Cloud Computing Security Strategy Includes Cryptography

The movement of data and software services to the cloud has left some businesses feeling less secure. Skyhigh Networks brought together academic experts for the first industry-focused cryptography advisory board to provide insights on using encryption schemes as part of cloud computing security, Becca Lipman reports on Wall Street & Technology.

Secure Cloud Data Through Encryption

The use of encryption means control of business files and data remains with the firm, while the cloud services provider independently handles software and infrastructure. Encryption is applied at the data source, and decryption occurs only when an accessing application or user has been authenticated. The cloud service handles the encrypted data without having access to the contents.

The addition of cryptographic techniques to cloud services comes with complications and cannot be applied naively in all cases. If the wrong encryption is employed, computational overhead can increase by orders of magnitude. Encryption cannot be paired with cloud services that require detailed data access to perform required functions, such as data transformation or detailed analytics. As Lipman notes, the advisory board's value is in avoiding inappropriate technology choices, and the focus is on selecting from existing encryption strategies rather than inventing new techniques to reduce service costs.

Big Security for Midsize Business via the Cloud

Academic advisory boards can be viewed as a metaphor for how the shared service delivery model tilts the playing field to favor midsize businesses by providing resources that were once reserved for large businesses alone. Efforts by cloud service providers to increase cloud computing security is one of the biggest advantages gained by midsize businesses that engage with cloud computing. Business size is no longer a determining factor in whether a business can access cutting-edge knowledge outside of its core business. Through the application of cryptographic techniques, the public cloud can become a more secure option for midsize businesses than developing in-house abilities.

Acting on Cloud Advice

Access to advice for improved data security may be an advantage of cloud services, but it still requires the businesses and their IT professionals to act on the advice. In the case of encryption, it must be employed consistently to be effective. The business is responsible for assessing security against disadvantages, such as computational overhead or limits to remote access and data sharing with partners. Data governance can be used to determine the appropriate level of security to apply to certain files and data. Encryption becomes another tool for the business to deploy as part of a larger cloud computing security strategy.

This post was brought to you by IBM for Midsize Business. Dedicated to providing businesses with expertise, solutions and tools that are specific to small and midsized companies, the Midsize Business program provides businesses with the materials and knowledge they need to become engines of a smarter planet.

Originally posted here:
Cloud Computing Security Strategy Includes Cryptography

Related Posts
This entry was posted in $1$s. Bookmark the permalink.