Summary of data sovereignty and border control

Source: Internet
Author: User
Keywords Internet cloud computing

If someone wrote a very important memoir and needed to save the rescue, would it be safe to lock it in a safe? Perhaps a fire could destroy it. But if this memoir were published and sold to every corner of the world, it would have been a World war, and it would have been well preserved.

"What's the best way to protect your data? Is it centralized or widely disseminated?" This should be one of the issues that you and I are most concerned about today.

The purpose of the Internet is also this: to maximize the data by redundancy, the data will not be limited to a few specific routes, but will be through any available routes to reach the destination. The idea is based on cloud computing. As redundancy and data backups spread across multiple regions, it is not only possible to avoid data loss effectively, but also to address any problems that arise locally in data preservation.

The problem is that data protection has two meanings: it can mean avoiding loss of data-in which case, the greater the number of spreads, the less data loss-or the privacy of the data-in which case the smaller the number of spreads, the better the privacy protection. The growth environment of the IT industry is just a closed entity network, initially connected through less reliable hardware. So the first thing left is how to handle redundancy and remote backup, which is reflected in the way cloud computing is developed. But legislators must strike a balance between the benefits of the free flow of data and the value of data privacy and personal freedom.

Data sovereignty and border control

"Transboundary movement of data" is a legal term referring to the storage, transmission or processing of data outside the borders of a state. The United States Patriot Act of 2001 is a controversial law that empowers U.S. law enforcement to intercept data in ways that are far more acceptable than some other countries. Indonesia has enacted strict legal provisions on "data sovereignty", which stipulates that personal information must be kept within the boundaries of its entity. In terms of privacy of personal data, national laws vary: sexual orientation or religious belief may not be sensitive information in one country, but may lead to persecution or even imprisonment in another country.

There are several different ways to solve this problem. First, encrypting data and hiding the identity of the data in a cloud schema by some means is sufficient to protect personal data, but cannot satisfy the legal requirements for data sovereignty – which must be borne in mind as other governments may be trying to crack down on sensitive data. Another approach is a hybrid cloud approach where key data is stored and processed on the spot, while less sensitive data is managed and processed in the cloud architecture.

However, knowing where the data is stored does not solve all the problems. For example, after inputting personal data into a PC via the keyboard, knowing that the data will be delivered to a cloud service point that you trust, you don't know how the data arrives at the destination. As mentioned above, the purpose of the Internet is to achieve maximum redundancy and flexibility, so that packets can reach their destinations and therefore do not limit the way data arrives at destination. The route is completely random –IP transmission is more inclined to a large flow but efficient path, so the router failure or a line disconnect, will have an impact on the choice of the actual route.

Thus, even if the starting and ending points are in the same country, there is still no guarantee that the data will not pass through and cross the border again. This is not a problem in real business, but it is a serious problem in terms of legislative compliance.

Without a comprehensive rebuilding of global network facilities, how can we solve this problem to ensure that data does not cross borders during transmission? Software Definition Network "is probably the answer to the question.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.