{"id":25719,"date":"2014-08-29T12:41:14","date_gmt":"2014-08-29T16:41:14","guid":{"rendered":"http:\/\/www.opensource.im\/?p=25719"},"modified":"2014-08-29T12:41:14","modified_gmt":"2014-08-29T16:41:14","slug":"data-ownership-encryption-in-the-cloud","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/data-ownership-encryption-in-the-cloud.php","title":{"rendered":"Data Ownership &amp; Encryption in the Cloud"},"content":{"rendered":"<p><p>New advancements in encryption  technology can help businesses keep their data secure and private  even when it is stored with a cloud provider.  <\/p>\n<p>    A US federal court recently ruled that Microsoft had to    give up a clients data stored in one of its databases in    Ireland. The decision adds a new element to putting data in the    cloud: Cloud providers could be forced to give up their    clients data, even if the data is stored in another country,    and they have no obligation to notify the client. If thats the    case, then clients putting their data in the cloud are    essentially giving up control of their data and trusting the    cloud provider to advocate for the protection and privacy of    that data, says Elad Yoran, the CEO of Vaultive, a provider of    data encryption solutions for cloud adopters.  <\/p>\n<p>    Normally when the government serves a subpoena for a companys    data, the companys legal department will try to protect as    much data as they can. At the minimum, they will ensure that    only data directly related to the subpoena is handed over,    explains Yoran, who will be speaking about data encryption in    the cloud at Interop in New York City next month.  <\/p>\n<p>    But if Microsoft gets a subpoena for your data, they have to    hand [the data] over, and you dont get a seat at the table,    he adds.  <\/p>\n<p>    [Learn more about the Internet of Things at Interop's    Internet of Things Summit on Monday,    September 29.]  <\/p>\n<p>    Losing control over company data in this fashion could    understandably make organizations hesitant about cloud    adoption. But new advances in encryption technology can help    companies keep control over their data even when it resides in    the cloud, he says.  <\/p>\n<p>    Traditionally, data encryption meant encrypting the data when    it was in transit or at rest. But in order for the data to be    used, it had to be decrypted. For instance, if a company is    using a cloud provider for email, then the data has to be    decrypted for employees to search their messages. However, new    advancements in encryption technology now allow data to be encrypted even when it is in use, which    could keep control of the encrypted data in the hands of the    client as the data never has to be decrypted on the server.  <\/p>\n<p>    [For more on data encryption in the cloud: Making the Cloud Secure for Sensitive    Data]  <\/p>\n<p>    The important thing for businesses is that, even if their data    is encrypted in use, they have to keep control of the    encryption keys, he shares. In that case all the cloud    provider can hand over to the government is encrypted data. The    government still has to go to the client and ask for the keys,    and then they can go through the standard legal process, he    explains. Before the provider needed the encryption keys to    decrypt the data so that it could be used. Now with encryption    in-use, thats no longer the case.  <\/p>\n<p>    This kind of complete control over important data can be    important, particularly for financial services firms when    dealing with compliance, since regulators have begun to focus    on data privacy and security. One financial services client    that works with Vaultive had previously dismissed using    cloud-based Office 365, because it knew that having the data    decrypted by Microsoft could raise concerns among its    regulators, Yoran says. But once the people in that company    found they could encrypt the data in-use, they were able to    adopt Office 365. They can also tell their auditors that they    have complete control over their data in the cloud, he adds.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>View original post here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.banktech.com\/data-ownership-and-encryption-in-the-cloud\/d\/d-id\/1306801?_mc=RSS_BST_EDT\/RK=0\/RS=YrPgH0u0kmghzm6ul0xOqcHoj3I-\" title=\"Data Ownership &amp; Encryption in the Cloud\">Data Ownership &amp; Encryption in the Cloud<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> New advancements in encryption technology can help businesses keep their data secure and private even when it is stored with a cloud provider. A US federal court recently ruled that Microsoft had to give up a clients data stored in one of its databases in Ireland<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-25719","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25719"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=25719"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25719\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=25719"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=25719"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=25719"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}