Establishing a Canadian cloud identity ecosystem

Source: Internet
Author: User
Keywords Ecosystems nbsp;

As the Canadian government promises to deliver the long-awaited book-economic strategy at the end of the year, this hints at the role that cloud industry can play in this strategy.

This further encourages the identification of which part of the cloud computing industry may be a large area of expertise, focusing on Canada's niche, so that start-ups can better focus on niches.

Best practice--protect cloud privacy from design

I think the best practice at the top of the list is "protect cloud privacy from design", developed by Ontario Prov. Privacy Commissioner.

This is such a hot topic. As Andrea in an earlier blog, the mention of cloud computing is often followed by concerns about the US Patriot Act. The worry is that once you upload your data to the cloud, the U.S. government is free to access and monitor it.

So, as the name suggests, protecting cloud privacy from design provides the best practice framework to ensure that the private sector and the shared sector organize the use of cloud services securely, although there is still concern.

Given that there is little real use of this, it will be a huge global growth area for new consulting skills, and it shows how governments can play a role in creating the assets of these best practices, once as a means of stimulating and supporting economic growth.

The OPC Office team has sent some updates to these best practice materials:

• International Telecommunication Data Protection Working Group (IWGDPT) April 2012: Cloud computing Work Report--pdf file

· EC 29th Working Group, July 2012: European Commission comments on cloud Computing 29th WP additional--PDF file

• UK Office of Information and Privacy Commissioner: cloud computing guidelines for public institutions--pdf documents.

Cloud identity ecosystem--personal cloud framework

Market opportunities such as the sheer mammoth have been further expanded when considering the development of an "identity ecosystem" defined by the US government.

This can also be considered a "privacy network," because the ecosystem is basically a set of controls that are distributed throughout many different systems that store your identity-related data.

So far the main from the cloud as a host and run the virtualization program environment to approach it, but as mentioned above concerns, we also consider it a universal data network.

The so-called ecosystem in the report from the World Economic Forum-private data is interpreted as: the emergence of a new bourgeoisie, and cloud computing overlap, known as the "personal cloud."

This refers to the "personal data store" of Canada's own information stored by different online vendors, from email to social networking to photo storage. There are also files and data stored in the cloud, and there will be protocols and standards to connect these "fragments" to a whole digital image.

Risk acceleration

This expertise and focus helps us to more effectively and quickly track new ventures. These requirements and best practices set the environment for the new technology that is required.

For example, a vendor such as Perspecsys provides a local device that encrypts information before it is uploaded to a cloud service such as Salesforce.com. Ontario Privacy Commissioner This description:

Perspecsys's cloud solution proposes privacy design by default, End-to-end security and strong responsibility-by enabling an enterprise to automatically encrypt (decrypt) local and dynamic Data when using the third cloud service application, there is no loss of functionality. Keeping control of the encryption and decryption process is a good way to protect your personal data, regardless of where the data resides. --Dr. Ann Cavoukian, information and Privacy Commissioner, Ontario, Canada

The value of the technology is obvious to industry giants such as Salesforce.com, who have bought a similar supplier that allows them to choose services with data residing.

Open standards are also key to acceleration. The ecosystem will take years to fully act and include core building blocks such as OAuth, which provide "social landings" (a way to join a Web site via user name and password), as provided by vendor Janrain.

It will then expand into a full-fledged "data station" where these foundations will facilitate the sharing of personal data. The framework for enabling and managing data flows includes the Kantara initiative's program, and the Oasis XDI Protocol, which provides a mechanism for sharing privacy controls.

These presentations explain these core mechanisms and map to the government's privacy policy.

Canada is continuing to develop the new Kantara founding group, which will build a project called "Kantara Cloud Identity and security best practices".

Conclusion

These different developments will lead to a variety of opportunities for service providers, from Verizon's simple management of the authentication process to "data as a service", where banks, utilities and other key organizations provide online real-time Web services.

There are also common documents that share the personal cloud ecosystem that will evolve into different industries-specific features such as "personal Electronic Cloud Records" (Electronic Jude Record).

This is what a player like Zen Vault can provide. Zenvault is a downloadable application that allows you to personally hold and control your own electronic Media Records (EMR) and provide it to physicians when necessary. Personal cloud services, combined with data station control mechanisms, will make the ideal combination possible-sharing information easily between patients, GP, and other key process stakeholders, but in a completely secure, manageable way.

These provide a foundation for a lot of new investments that will help entrepreneurs start businesses and find shortcuts to business success.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.