{"id":26500,"date":"2014-10-03T12:45:22","date_gmt":"2014-10-03T16:45:22","guid":{"rendered":"http:\/\/www.opensource.im\/?p=26500"},"modified":"2014-10-03T12:45:22","modified_gmt":"2014-10-03T16:45:22","slug":"first-cryptography-advisory-board-formed-for-cloud-security","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/first-cryptography-advisory-board-formed-for-cloud-security.php","title":{"rendered":"First Cryptography Advisory Board Formed for Cloud Security"},"content":{"rendered":"<p><p>Skyhigh Networks assembles a board of  cryptography experts to consider a range of academically vetted  cryptographic solutions that do not reduce functionality.  <\/p>\n<p>    A group of accomplished experts in cryptography research have    announced they are forming what is believed to be the first    industry-focused Cryptography Advisory Board. The board will    provide oversight of encryption schemes for cloud security to    ease the adoptionof cloud services.  <\/p>\n<p>    Data security continues to be one of the major hurdles    preventing companies from moving data to the cloud, and for    good reason. Enterprises worry about cloud data breaches, NSA    surveillance, and court orders that can subpoena documents    holding sensitive information (with which many cloud providers    willingly comply). Increasingly, firms want to secure files    with encryption tohinder outside parties who access    sensitive documents from being able to read them.  <\/p>\n<p>    The problems that the industry is starting to solve are very    challenging, says board member Ari Juels, professor at the    Jacobs Technion-Cornell Institute at Cornell Tech, and former    chief scientist of RSA. When companies place data in the cloud    itsup to the cloud providers to make sure policies are    enforced. Theres growing interest in the industry to take back    power from cloud providers, and that creates some technical    tensions. Cryptography helps, but it has to be implemented    well, and rigorously.  <\/p>\n<p>    [Read more about cloud encryption: Encrypting Cloud Email Isnt as Easy as You'd    Think.]  <\/p>\n<p>    The board will collaborate with Skyhigh    Networks, a firm that analyzes the risks of cloud    applications and helps organizations build security strategies.    The board will ensure Skyhigh is aware of the world of    development in academic research and have available toit    the latest research and technologies relevantto its    business.  <\/p>\n<p>    Juels says, rather than invent technologies from scratch, the    board wants to make sure businesses are incorporating solutions    properly and rigorously into product, with strong security    guarantees on behalf of their customers. Its easy to get    cryptography wrong, he says. Its hard to build a    cryptography scheme well and robustly.  <\/p>\n<p>    Most of todays encryption implementations have significant    drawbacks, he explains. Homomorphic encryption seemed to solve    all problems as it made it possible to perform general    computations over encrypted data, but it proved too    inefficient. For example, a provider can manage email without    actually seeing it, or store corporate data and perform    analytics on it but not actually see it. However the    computational overhead is on the order of10 million    versus ordinary unencrypted software. It also solves a narrow    subset of problems as it doesnt consider that clients    increasingly want shared relationships with their cloud    providers data.  <\/p>\n<p>    Newer encrypted hardware solutions allow data to be managed in    a trustworthy environment, but it assumes the cloud provider    isnt able to tamper with the pieces.  <\/p>\n<p>    The board will consider a range of cryptographic approaches    looking for practical schemes that do not reduce functionality,    including search, sort, and format validation.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Continued here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.wallstreetandtech.com\/security\/first-cryptography-advisory-board-formed-for-cloud-security\/d\/d-id\/1316265?_mc=RSS_WST_EDT\/RK=0\/RS=jz1vqcZViaaT1.R1pNYUq7MvsPs-\" title=\"First Cryptography Advisory Board Formed for Cloud Security\">First Cryptography Advisory Board Formed for Cloud Security<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Skyhigh Networks assembles a board of cryptography experts to consider a range of academically vetted cryptographic solutions that do not reduce functionality. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-26500","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/26500"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=26500"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/26500\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=26500"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=26500"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=26500"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}