All Tags
AWS
ai
algorithm-design
architecture
browser
cloud
cloud-efficiency
cloud-principles
cost-reduction
data-centric
data-compression
data-processing
deployment
design
documentation
edge-computing
email-sharing
energy-efficiency
energy-footprint
enterprise-optimization
green-ai
hardware
libraries
llm
locality
machine-learning
maintainability
management
measured
microservices
migration
mobile
model-optimization
model-training
multi-objective
network-traffic
parameter-tuning
performance
queries
rebuilding
scaling
services
storage-optimization
strategies
tabs
template
testing
workloads
Tactic: Privacy violation
Tactic sort:
Dark Tactic
Type: Unsustainable Pattern
Category: cloud-computing
Tags:
Title
Privacy violation
Description
The characteristics of cloud computing (e.g., remote data storage, platform sharing, service dynamic change, just to mention a few) make privacy protection particularly challenging. Privacy violation, however, regularly occurs purposely, when cloud providers e.g., do not comply with enterprise policies or legislation, or force/persuade users to give personal information against their will.
Participant
end-user, cloud-user, cloud-provider
Related artifact
Cloud services
Context
Normal operation
Feature
Data storage and utilization metadata
Tactic intent
Violating user privacy (e.g., for marketing purposes, unauthorized monitoring)
Intent measure
Private-data-leak frequency and degree of seriousness
Countermeasure
Due to the many recent scandals in various ICT industries, countermeasures are fast emerging, e.g., legislation. Another example would be to give back to users the power to decide what to share.
Source
*The Dark Side of Cloud and Edge Computing* by Klervie Toczé, Maël Madon, Muriel Garcia and Patricia Lago (DOI: https://doi.org/10.21428/bf6fb269.9422c084)Graphical representation