102 context of a security system backbone, must be a verified identity by some trusted third party It is worth noting that even if your identity
is verified by a trusted host, it can still be under an individuals management and control.
With this proposed use of identity, on the type of scale and openness as expected in a cloud computing context, we must also consider the privacy implications of that individuals identity. A digital identity can carry with it many identifiers about an individual that make identity theft a problem, but identity should also be kept private for the simple reason of respect. However, privacy
is a very personal choice and, as such, the ability to remain private within a cloud, should beat the very least, an option.
Share with your friends: