Identity Protection
Data traveling over the Internet provides valuable information about people. Search keywords, credit card usage, and mobility patterns are just a few examples of information that can be used to identify and track individuals from supposedly anonymized data; attackers can also exploit this information.
This same data is available practically without restrictions to cloud service roviders. For example, some cloud service providers’ business models include targeted advertising that is based on monitoring account traffic or data stored on user accounts.
By profiling users, it becomes easier to identify client interests, which facilitates targeted advertising and marketing.
Data mining is often performed on data stored in the cloud, with or without the client’s explicit consent. Although this might not breach the client’s privacy if performed properly, it’s certainly an aspect that clients need to be aware of.