HPC

Using Cloud Encryption for Cloud-Storage

cloud-encryption

While many organizations are looking to take advantage of the cloud-storage, data security remains a top concern. However, effective data protection and strong encryption in the cloud is possible and available through a number of cloud solutions.
Cloud-Encryption

What is Cloud Encryption?

Cloud encryption is a service offered by cloud storage providers where by data, or text, is transformed using encryption algorithms and is then placed on a cloud storage.
Cloud encryption is the transformation of a cloud service customer’s data into cipher text. Cloud encryption is almost identical to in-house encryption with one important difference — the cloud customer must take time to learn about the provider’s policies and procedures for encryption and encryption key management. The cloud encryption capabilities of the service provider need to match the level of sensitivity of the data being hosted.
Because encryption consumes more processor overhead, many cloud providers will only offer basic encryption on a few database fields, such as passwords and account numbers. At this point in time, having the provider encrypt a customer’s entire database can become so expensive that it may make more sense to store the data in-house or encrypt the data before sending it to the cloud. To keep costs low, some cloud providers have been offering alternatives to encryption that don’t require as much processing power. These techniques include redacting or obfuscating data that needs to remain confidential or the use of proprietary encryption algorithms created by the vendor.
In the past, many businesses felt comfortable allowing the cloud provider to manage encryption keys, believing that security risks could could be managed through contracts, controls and audits. Over time it has become apparent, however, that cloud providers cannot honor such commitments when responding to government requests for information. How quickly time flies, yesterday you were watching hentai porn on your computer, and today is The VR era for hentai . Just think what opportunities will open to users.

What are the Challenges in Cloud Encryption?

  • Key management: A robust encryption system rests on the encryption key used to map user accounts to data stored. The best practices call for separating the key database by using a different server, but for most vendors this gets overlooked or is not feasible. Whatever be the case, the result is a weaker system as far as security is concerned.
  • Reseller challenges: For resellers there’s an additional layer of challenge because they are not in direct control of the resources. If the base solution doesn’t provide mechanisms to put in place an encryption system, then the client’s data is compromised. This, of course, is a severe limitation both for the reseller as well as the enterprise involved.
  • Performance: Encryption is a processor-intensive activity, and more advanced forms of it can drain system resources. This can cramp the entire performance or the cloud server considerably, and is another reason why end to end encryption is not possible for most.

Those looking to truly secure cloud services need to look into the sharp bends of encryption and reach maximum effectiveness. For many it calls for investing in secure systems, which may not have been part of their original planning.

Recommendation for Cloud Encryption

When processing of sensitive data takes place in the cloud, users take advantage of the cloud’s economy of scale and elasticity. The data should remain encrypted up to the moment of use and that both the decryption keys and the decrypted versions of the data should be available in the clear only within a protected transient memory space.
Both the keys and the clear text versions of the sensitive data must be auditably wiped so that no copies are ever written to disk. Also, the processing must never write copies of the clear text sensitive data to any logs or other persistent records.
Also Read: What are the Benefits of Cloud Computing?

source:
www.ramco.com/blog/cloud-encryption-challenges
http://www.tomsitpro.com/articles/cloud-data-encryption,2-913.html


                                

Leave a Comment

Your email address will not be published.

You may also like

Read More