{"id":29281,"date":"2015-02-18T07:41:07","date_gmt":"2015-02-18T12:41:07","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/encryption-can-create-stormy-weather-in-the-cloud.php"},"modified":"2015-02-18T07:41:07","modified_gmt":"2015-02-18T12:41:07","slug":"encryption-can-create-stormy-weather-in-the-cloud","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/encryption-can-create-stormy-weather-in-the-cloud.php","title":{"rendered":"Encryption Can Create Stormy Weather in the Cloud"},"content":{"rendered":"<p><p>  By John P. Mello Jr.     02\/17\/15 5:00 AM PT<\/p>\n<p>    Encryption has received a lot of attention lately as a solution    to the growing data breach problem, but one of the hang-ups    dogging the technology has been its ability to play nice in the    cloud.  <\/p>\n<p>    That's especially true if an organization wants to control the    keys by which its data is scrambled and use services offered by    a cloud provider beyond simple storage.  <\/p>\n<p>    For example, if a cloud provider can't decrypt a client's data,    it could break the provider's antivirus, data loss prevention,    file preview and text indexing functions, as well as pose    performance challenges.  <\/p>\n<p>    \"If the cloud provider can't decrypt your data, the cloud just    becomes a dumb bucket,\" Adrian Sanabria, a senior analyst with    the enterprise security practice at The     451 Group, told TechNewsWorld.  <\/p>\n<p>    That's why cloud service providers in the past have had access    to users' data encryption keys. As long as a user trusted their    provider, that approach was acceptable, but that's no longer    the case for many organizations.  <\/p>\n<p>    Compliance with regulations requires some businesses to control    the keys by which they encrypt their data. Other organizations    just don't want to lose control of their information.  <\/p>\n<p>    However, if an organization wants to use a cloud provider's    services, it can allow a provider to access its keys.    \"Encryption still takes place in the cloud, but it's done with    keys managed by the customer,\" Todd Partridge, director of    product marketing at Intralinks, told TechNewsWorld.  <\/p>\n<p>    From a security perspective, though, that solution is    imperfect. A rogue employee of the cloud provider could abuse    those key privileges to peek at, or leak a customer's data. The    solution also opens the door for lawyers or government    authorities to snatch the data.  <\/p>\n<p>    Those authorities usually obtain data from a provider through a    civil or criminal subpoena. As long as there isn't a gag order    attached to the subpoena -- a rare occurrence except in    national security cases -- a customer with control of its    encryption keys has a chance to protect their data.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.technewsworld.com\/story\/81711.html?rss=1\/RK=0\/RS=ZI0BoheRyBtld0CC5tM6PSNA5VY-\" title=\"Encryption Can Create Stormy Weather in the Cloud\">Encryption Can Create Stormy Weather in the Cloud<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> By John P. Mello Jr. 02\/17\/15 5:00 AM PT Encryption has received a lot of attention lately as a solution to the growing data breach problem, but one of the hang-ups dogging the technology has been its ability to play nice in the cloud. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-29281","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/29281"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=29281"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/29281\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=29281"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=29281"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=29281"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}