All Tags
AWS
algorithm-design
architecture
cloud-principles
cost-reduction
data-centric
data-compression
data-processing
deployment
design
edge-computing
energy-footprint
hardware
libraries
locality
machine-learning
management
measured
migration
model-optimization
model-training
performance
queries
rebuilding
scaling
services
strategies
template
workloads
Tactic: Privacy violation
Tactic sort:
Dark Tactic
Type: Unsustainable Pattern
Category: cloud-computing
Tags:
Title
Privacy violation
Description
The characteristics of cloud computing (e.g., remote data storage, platform sharing, service dynamic change, just to mention a few) make privacy protection particularly challenging. Privacy violation, however, regularly occurs purposely, when cloud providers e.g., do not comply with enterprise policies or legislation, or force/persuade users to give personal information against their will.
Participant
end-user, cloud-user, cloud-provider
Related artifact
Cloud services
Context
Normal operation
Feature
Data storage and utilization metadata
Tactic intent
Violating user privacy (e.g., for marketing purposes, unauthorized monitoring)
Intent measure
Private-data-leak frequency and degree of seriousness
Countermeasure
Due to the many recent scandals in various ICT industries, countermeasures are fast emerging, e.g., legislation. Another example would be to give back to users the power to decide what to share.