al.  Perceived IT Security Risks of Cloud Computing: Conceptualization and Scale Development , 2012, ICIS.

[24]  Christine Nadel,et al.  Case Study Research Design And Methods , 2016 .

[25]  Markus Kucera,et al.  Sicherheitsherausforderungen in hochverteilten Systemen , 2013, Prax. Inf.verarb. Kommun..

[26]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.