|By Cloud Best Practices Network||
|December 6, 2012 06:45 AM EST||
Naturally one of the critical areas specified in the Canadian E-Health Cloud strategy document is the risks related to data privacy.
Specifically in section 8, from page 42 through 49, they describe the comprehensive standards, audit and certification frameworks that will be required to protect this next major phase of Cloud adoption.
CHI point to the number one risk issue cited by CIOs – Fears of inadequate data privacy protections, and they describe the various component parts what is required to address these risks including due diligence procedures and state of the art privacy controls.
Throughout the document they also identify the technologies needed to achieve compliance with these new capabilities, such as Federated Identity and Consent Management applications, that they describe as new ‘greenfield’ apps for them.
We can see an example of this through the Real Me service from the New Zealand Government. Developed in conjunction with their national postal service they have deployed a novel service for online Identity authentication and related access, with over 40 different government service providers unified into delivery for half a million users.
This implements an ‘iCMS‘ – Extended Authentication Context Management Service, that utilizes a security token service based on WS-Trust Messaging and SAML tokens, Identity open standards from OASIS, enabling:
- Pseudonymous Authentication, via ‘federated sharing tags’
- Two-factor authentication through text message to cell phone
- Verified Data – A secure, privacy-centric data exchange
- A clear consent model – An extensible data across multiple providers
- Government Cloud attribute provider: Drivers licence information
These trends will have uniquely dramatic changes to how software architecture is designed and implements, as ‘Cloud SOA’ will emerge by utilizing this plumbing, features the NZL Government such as a “privacy domain bus” for managing exchanges of data between applications.
Oct. 8, 2015 05:30 PM EDT Reads: 224
Oct. 8, 2015 05:30 PM EDT Reads: 141
Oct. 8, 2015 05:30 PM EDT Reads: 225
Oct. 8, 2015 05:15 PM EDT Reads: 242
Oct. 8, 2015 05:15 PM EDT Reads: 119
Oct. 8, 2015 05:00 PM EDT
Oct. 8, 2015 04:30 PM EDT Reads: 7,462
Oct. 8, 2015 02:45 PM EDT Reads: 494
Oct. 8, 2015 02:30 PM EDT Reads: 645
Oct. 8, 2015 01:00 PM EDT Reads: 760
Oct. 8, 2015 01:00 PM EDT Reads: 474
Oct. 8, 2015 01:00 PM EDT Reads: 257
Oct. 8, 2015 12:45 PM EDT Reads: 508
Oct. 8, 2015 12:00 PM EDT Reads: 605
Oct. 8, 2015 12:00 PM EDT Reads: 576
Oct. 8, 2015 11:00 AM EDT Reads: 727
Oct. 8, 2015 07:00 AM EDT Reads: 5,865
Oct. 8, 2015 06:00 AM EDT Reads: 759
Oct. 8, 2015 04:00 AM EDT Reads: 488
Nowadays, a large number of sensors and devices are connected to the network. Leading-edge IoT technologies integrate various types of sensor data to create a new value for several business decision scenarios. The transparent cloud is a model of a new IoT emergence service platform. Many service providers store and access various types of sensor data in order to create and find out new business values by integrating such data.
Oct. 8, 2015 04:00 AM EDT Reads: 543