You're hearing a lot about the wonders of cloud computing at this year's CES . And while that has different applications for the enterprise level than consumer, the practical reality of it for most PC users (and laptop users especially cough-cough-Chrome OS-cough) is that you're taking the data that would otherwise reside on a system within your control and placing it in the hands of another entity. It's not quite a question of "open data," as that phrase is more used to describe the concept of data that's accessible to all. But cloud computing does open up your data.
Cloud applications can be super-useful when you let others run the services that improve your geeky life. Your data, however, is your own. And the more consumers coalesce their computing lives into access points, the more this data becomes ripe for abuse... or worse.
But don't let me be the sole voice of reason on this one. Just this week, the Federal Trade Commission sent a letter to the Federal Communications Commission--more a missive--detailing the exact issues that cloud computing brings to the table. Quoth the FTC:
"For example, the ability of cloud computing services to collect and centrally store increasing amounts of consumer data, combined with the ease with which such centrally stored data may be shared with others, create a risk that larger amounts of data may be used by entities in ways not originally intended or understood by consumers."
Now, I don't want to point figures and suggest that a specific company would use your data in an erroneous fashion. But it's not as if this would be an unfamiliar concept in the world of big business. And it doesn't even have to be a purposeful reworking of your information--like a mash-up of search history, the contents of your documents, or your gaming preferences with a healthy dose of advertising or services promotions.
Consider a simple transaction like uploading a picture to a social network. Although there might not be anything potentially marketable for a cloud service provider to see a shot of you at a company holiday party, you've nevertheless turned over a critical measure of control to an entity that might not have your interests at the forefront of its daily operations. What happens when you want to delete the picture that's seemingly under your control? Now what if this picture was a critical legal document or list of all your passwords?
Let's take it one step farther: A few proposed solutions for Cloud security are currently floating on the marketplace, but I don't think that there's enough being done to secure the transaction and the method of transaction between you and the third-party service you interact with.
My iPhone is the first such example that comes to mind. I can buy plane tickets with an iPhone app, I can check my bank account with an iPhone app, all my email comes directly through an iPhone app, et cetera. Now, suppose someone gets their hands on my phone. All the hardware encryption in the world isn't going to stop a dedicated enthusiast from breaking through the castle door and storming through my social networks to build up a list of my logins, passwords, and other critical information.
That's one scenario. Here's another: Given that so few applications are set to run in a virtualized environment, it almost doesn't matter if an unscrupulous person gets physical access to a machine. All it takes is a few exploits to plant the seed for data or authentication theft. From there, it's only a matter of time before the totality of one's accounts is compromised--remember, the cloud stores your data now, not your desktop. It would be much easier to access a PDF being passed from host to cloud or stored on a server somewhere than it would via a folder on your hard drive.
I could go on, just as I could likely list out quite a number of ways you could accidentally destroy your PC throughout the course of your day. The point is not what cloud can do to ruin your life, but rather, what preventions will the industry need to enact to ensure seamless cloud adoption? This a three-way tango: