21.09.2015 Views

SIENA European Roadmap on Grid and Cloud Standards for e-Science and Beyond

SIENA European Roadmap on Grid and Cloud Standards for e ...

SIENA European Roadmap on Grid and Cloud Standards for e ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

entirely resp<strong>on</strong>sible of their computing activities because they are fully empowered. This<br />

leads to a more complicated issue, the relati<strong>on</strong>ship between accountability <strong>and</strong> privacy.<br />

Accountability <strong>and</strong> privacy<br />

Accountability is used to en<strong>for</strong>ce resp<strong>on</strong>sibility, so it may be seen as a positive factor in<br />

the management of <strong>Cloud</strong> computing. However, accountability has a direct impact <strong>on</strong> the<br />

levels of privacy <strong>and</strong> an<strong>on</strong>ymity of the users. In order to be accountable, users’ acti<strong>on</strong>s<br />

need to be traceable <strong>and</strong>, as such, their physical identity must be knowable to the provider,<br />

while their acti<strong>on</strong>s must leave meaningful traces that can be used to identify, prove <strong>and</strong><br />

quantify the damage or offence caused by reckless behaviours. Arguably, a principle should<br />

be endorsed <strong>for</strong> which, am<strong>on</strong>g all the available implementati<strong>on</strong> of accountability, the <strong>on</strong>e<br />

that minimizes the erosi<strong>on</strong> of the right to privacy <strong>and</strong> to an<strong>on</strong>ymity is chosen. For this<br />

reas<strong>on</strong>, soluti<strong>on</strong>s based <strong>on</strong> federated authenticati<strong>on</strong> <strong>and</strong> authorisati<strong>on</strong> <strong>and</strong> policed logs<br />

access should be preferred to those based <strong>on</strong> proactive <strong>and</strong> invasive practices, like deep<br />

packet inspecti<strong>on</strong> or proactive log mining.<br />

<strong>Cloud</strong>Scape III - Taking <str<strong>on</strong>g>European</str<strong>on</strong>g> <strong>Cloud</strong> Infrastructure Forward<br />

C<strong>on</strong>tact Pers<strong>on</strong>: Luciano Floridi<br />

Organisati<strong>on</strong>: University of Hert<strong>for</strong>dshire<br />

C<strong>on</strong>tact details: luciano.floridi@philosophy.ox.ac.uk<br />

Relevant Link: www.philosophyofin<strong>for</strong>mati<strong>on</strong>.net/Welcome.html<br />

C<strong>on</strong>tact: Matteo Turilli<br />

Organisati<strong>on</strong>: University of Ox<strong>for</strong>d<br />

C<strong>on</strong>tact details: matteo.turilli@oerc.ox.ac.uk<br />

Relevant Link: www.oerc.ox.ac.uk<br />

59

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!