Anonymity and authenticity in the cloud: Issues and applications

Eric P. Delozier

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

Purpose: The purpose of this paper is to describe personal privacy and data authenticity problems in the cloud and provide solutions to reduce or eliminate them. Design/methodology/approach: This paper reveals issues and applications of anonymity and authenticity in the cloud. It outlines common privacy settings of five web browsers, anonymous browsing on the Tor network and standard methods for verifying the integrity of files obtained in the cloud. Findings: Cloud computing is an emerging technology for libraries which must balance the convenience of ubiquitous access against the potential risks for loss of anonymity and authenticity. Originality/value: This article contributes to the body of literature on user privacy and data preservation in the cloud and their impact on the library community.

Original languageEnglish (US)
Pages (from-to)65-77
Number of pages13
JournalOCLC Systems and Services
Volume29
Issue number2
DOIs
StatePublished - May 1 2013

Fingerprint

anonymity
authenticity
privacy
Web browsers
Cloud computing
integrity
methodology
community
Values

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Education
  • Library and Information Sciences

Cite this

Delozier, Eric P. / Anonymity and authenticity in the cloud : Issues and applications. In: OCLC Systems and Services. 2013 ; Vol. 29, No. 2. pp. 65-77.
@article{818af6d10c8a499cbce916c04736da11,
title = "Anonymity and authenticity in the cloud: Issues and applications",
abstract = "Purpose: The purpose of this paper is to describe personal privacy and data authenticity problems in the cloud and provide solutions to reduce or eliminate them. Design/methodology/approach: This paper reveals issues and applications of anonymity and authenticity in the cloud. It outlines common privacy settings of five web browsers, anonymous browsing on the Tor network and standard methods for verifying the integrity of files obtained in the cloud. Findings: Cloud computing is an emerging technology for libraries which must balance the convenience of ubiquitous access against the potential risks for loss of anonymity and authenticity. Originality/value: This article contributes to the body of literature on user privacy and data preservation in the cloud and their impact on the library community.",
author = "Delozier, {Eric P.}",
year = "2013",
month = "5",
day = "1",
doi = "10.1108/10650751311319278",
language = "English (US)",
volume = "29",
pages = "65--77",
journal = "Digital Library Perspectives",
issn = "1065-075X",
publisher = "Emerald Group Publishing Ltd.",
number = "2",

}

Anonymity and authenticity in the cloud : Issues and applications. / Delozier, Eric P.

In: OCLC Systems and Services, Vol. 29, No. 2, 01.05.2013, p. 65-77.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Anonymity and authenticity in the cloud

T2 - Issues and applications

AU - Delozier, Eric P.

PY - 2013/5/1

Y1 - 2013/5/1

N2 - Purpose: The purpose of this paper is to describe personal privacy and data authenticity problems in the cloud and provide solutions to reduce or eliminate them. Design/methodology/approach: This paper reveals issues and applications of anonymity and authenticity in the cloud. It outlines common privacy settings of five web browsers, anonymous browsing on the Tor network and standard methods for verifying the integrity of files obtained in the cloud. Findings: Cloud computing is an emerging technology for libraries which must balance the convenience of ubiquitous access against the potential risks for loss of anonymity and authenticity. Originality/value: This article contributes to the body of literature on user privacy and data preservation in the cloud and their impact on the library community.

AB - Purpose: The purpose of this paper is to describe personal privacy and data authenticity problems in the cloud and provide solutions to reduce or eliminate them. Design/methodology/approach: This paper reveals issues and applications of anonymity and authenticity in the cloud. It outlines common privacy settings of five web browsers, anonymous browsing on the Tor network and standard methods for verifying the integrity of files obtained in the cloud. Findings: Cloud computing is an emerging technology for libraries which must balance the convenience of ubiquitous access against the potential risks for loss of anonymity and authenticity. Originality/value: This article contributes to the body of literature on user privacy and data preservation in the cloud and their impact on the library community.

UR - http://www.scopus.com/inward/record.url?scp=84878257186&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84878257186&partnerID=8YFLogxK

U2 - 10.1108/10650751311319278

DO - 10.1108/10650751311319278

M3 - Article

AN - SCOPUS:84878257186

VL - 29

SP - 65

EP - 77

JO - Digital Library Perspectives

JF - Digital Library Perspectives

SN - 1065-075X

IS - 2

ER -