Cloud Computing Yes No Data centre filled Virtual compute, No - - PowerPoint PPT Presentation
Cloud Computing Yes No Data centre filled Virtual compute, No - - PowerPoint PPT Presentation
Cloud Computing Yes No Data centre filled Virtual compute, No with identical storage and network hardware modules Fit and forget; Software defined Because Use commodity Failed hardware hardware; component(s) simply
No Yes
Data centre filled with identical hardware
- Fit and forget;
- Use commodity
hardware;
- Replace when it
fails and you get the time, like a bulb in a large chandelier Virtual compute, storage and network modules
- Software defined
- Failed hardware
component(s) simply bypassed
No
Because …
A bank’s locker service
Hosts your property in service provider’s facility
Characteristics of the service
Elastic compute, storage and network
Available on demand
1
In predefined units
2
Hired for required length of time
3
Multitenancy
4
Need for Customer Protection
Customer needs to trust the service provider
- Reasonable security safeguards to prevent loss,
unauthorised access, etc.
- Protection of legal liabilities
- Ownership issues
- Quality of Service
- Lock-in
- Portability
- Interoperability
- Commercial tie-in
- Billing and metering
Interoperability and Portability
May be left to the market forces
1
Disclosure mechanism for transparency regarding interoperability
2
Telecommunications Standards Development Society, India (TSDSI) for development of standards
3
Regulation of Industry
- Thriving Business
- Licensing
- Industry Practices
- Compliance
- Disclosure
- Self Regulation
Registered Industry Bodies for self- regulation
Specified terms and governance structure. May be derecognized, if warranted
1
Not for profit
2
Cloud service providers above a threshold as members
3
To develop the code of conduct for members
4
Government to keep a watch
5
Cloud Service Advisory Group for oversight
Representatives of state IT departments
1
MSME associations
2
Consumer advocacy groups
3
Industry experts
4
Representatives of Law Enforcement agencies
5
Legal Framework
Adequate protection to sensitive personal information
Notice, before personal information is collected Choice and consent Collection limitation, only for the purposes identified and informed to the individual. Purpose limitation: use personal information only for the stated purposes Access and correction: users have the right to access their personal information and correct, if necessary Disclosure of information: cannot disclose personal information to third parties, without notice and consent Security: Required to install “reasonable security safeguards” to prevent loss, unauthorised access, etc. Openness: to implement practices, procedures, policies and systems to the scale, scope, and sensitivity Accountability: for complying with measures that satisfy the privacy principles.
Legal framework
Law enforcement
- Interception
- Access
- Due process
Jurisdiction
Data Protection Law
Data Protection Law
1
Provisions to govern cross-border transfer of data
2
Robust MLATs, with provisions for interception or access.
3
Cloud services scenario
Indian Government has a policy to promote cloud services for government services No need for incentive to large customers and CSPs Ministry of MSME may continue to promote adoption of ICT in this sector