Printer Friendly

Personal Data in Cloud. Russia Experience.

1. Introduction

1.1. Main issues of this article

The term <<cloud computing>> is often used in various spheres of public life. <<Cloud computing>> refers to technology, which is created to optimize business processes and improve the service quality, different service providers and to increase people's informatization level. Questions on people's interpersonal relationship are arising more often in the field of medicine, government, the banking and private sector. The application of cloud computing is a strategy important development for the computer technologies and provides different services.

The active introduction of cloud computing (CC) put questions to the legislator about the specifics of regulating these people's behavior online. These are questions of data security when it is stored in the cloud computing and question of whether the cloud computing is private or government owned. Question as to the requirements for the cloud Internet Service Provider's (ISP) effective functions as well as ISP's responsibility for it is own action and those of third parties, remain unanswered. Is it possible to on sure that technology which allows us access to the cloud computing is reliable and safe? What if public information and IT systems are hosted abroad?

Whether the government has determined the requirements for ensuring the security of information and emerging relationships the proper regulation and trust of citizens to the security of relationships depends.

The authors of this article will try to answer these questions.

1.2. Definition "cloud computing" in Russia

The State Program of the Russian Federation <<Information Society (2011-2020)>> [4] considers the development of cloud computing to be one of the main priorities. The creation of a national platform of cloud computing is provided in this government program. It is planned to connect all the public authorities of the Russian Federation in the period of 2011-2020. In 2010 to a Russian platform, the Deputy Minister of Ministry of Communications and Mass Communications of the RF said that <<these kinds of proprietary technologies in Russia are practically absent therefore, this sector is actively engaging with foreign companies such as Google>> [25].

Despite the active application of the term <<cloud computing>> in the Russian Federation, this term has no legislative definition. Despite this, <<cloud computing>> was taught at technical universities in 1990s and the further development of this technology at public institutes was predicted. Consequently, we used to definition which the Institute of Electrical and Electronics Engineers (IEEE) gave. According to the IEEE's definition published in 2008, <<Cloudy data processing is a paradigm within which information is constantly stored on servers on the Internet and is temporarily cached with the client party, for example, on personal computers, game consoles, laptops and smartphones>>. [14] The IEEE, investigating the prospects of developing cloud computing drew a parallel between this technology and the Internet. In Russia, the following IEEE companied operate in Siberia, Northwest (St. Petersburg) and Central Russia (Moscow) [15].

The Strategy of the development of the information society in the Russian Federation for the years 2017-2030 [10] defines the notion of "cloud computing" as an model of information technology, by use of the Internet, for ubiquitous and convenient access to a common set of configurable computing resources ("cloud"), data storage devices, applications and services which can be quickly provided and freed from the load with minimal operating costs or practically without the participation of the provider. Cloud computing is considered to be a platform, which provides various different services.

However, it is only classified in the technical sphere, and so the following classification of cloud computing is accepted:

1) SaaS (Software as a service)--in this case the user of cloud computing is granted the right to use and access the necessary software.

2) IaaS (Infrastructure as a Service)--the user of cloud computing is granted the right to use the provider's hardware- software complex for work and data storage.

3) PaaS (Platform as a Service)--the user of cloud computing is granted the right to use a hardware-software complex for to development, testing, expansion and support of web applications.

On 2013, the Russian Federation service for technical export control (FSTEC) set out project the State standard which defined the cloudy services such as:

* Hardware as a service (HaaS);

* Safety as a service (SecaaS);

* Business process as a service (BPaaS);

* Data as a service (DaaS);

* Trust as a service (TaaS);

* Infrastructure as a service (IaaS);

* Cloud development environment as a service (CDPaaS);

* Communication as a service (CaaS);

* Platform as a service (PaaS);

* The connection as a service (CnaaS);

* Transparency as a service (TraaS);

* Workplace as a service (WaaS).

In this article we will not consider the questions of processing of the state secrets or publicly accessible data by the CC. Of course, answers to the above questions are linked to category owner of cloud, whether they are a state or individuals , so cloud computing depending on the subject to whom they belong, can be public or private. Public clouds belong to the state authorities or the local council.

Furthermore, public cloud data may be better protected than the private cloud computing. The cloud technology can belong to foreign or Russian ISPs. Information can be public or have limited access (ch.2 Art. 5 of Federal law information, Informational Technologies and Protection of Information))). Limited access information can be personal data, <<know-how>> and secrets data importation from companies, and is regulated only by the Federal legislation.

2. Legal regulation on use of personal data in Russia

In 2014, a Russian Advisory council from the Ministry of Telecoms and Mass Communications was created to improve the development and implement a state policy and standard and legal regulation of cloud computing. The Advisory council aimed to develop suggestions for improving the legislation for cloud computing; ensure the regular interaction of the Ministry of Telecoms and Mass Communications with the expert community on cloud technologies. [2].

Experts in the technical sphere claim that it is impossible to ensure the absolute safety of these technologies. [18] Noriswadi Ismail has also written about these problems. [21], P.250]

We consider the difficulties that legislation encounters when trying to ensure the protection of limited access data, such as personal data[19]. As Angela Adrian remarks, "how should legal rules change to accommodate the new communication technology? If cloud computing does not alter our fundamental values, how should legal rules adapt and change in order to maintain our current values? What should the substance of our rules be in light of the changing environment for the actors in the cloud? [17], P.49]

According to Art. 7 of the Russian Federal law <<On personal data>> [5] <<the operators of personal data and other persons who accessed to personal data are obliged not to disclose this information to third parties and not to impart personal data without consent of the subject of personal data . The other cases must be provided by the law>>.

What ought to be done if information is stored in a foreign cloud?

According to item 11. Art. 3 of the Federal law <<On personal data>> the cross-border transfer of personal data is the transfer of personal data to the territory of the foreign state, to the authority of the foreign state, to a foreign national person or the foreign legal entity.

Therefore, we can understand the cross-border transfer of personal data as the transmission of personal data of any person from the Russian Federation to a foreign person abroad. For example, when any person is filling in a form online to purchase goods from a foreign seller.

Art. 19 of the Law <<On personal data>> states that the Russian operator of personal data has to establish in the agreement with the foreign handler of the information, the duty to comply with the confidentiality of personal data, to ensure to safety of personal data, and also to comply with other requirements to protect the personal information. According to item 3. Art. 12 of the Law <<On personal data>> the operator of personal data must be convinced that the foreign country to which the data are transferred provides an adequate protection of the people's rights to their personal data. The Federal law <<On personal data>> specifies that states can be submitted as two groups of countries:

1) Member countries of the Convention for the Protection of Individuals with regard to the Automatic Processing of Personal Data (1981); (This Convention came into force in the Russian Federation on September 1, 2013) [11]

2) Countries which are not the party to the Convention for the Protection of Individuals with regard to the Automatic Processing of Personal Data (1981), but which are listed as foreign states which provide adequate protection of the people's rights to their personal data. This is such countries (1).

The Russian Ministry of Telecom and Mass Communications in unofficial letter on May 13, 2009 explained that <<the adequacy of protection means that foreign state provides the level of security of people's rights to their personal data, not below the standards provided in Russia. One of the assessment criteria of the state in this aspect is ratification of the Convention for the Protection of Individuals with regard to the Automatic Processing of Personal Data (1981)>> [12]

However, if the cross-border transfer of personal data is being carried, out in foreign states which are not providing adequate protection people's rights to their personal data, then the operator of personal data must receive, in written form, that consent person's for their personal data to be transferred. This relationship between foreign ISP (operator of personal data) and the owner of personal data is regulated by two the Russian laws. They are the Federal law <<On personal data>> and the Federal law <<On electronic signatures>>. [7]

Accordance with part. 4 Art. 9 of the Federal law <<On personal data>> the participants in the relationship have the right to use an electronic signature to create a written form of their agreement. Art. 4 of the Federal law <<On electronic signatures>> defined the rights of parties in the electronic interaction to use any information technology and (or) the technical means, to apply an electronic signature. However, the Federal law <<On electronic signatures)) requires that participants (operator of personal data and the owner of personal data) must approve of these actions. This approval can be placed on the main web page of the cloud operator which handles personal data (ISP of personal data) on the conditions of using the type electronic signature and the technologies. The subject of personal data must agree with these conditions.

Although, there is another opinion, Kanashevsky V. writes that sending an e-mail message of the Russian's users to the foreign cloud ISP's of personal data no is electronic document signed the electronic signature. <<The foreign operator potentially can be brought to civil liability in accordance with Russian law. In connection with this action, the claim for the damages and compensation for moral damages can be brought to the foreign operator. (Art. 17 of the Federal law <<On Personal Data>>). [20]

This opinion is erroneous. Firstly, the Federal law <<On electronic signatures>> points directly to the recognition of foreign electronic signatures. Article 7 of this Federal law indicated that <<if the electronic signature is created in accordance with the law of a foreign state and the international standards then it is being recognized in the Russian Federation as the electronic signatures of the type which correspond the Federal law <<On electronic signatures>>. Also, according part 2 of Art. 7 of the Federal law <<On electronic signatures>> an electronic document signed by electronic signatures cannot be regarded as illegal only on the basis that the key's certificate of the electronic signature verification is issued in accordance with the rules of the foreign law. [7]

Secondly, part 2 of Art. 9 of the Federal law <<On personal data>> determines that consent of the subject of personal data can be given in any form which allows officially confirm receiving this consent.

Thus, the Federal law <<on personal data>> and the Federal law <<on electronic signatures>> define the legal conditions of recognition the consent.

However, be aware that Federal law <<On personal data>> allows to the ISP (operator) of personal data to not obtain the consent of the subject of personal data if cross-border transfer of personal data is carried out <<for the execution of the contract. And party to this contract is the subject of personal data (person) >> (part 4 Art. 12 of the Federal law <<on Personal Data >>). Thus, this Federal law indicates the presence of the preliminary agreement on cooperation.

In addition, there is one additional exception by which the telecom operator does not have to obtain the consent of the subject personal data. So, in 2013, the Russian Federal law <<On communications)) was changed [8] [Federal law <<On Communications))]. Art. 53 of this law was added the right of the telecom operator This right allows to the telecom operator entrust the processing of personal data to third parties without received the consent of person on this. But only, if the telecom operator processes the parties' personal data in according with contract for the provision of telecommunications services. And (or) the telecom operator acts for the implementation of the rights and legitimate interests of the service provider or the citizen. However, the Federal law <<on Communications>> did not disclose whether the operator must warn of the fact that personal data was processed by a third party.

Thus, the opinion about the complexities of the processing of personal data by the foreign cloud ISP (or operator of personal data) is a fallacy in most cases.

In 2013-2014, the total transmission model (provision) of personal data to external operators was changed in Russia. Expanded the list of cases in which the consent is not required of the subject of personal data on processing his data by third parties.

3. Ensuring the technological security of the transmission and processing of personal data.

Of course, the cross-border transfer of data is associated with problems of the ensuring the technological security of the transmission and processing of personal data. However, here it is necessary to take into account the opinion of technical experts, who believe that there are no absolutely safe technologies. Furthermore, there is a problem of difficulty of selecting a required standard of the existing standards. For example, in the report of the Europe Commission are indicated a problem of the difficulty in the selection of standards: "a jungle of standards generates confusion by, on one hand, a proliferation of standards and on the other hand a lack of certainty as to which standards provide adequate levels of interoperability of data formats to permit portability; the extent to which safeguards are in place for the protection of personal data; or the problem of the data breaches and the protection against cyberattacks...>> [27]

But here it is necessary to bear in mind that there is no legal prohibition on the choice of the standards on the territory of the Russian Federation countries. The Federal Service for Supervision of Communications, Information Technology, and Mass Media (Roskomnadzor) of the Russian Federation accepted the <<Methodical recommendations on the choice of methods of depersonalization of personal data>>. [16] In this methodical recommendations are submitted various methods to anonymize personal data. In case the depersonalization of personal data, the complexity of the selection standards is eliminated.

Providers of cloud services must address the questions of data security. Technological complexity of security in the cloud is that the virus-infected file from one client allows to infect this virus other connected and non-performing clients. In connection with this, there is the danger of cracking data is stored in the cloud. The responsibility for protection lies on the provider. Users of cloud services need to be sure that the provider is using security tools that reduce the likelihood of offending. The provider of cloud services should allow the user to check the level of protection and should to record the actions of all actors who have gained access to the cloud.

If there are no special requirements of the law, an owner of cloud computing can voluntarily be audited and certified by the ISO / IEC 27001: 2005 and (or) SAS 70 Type II and Type I.

The European Network and Information Security Agency (ENISA) proposed using ISO27001. Moreover ENISA pointed out that <<all suppliers must demonstrate compliance. They are NOT required to be accredited but compliance is verified through yearly submission of their information security management system and associated policy documents.

In Russia, according to the Order of the Government of the Russian Federation of 22.02.2012 No.238-p OJSC <<Rostelecom>> appointed as the sole executor for the further creation and development of complex information technology and telecommunications infrastructure and e-government for 2012-2014.

<<Rostelecom>> must execute the list of activities of the Russian state program information Society (2011-2020 years)>>. This program include the development of the portal of public services, the development of a common space of trust in electronic signatures, the development of interagency electronic interaction and a single identification system. It is planned that <<Rostelecom>> will engage the development of mechanisms which enable the use of mobile devices for access to e-government services and to the state-mail address which using for the interaction between citizens and government agencies.

The <<Rostelecom>> must create the common directories and the qualifiers for the state information systems and it must create the projects such as <<Electronic Registry office>>, <<E-Region>> and <<E-democracy>>. The basis for the implementation of these systems is cloud computing platform. The project offers infrastructure and software as a service (IaaS and SaaS).[16]

Strategy of development of branch of information technologies in the Russian Federation for 2014-2020 and on prospect till 2025 provides creation of a national platform of cloud computing. [9] For these purposes the State defines itself as the customer of these works in the Russian market of information technologies.

The <<Rostelecom>> has developed and has launched cloud platform in August 2011. This platform helps the "Rostelecom" in selling their computing resources and software to third-party. In the future, this platform can be an integrated into the national platform of cloud computing.

Currently, in the Russian Federation plans to create seven powerful data centers, on the basis of which will be provided the cloud services for government agencies and academia. Including, the public services platform <<Gospriklad>> was developed for the provision of public services. [23]

4. Conclusion

The Decree of the Government of the Russian Federation of July 20, 2011 N 1275 p approved the Concept creation and development of an integrated information system of state management of public finances <<Electronic budget>>. This Concept is recommended to the executive authorities of the Russian Federation and local authorities for the development of systems of public (municipal) finance. The subsystems of the system <<Electronic budget>> will be available as service subsystems for use by the subjects of the Russian Federation, the municipalities or the government sector organizations on a pro bono basis. The subsystems of the system <<Electronic budget>> will be submitted as model of <<software as a service>> (SaaS).

Single portal of the budget system of the Russian Federation will consist of closed and of open parts.

The open part of the portal is being provided as a public information resource, providing free access to the regulatory, statistical and analytical information in the management of public finances.

The storage and the processing is being carried out in a centralized service of the system <<Electronic budget>> which is a source of information to be placed in the open part of the portal.

Closed part of the portal consists of a <<private offices>> available to users with the appropriate powers and which have keys of an electronic signature certificates. Closed part of the portal is the single point of user access to the functions of centralized and service subsystems <<Electronic budget>>. This system includes a single, unified system of management of user access levels depending on their powers for the all functions of subsystems <<Electronic budget>>.

The government services will be available to users cloud platform in the areas applications of the medicine, housing, energy, transport and others. In addition, the online service has created for work with documents.

Unfortunately, in the Russian Federation there are not many examples of the use of models of public services based on cloud computing. Although, with 2013 in Russia is being actively implemented the idea of cloud computing in government.

Thus, we need to understand the technology and their reliability before using cloud technology. The ISP of cloud computing should prescribe in the contract the level of service. of course, the using the cloud computing has disadvantages which carry new risks. These risks are actually as Russia and other country.

Firstly, the user does not own or have not access to the inside the cloud. Safety of the user data is highly dependent from the company's ISP.

Secondly, there are no generally accepted standards in the direction of cloud computing security.

Originally, the owner of the <<cloud>> developed the standards of the safety. He is free to choose the models and mechanisms of protection.

Thirdly, there is no definite answer about the responsibility of the subject providing the service to the user.

Fourthly, ISP of personal data must ensure conditions of use of electronic signatures.

The results of this study will be used in further science researches that aimed at identifying approaches to organizing and securing the digital economy in Russia.

DOI: 10.2507/28th.daaam.proceedings.158

5. Acknowledgments

We thank the Russian Humanitarian Science Foundation for their assistance in the project "Comparative legal research methods of information security in the Russian Federation and EU Members (No. 16-03-00679)".

6. References

[1]. https://cloudsecurityalliance.org/media/news/csa-survey-reveals-emerging-intemational-data-privacy-challenges/ (2014) Cloud Security Alliance. Published 2014, 23, September. New Cloud Security Alliance Survey Reveals Emerging International Data Privacy Challenges. Accessed on: 2017-10-13.

[2]. The Order of the Ministry of Communications and Mass Communications of the Russian Federation N 178 of June 30, 2014 <<On the Council of Experts on the use of cloud computing in the Ministry of Communications and Mass Communications of the Russian Federation>>

[3]. The Strategy of the development of the information society in the Russian Federation for the years 2017-2030. approved by the Decree of the President of the Russian Federation of May 9, 2017 No. 203

[4]. The State Program of the Russian Federation "Information Society (2011-2020)" endorsed by Order of the Government of the Russian Federation No. 1815-r of October 20, 2010

[5]. Federal law "On Personal Data" No. 152-FZ of July 27, 2006

[6]. Federal law "On Information, Informational Technologies and Protection of Information" No. 149-FZ of July 27, 2006

[7]. Federal law "On Electronic Signature" No. 63-FZ of April 6, 2011

[8]. Federal law "On Communications" No. 126-FZ of July 7, 2003

[9]. The Strategy of development of branch of information technologies in the Russian Federation for 2014-2020 and on prospect till 2025 endorsed by Order of the Government of the Russian Federation of November 1, 2013. Implementation of the cross-border transfer of personal data

[10]. The Strategy of the development of the information society in the Russian Federation for the years 2017-2030. approved by the Decree of the President of the Russian Federation of May 9, 2017 No. 203

[11]. http://conventions.coe.int/Treaty/EN/Treaties/HTML/108.htm (1981) The Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data. Strasbourg, 28.I. 1981. Accessed on: 2017-1013

[12]. Letter of the Ministry of Communications and Mass Communications of the Russian Federation of 13 May 2009 N CP-P11-2502 <<On the implementation of the cross-border transfer of personal data>>

[13]. http://www.enisa.europa.eu/media/news-items/security-issues-in-cross-border-e-authentication (2017) Security Issues in Cross-border e-Authentication. Accessed on: 2017-10-13

[14]. https://ec.europa.eu/digital-agenda/node/1322 (2017) About Cloud computing. Accessed on: 2017-10-13

[15]. http://ieee.tusur.ru/ru/index.htm (2016) The Tomsk group and student's office of Institute of engineers on electrical equipment and radio electronics. Accessed on: 2016-11-09

[16]. http://minsvyaz.ru/ru/monitoring/index.php?id_4=43034 (2017) Official website of the Ministry of Telecom and Mass Communications of the Russian Federation, Accessed on: 2017-12-12

[17]. Adrian A.. (2013) How much privacy do clouds provide? An Australian perspective, Computer law & Security review, Vol. 29 Issue 1, pp. 48-57 doi.org/10.1016/j.clsr.2012.11.010

[18]. Baranov A. (2012) Can we protect in the <<cloud>> of confidential information?.-High availability systems No.2, Vol. 8

[19]. Zharova A., Elin V. (2017), The use of Big Data: A Russian perspective of personal data security, Computer Law & Security Review, Volume 33, Issue 4,pp. 482-501, doi.org/10.1016/j.clsr.2017.03.025

[20]. Kanashevsky V.A. (2012) Legal regime of cross-border transfer of Personal Data.-Legislation

[21]. Noriswadi I. (2011) Cursing the Cloud (or) Controlling the Cloud?.--Computer law & Security review Vol. 27

[22]. Official sire of the Federal Service for Supervision of Communications, Information Technology, and Mass Media (Roskomnadzor) (Accessed December 12, 2017). Retrieved from: http://rkn.gov.ru/news/rsoc/news23181.htm

[23]. http://minsvyaz.ru/ru/monitoring/index.php?id_4=41944 (2011) In 2011 the Ministry of Telecom and Mass Communications will create a resource--a gospriklad.ru. Accessed on: 2017-12-12

[24]. The Internet interview to the head of the department of information technologies, communication and information security of the Ministry of Internal Affairs of the Russian Federation, lieutenant general of internal service Tyurkin M. L. <<Development and introduction of modern information technologies in system of the Ministry of Internal Affairs of Russia

[25]. http://minsvyaz.ru/ru/monitoring/index.php?id_4=43034 (2016) Official website of the Ministry of Communications and Mass Communications of the Russian Federation. Accessed on: 2017-10-13

[26]. http://www.enisa.europa.eu/activities/risk-management/files/delrverables/cloud-computing-risk-assessment (2009) Cloud Computing. Benefits, risks and recommendations for information security. November 2009. Accessed on: 2017-10-13.

[27]. http ://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2012:0529:FIN:EN:PDF (2012) Communication from the commission to the European parliament, the council, the European economic and social committee and the committee of the regions Unleashing the Potential of Cloud Computing in Europe. Brussels, 27.9.2012 . Accessed on: 2017-10-13.

[28]. Zharova A. K., Elin V. (2015) Legal Aspects of the Use of Educational and Scientific Information Posted on the Intern et for Organizing e-Learning According to the Russian Example, in: Strategic Innovative Marketing. 4th ICSIM, Mykonos, Greece 2015. Switzerland : Springer International Publishing, 2016. doi P. 615-623.

[29]. Bahtovski A., Gusev M. (2014) Cloudlet Challenges, Procedia of 24th DAAAM International Symposium on Intelligent Manufacturing and Automation, pp. 704-711, doi: 10.1016/j.proeng.2014.03.045

[30]. Kostoska M..; Gusev M..;.Ristov S. (2014) New Cloud Services Portability Platform, Procedia of 24th DAAAM International Symposium on Intelligent Manufacturing and Automation, pp. 1268-1275, doi: 10.1016/j.proeng.2014.03.118

[31]. Katalinic. B.; Kukushkin I.; Pryanichnikov V.; Haskovic D. (2014) Cloud Communication Concept for Bionic Assembly System, Procedia of 24th DAAAM International Symposium, pp.1562--1568, doi: 10.1016/j.proeng.2014.03.156

[32]. Davidovic. V.; Ilijevic D.; Luk V.; Pogarcic I. (2015) Private Cloud Computing and Delegation of Control. Procedia Engineering, Vol.100, pp. 196-205. ISSN: 1877-7058

Anna Zharova, Vladimir Elin & Petr Panfilov

* Director of Centre for Cyberspace Research, Associate Professor, Docent, National Research University Higher School of Economics, Moscow

** Department of Information Security, Associate Professor, National Research University, Higher School of Economics, Moscow

(1) Australia-Australian alliance; The Argentine Republic ; The State of Israel; Canada; Kingdom of Morocco; Malaysia; United Mexican States; Mongolia; new Zealand; The Republic of Angola; The Republic of Benin; The Republic of Cape Verde; The Republic of Korea ; The Republic of Peru ; The Republic of Senegal; Republic of Tunisia; Republic of Chile; Hong Kong Special Administrative Region of the People's Republic of China ; The Swiss Confederation // The Order of the Federal Service for Supervision of Communications, Information Technology and Communications of March 15, 2013 N[degrees] 274 "On approval of the list of foreign countries that are not parties to the Convention of the Council of Europe Convention on the Protection of Individuals with regard to Automatic Processing of Personal Data, and provide adequate protection of human subjects personal data" // http://www.garant.ru/products/ipo/prime/doc/70268490/#ixzz3E8YwESIQ
COPYRIGHT 2018 DAAAM International Vienna
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2018 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Author:Zharova, Anna; Elin, Vladimir; Panfilov, Petr
Publication:Annals of DAAAM & Proceedings
Article Type:Report
Geographic Code:4EXRU
Date:Jan 1, 2018
Words:4720
Previous Article:Evaluation of Critical Places on Wax Patterns Of Blades.
Next Article:Methodology of Design and Validation of the Shop Floor Millrun Method.
Topics:

Terms of use | Privacy policy | Copyright © 2020 Farlex, Inc. | Feedback | For webmasters