Site icon Haznos

What Does The Future Look Like For Data Collection?

<p>The recent scandal involving the National Security Agency and the now-notorious Edward Snowden have raised many questions with regard to both what data security looks like now&comma; and what it will look like in the near future&period; Some say that data companies will create new ways to empower their customers to keep their data secure&period; And this is&comma; in fact&comma; happening already&comma; at least with one company&period; Interestingly&comma; the many views with regard to the possible future of data are all feasible&period;<&sol;p>&NewLine;<h3><strong>Google’s Attempts at Information Encryption Control<&sol;strong><&sol;h3>&NewLine;<p style&equals;"text-align&colon; left&semi;">Search Giant Google is attempting to fight government data requests in two ways&colon; via court cases and by introducing an encryption feature to its Drive product&period; Although the latter is still in its initial testing stage&comma; the feature would see Drive users being able to encrypt any files they upload to the service&period; Google&comma; as well as Microsoft have also sent in letters to the United States government&comma; which call for the body to be more transparent with regard to the data it requests for the purposes of national security&period;<&sol;p>&NewLine;<h3><strong>The Problem with Google’s Efforts<&sol;strong><&sol;h3>&NewLine;<p>There is more than one issue with Google’s desire to try and thwart government requests for information from its users&comma; some say&period; First&comma; they say that file encryption will not stop the government from collecting user data&comma; simply because there are many ways for the government to get around that strategy&period;<br &sol;>&NewLine;For one&comma; it can install its own devices on any network it wishes to eavesdrop on&comma; especially those internet providers which have decided not to comply with the demand for data&period;<br &sol;>&NewLine;As well&comma; experts are saying that this approach by Google fails because of two things&colon; the fact that files are only encrypted on the storage service&comma; and not encrypted once downloaded by the user&comma; and the fact that users have to trust the company to properly manage the security of their data&period;<&sol;p>&NewLine;<h3><strong>Data Object Security<&sol;strong><&sol;h3>&NewLine;<p>What if data could be protected&comma; both at the system level and at the system data level&quest; This theory&comma; called data object security would ensure that every file uploaded to a system would contain its own set of rules which would govern what every person who downloaded and uses the file could do with that file&period; And the rules would be different for each and every individual who viewed and used the file&period;<br &sol;>&NewLine;This would allow several people at different levels of company clearance to work on the same file&comma; without the worry that sensitive file information would be accidentally revealed at any given stage&period; This alternative has many benefits&comma; according to experts&period; First&comma; it would allow for the more accurate tracking of information by companies who use it&period; This is because each file accessed would provide clear instructions as to the individual’s permissions to use it&comma; as well as instructions detailing to whom the document would be sent next&period;<&sol;p>&NewLine;<h3><strong>Just How Much Data is There to Process&quest;<&sol;strong><&sol;h3>&NewLine;<p>The NSA has some serious data storage capability&comma; according to a recent report&period; Their Prism Data Center is allegedly 25&comma;000 square feet of server-filled halls&period; In addition&comma; cables and storage are housed in raised floor space&period; O top of that&comma; an additional over 900&comma;000 square feet will be allotted for IT admin and support&period;<br &sol;>&NewLine;All told&comma; the computing power of the Prism data center is enough to gather and process data in the yottabytes&comma; which is the next highest magnitude of data&comma; equaling 1&comma;000&comma;000&comma;000&comma;000&comma;000&comma;000&comma;000&comma;000 bytes of data&comma; or about five hundred quintillion pages of text&period; So how does a company opt out of such data-gathering power&quest;<&sol;p>&NewLine;<h3><strong>Fires Fueled With NSA Announcements and Public Outrage<&sol;strong><&sol;h3>&NewLine;<p>The always-controversial spying activities so unceremoniously announced by one Edward Snowden may have reached a fever pitch with the NSA revealing that it has conducted what it calls &OpenCurlyDoubleQuote;three-hop” analysis of user data&comma; which involves studying suspect data&comma; then the data of their contacts&comma; along with the contact’s list of contacts&period; Finally&comma; the analysis concludes with the examination of all data collected&period;<br &sol;>&NewLine;Should this type of analysis become the norm&comma; it would grossly increase teh potential for millions or billions more to be monitored by the NSA than there already are&period; And so&comma; whatever tools are available to opt out or outright thwart government data collection may be readily considered by an increasingly-frustrated public&period;<&sol;p>&NewLine;<h5>Citations&colon;<&sol;h5>&NewLine;<ul>&NewLine;<li>Google Drive and Encryption Control<&sol;li>&NewLine;<&sol;ul>&NewLine;<h5>Featured images&colon;<&sol;h5>&NewLine;<p><span class&equals;"license">License&colon; Royalty Free or iStock<&sol;span><br &sol;>&NewLine;<span class&equals;"source">source&colon; http&colon;&sol;&sol;www&period;sxc&period;hu&sol;photo&sol;918333<&sol;span><br &sol;>&NewLine;Guest author Cassandra Liam writes on a variety of topics related to technology&comma; including helping consumers understand how available internet options affect their online functionality&period;<&sol;p>&NewLine;

Exit mobile version