Quantcast
Channel: Datacentre Management . org » Encryption
Viewing all articles
Browse latest Browse all 10

The Do’s and Don’ts of Safeguarding Cloud-based Data with Encryption

$
0
0

The Do's and Don'ts of Safeguarding Cloud-based Data with Encryption

One of a biggest stumbling blocks for companies considering entrusting a cloud-computing businessman with their information is a risk of unintended information exposure. A lot of information is sensitive. It competence enclose employees’ financial information, patients’ statutorily stable health information, other regulated information or exclusive egghead property. Quite often, companies feel some-more control when they keep that arrange of information in-house. But a risk that a cloud businessman competence not hoop your information as firmly as you’d like can be mitigated.

One good approach to do that is with encryption. An encryption algorithm encodes data, digest it mysterious to those who don’t possess a decoding key. The thought is that, if encrypted information falls into a wrong hands, it will be of small or no use though a encryption key. This can assistance lessen concerns associated to the data being hacked or even being legitimately accessed by a government, that is a sold regard when the data center where a information is being stored by the cloud vendor is located in a unfamiliar country.

If you’re depending on encryption to strengthen your cloud-based data, you’ll need to establish how a cloud businessman facilitates encryption. Questions to ask embody a following:

* Does a cloud businessman encrypt your information both during rest and in transit?

* What turn of encryption does a cloud businessman occupy (128-bit, 256-bit, etc.)?

* Who has entrance to a encryption pivotal (customer, cloud vendor, third parties, pivotal escrow)?

* What encryption standards have been employed by a cloud vendor? For example, Federal Information Processing Standard (FIPS) 140-2?

*How are encryption keys managed, and where is a encryption pivotal located?

This final doubt is quite critical since messy doing of a pivotal can annul a value of encryption. For example, in Dec 2011, SpecialForces.com was hacked by a hacktivist organisation Anonymous). SpecialForces.com’s information was encrypted, though those diligent Anonymous folks hacked in again, found and accessed a encryption keys, used them to decrypt a information performed during a initial hack, and posted that information on a Web for open viewing.

Even when used and configured appropriately, encryption isn’t always a china bullet. As with many risk slackening strategies, there’s a trade-off between costs and benefits. Risk competence go down with encryption, though adding encryption typically increases a sum cost of regulating a cloud solution. What’s more, adding encryption can outcome in slowed or discontinued opening due to a additional stairs introduced into a process. And in shortening one risk, an wholly new one is introduced: If a encryption pivotal is lost, a information can no longer be decrypted and radically becomes useless, even to a customer.

Meanwhile, cloud vendors themselves are building and deploying choice techniques for digest compromised information useless. Examples embody these two:

* Distributed record systems — Individual files are radically separate into mixed pieces and stored on mixed machines in mixed locations. The thought is that if any one information component falls into a wrong hands, it will be of small or no value though entrance to a remaining tools of a file.

* Data masking/obfuscation — The attribute of supportive information to associated information elements and/or information subjects is obscured, digest a information invalid should it be inappropriately accessed.

Any association meditative about adopting a cloud-computing use should brand a mechanisms for addressing information risks that a businessman uses or supports, establish that accommodate a customer’s needs and safeguard that those are codified in a agreement as smallest requirements.

Article source: http://www.computerworld.in/news/dos-and-donts-safeguarding-cloud-based-data-encryption-48162012


Viewing all articles
Browse latest Browse all 10

Latest Images

Trending Articles



Latest Images