Nsa surveillance doesn’t undermine cloud computing



Download 101.21 Kb.
Page2/6
Date conversion02.02.2017
Size101.21 Kb.
1   2   3   4   5   6

2nc – surveillance not hurt cloud




No significant impact on cloud computing


Weise, 4/7/15 (Elizabeth, “PRISM revelations didn't hit U.S. cloud computing as hard as expected” 4/7, http://americasmarkets.usatoday.com/2015/04/07/prism-revelations-didnt-hit-u-s-cloud-computing-as-hard-as-expected/
When Edward Snowden revealed the extent of the U.S. National Security Agency’s PRISM spying program, there were concerns that American cloud, hosting and outsourcing businesses would lose customers running to non-U.S.-based companies safe from NSA’s prying eyes.

The assertion was that this would be a death blow to U.S. firms trying to operating in Europe and Asia,” said Forrester Research analyst Ed Ferrara.



But two recent reports from Forrester find it was less catastrophic than expected.

That’s good news for companies like Box (BOX), DropBox and others that make their money by selling U.S.-based data storage.

Forrester had originally predicted U.S. companies could lose as much as $180 billion in sales.

Instead, just 29% of technology decision-makers in Asia, Canada, Europe and Latin America halted or reduced spending with U.S.-based firms offering Internet-based services due to the PRISM scandal, Forrester’s Business Technographics Global Infrastructure Survey for 2014 found



It’s a relatively small amount of data,” Ferrara said.

That’s because most of the companies didn’t need to move all their data, much of which was stored in-house. Instead, only 33% of the data held by that 29% of companies was at a third-party data center or in a cloud system.

Forrester believes the overall loss to U.S. cloud providers for 2015 will be about $15 billion and in 2016, $12 billion, a far cry from projections that were ten times that a year ago.

Forrester also found that companies are looking at other ways to protect the integrity of their data, not just from the NSA but also from surveillance by other nations.

Chief among them was encryption. Eighty-four percent of the companies said they’re using various encryption methods to protect sensitive material.

The survey’s definition of cloud providers is broad, and includes both platform as a service, infrastructure as a service and software as a service companies, said Ferrara.



2nc - cloud not feasible




Tons of alt. causes to cloud computing –


Castro and McQuinn 15 – * Vice President of the Information Technology and Innovation Foundation and Director of the Center for Data Innovation, B.S. in Foreign Service from Georgetown University and an M.S. in Information Security Technology and Management from Carnegie Mellon University, AND ** Research Assistant with the Information Technology and Innovation Foundation, B.S. in Public Relations and Political Communications from the University of Texas (Daniel and Alan, Beyond the USA Freedom Act: How U.S. Surveillance Still Subverts U.S. Competitiveness, Information Technology and Innovation Foundation, June 2015, http://www2.itif.org/2015-beyond-usa-freedom-act.pdf?_ga=1.33178294.940386433.1435342104)//JJ

In the short term, U.S. companies lose out on contracts, and over the long term, other countries create protectionist policies that lock U.S. businesses out of foreign markets. This not only hurt s U.S. technology companies, but costs American jobs and weakens the U.S. trade balance. To reverse this trend, ITIF recommend s that policymakers:  Increase transparency about U.S. surveillance activities both at home and abroad.  Strengthen information security by opposing any government efforts to introduce backdoors in software or weaken encryption.  Strengthen U.S. mutual legal assistance treaties (MLATs) .  Work to establish international legal standards for government access to data.  Complete trade agreements like the Trans Pacific Partnership that ban digital protectionism, and pressure nations that seek to erect protectionist barriers to abandon those efforts .

Cloud computing not feasible – security hurdles


Xiao and Chen 15 – *professor at the Department of Software Engineering at Hainan Software Profession Institute AND **Assistant Professor in Operations Management at New York University, PhD (Ziqian and Jingyou, Cloud Computing Security Issues and Countermeasures, Proceedings of the 4th International Conference on Computer Engineering and Networks p. 731-737, 2015, http://link.springer.com/chapter/10.1007/978-3-319-11104-9_85)//JJ
Cloud Computing Security Challenges

New Risks Brought by Virtual Technologies

Virtualization brings new risks mainly in the virtual machine being abused, the virtual machine escape, and multi-tenant isolation between the failures of security policy migration of virtual machines.

Shared Data Security Environment

Under the cloud service model, users are very worried about whether the data stored in the service provider will be compromised, tampered, or lost. Man-made threats facing the user data mainly come from service providers, hackers, malicious neighboring tenants, and subsequent tenants.

Cloud Platform Application Security

There are some application security problems existing in Cloud Computing Services, no matter Saas, Paas or Iaas, mainly including three categories. The first one is the malicious program review. The second one is the application interface security. The third one is code and test safety.

Authentication and Access Control in the Cloud Service Model

Under the cloud service model, user authentication and access control face new challenges, for example, the authentication and authorization of massive users, the rational division of access rights, and the management of accounts, passwords, and keys. In dealing with massive users’ changeable business and their identification, the cloud service providers need to fully automate users’ authentication and access management.




1   2   3   4   5   6


The database is protected by copyright ©ininet.org 2016
send message

    Main page