
Building on existing knowledge of ODR, it goes beyond and provide applicable proposals for redress in growing industry of cloud services.Ĭloud computing can be separated into three major categories, namely private clouds, public clouds and hybrid clouds.

This research answers under which circumstances ODR mechanisms are the most suitable means to resolve conflict coming out of provision of cloud computing services in the EU and globally. These proposals in principle are focusing on e-commerce aspects of dealing with low-cost consumer/seller disputes. EU parliament has recently voted in favour of the proposal on the ADR and ODR regulations for consumer disputes. At the same time, we are witnessing parallel attempts from several public bodies and international organisation to introduce (on national and global level) the legal framework for the application of the online dispute resolutions. Development of cloud computing services last decade raised new issues of applicable law, jurisdiction, access to justice, the legal nature of the disputes, consumer protection etc. The traditional concepts of practicing the law do not follow the pace of the development of the new technologies. Moreover, cloud computing technology is making a major contribution to ecommerce. Our analysis shows further that the advancements in communications technology is benefiting cloud computing and makes it a truly global service. We discuss the ways in which cloud computing is supporting entrepreneurial activities. We identify the major cloud service providers and the cloud service types that they offer.

This chapter addresses the history of the growth of cloud computing and the three basic service types-SaaS, PaaS, IaaS-that help businesses of all types. As the first step in this direction many of the major cloud service providers are joining multiple consortia to develop the standards. At present the goal is to meet the business needs and as the technology matures it will accommodate changes emanating from global standards. The benefits of cloud computing are too numerous to hold back adoption. As a truly global technology, cloud computing is growing rapidly, albeit without any global standards. The options offered by cloud services fit the needs of businesses of all types. The growth of this technology mirrors the growth of computing in general. We discuss the relevance of MSPD, providing a technical approach to regulate their trusted management in a user-centric model context.Ĭloud computing has emerged as a cost effective alternative to having reliable computing resources without owning any of the infrastructure. The protection of MSPD in a user-centric paradigm is an undeniable requirement to ensure privacy to all MSPD right-holders. In this paper, we refer to this kind of valuable data as Multiple Subjects Personal Data (MSPD). Uncertainty especially arises in the case of PD related to multiple subjects, e.g., containing identifiers referring to more than one person, each of which holds rights to control how these PD are treated. The possibility for people to directly collect, manage and exploit PD introduces both technical and regulatory new issues in PD management. The creation of a balanced ecosystem of PD, where data act as the fuel for novel application scenarios, may drive the shift toward a user-centric paradigm, in which constraints should be imposed on the data usage, to protect the individuals’ privacy. The evolution of mobile devices, the success of social networks, and the digitalization of business/personal services have resulted in a huge and continuous production of Personal Data (PD).

This paper introduces a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing types and the service delivery types. The idea of handing over important data to another company is worrisome such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. Security is one of the major issues which hamper the growth of cloud. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements.
