SEMINAR ON:-ENCRYPTED
CLOUD
 Represnted by:
 Devanand patil
 Site:-https://digitizedyou.com
Encrypted cloud
Agenda
• The need for Cloud Encryption
• Encryption for user-oriented storage in the Cloud
• Encryption for other SaaS applications
• THE CLOUD IS GREAT
• Cost reduction
– Less licences
– Less hardware cost
– Less software administration
• Agility
– Resources fit the customer needs
– Resources rapidly available
•CLOUD SECURITY CONCERNS
• Organizations are worried…
(2012 Cisco Global Cloud Networking Survey)
• And experts say they are right !
– Gartner (2012) recommends not to trust your Cloud provider for the privacy of
your data
Confidentiality in the Cloud
• Goal : prevent unauthorized access to the data
• How to do it ?
– Data Encryption (ex: AES 256 bits)
– Key Management
Cloud En
Confidentiality In The Cloud
Encryption is not enough Cloud
Recommandation
• Encrypt the data
• Keep control of the keys
– The keys stay inside the
organization
• Do not rely of the security
measures taken by the Cloud provider
User-oriented storage in the Cloud
• Local folder synced with the Cloud
• Some examples :
Features
• Access your data from
several devices
• Share data with others
• Online replication / backu
Access from several devices
Encryption Principle•
• Encrypt the local folder(s)
• Keep the key on the device
(typically, password-encoded)
• Synchronise the encrypted folder
How to do it ?
• Dedicated solution + existing Cloud service
e.g. :
• Generic encryption solution + existing Cloud service
e.g. :
• Solution that provide local encryption and Cloud service
e.g. :
Example with BoxCryptor
• BoxCryptor Folder:
– On my hard drive
– Contains configuration file
– Contains encrypted files
– Synced with my Dropbox/Google Drive/other
• Virtual Drive
– Letter Z:
– Shows files in clear
Text File In Clear
Encrypted text file
How to choose a solution ?
• Most use the same encryption algorithm and key size (AES 256 bits)
• Features to evaluate :
– Performance
– Implementation (open source ? experts Validation?)
– Ease of use
• Impact on sharing features
Opinion
• These products allow :
– Transparent use
– Low impact on performance in most cases
– Some functions are not affected
– Real security gain
• Their limits are :
– Sharing is more complex
– Security : the Cloud provider still can…
• Monitor your activity
• Know the file sizes
Cloud Security Gateways : Goal
Allow to use Software as a Service applications
While preserving data confidentiality
How it works (in-house gateway)
Search on encrypted data ?
User view
The user logs in to the gateway url
instead of the SaaS application url
Then : transparent use of the application
Cloud Security Gateways : market
• Providers
– Certes Networks
– CipherCloud
– Concealium
– Intel
– PerspecSys
– Symantec
Source : Gartner 2012
Conclusion on Cloud Security Gateways
• Allow to use Saas applications while
protecting data
• Things are moving fast
• Trade-off between
– Functionality
– Security
Opinion
• Encryption for user-oriented storage in the Cloud
– Use can be transparent
– Impact on performance can be limited
– True security gain
• Encryption for other SaaS applications
– Protect the data
– Impact on some cloud features
• Functionality
• Cost
• Availaibility
Recommendations
• If you think about buying a Cloud Security Gateway you should :
– Precisely find out how much security you gain from it
– Think about availibility of the service
– Determine which functions of your SaaS application are crucial
cloud computing encrypted

cloud computing encrypted

  • 1.
    SEMINAR ON:-ENCRYPTED CLOUD  Represntedby:  Devanand patil  Site:-https://digitizedyou.com
  • 2.
  • 3.
    Agenda • The needfor Cloud Encryption • Encryption for user-oriented storage in the Cloud • Encryption for other SaaS applications
  • 4.
    • THE CLOUDIS GREAT • Cost reduction – Less licences – Less hardware cost – Less software administration • Agility – Resources fit the customer needs – Resources rapidly available
  • 5.
    •CLOUD SECURITY CONCERNS •Organizations are worried… (2012 Cisco Global Cloud Networking Survey) • And experts say they are right ! – Gartner (2012) recommends not to trust your Cloud provider for the privacy of your data
  • 6.
    Confidentiality in theCloud • Goal : prevent unauthorized access to the data • How to do it ? – Data Encryption (ex: AES 256 bits) – Key Management Cloud En
  • 7.
  • 8.
    Encryption is notenough Cloud
  • 9.
    Recommandation • Encrypt thedata • Keep control of the keys – The keys stay inside the organization • Do not rely of the security measures taken by the Cloud provider
  • 10.
    User-oriented storage inthe Cloud • Local folder synced with the Cloud • Some examples :
  • 11.
    Features • Access yourdata from several devices • Share data with others • Online replication / backu
  • 12.
  • 13.
    Encryption Principle• • Encryptthe local folder(s) • Keep the key on the device (typically, password-encoded) • Synchronise the encrypted folder
  • 14.
    How to doit ? • Dedicated solution + existing Cloud service e.g. : • Generic encryption solution + existing Cloud service e.g. : • Solution that provide local encryption and Cloud service e.g. :
  • 15.
    Example with BoxCryptor •BoxCryptor Folder: – On my hard drive – Contains configuration file – Contains encrypted files – Synced with my Dropbox/Google Drive/other • Virtual Drive – Letter Z: – Shows files in clear
  • 16.
  • 17.
  • 18.
    How to choosea solution ? • Most use the same encryption algorithm and key size (AES 256 bits) • Features to evaluate : – Performance – Implementation (open source ? experts Validation?) – Ease of use • Impact on sharing features
  • 19.
    Opinion • These productsallow : – Transparent use – Low impact on performance in most cases – Some functions are not affected – Real security gain • Their limits are : – Sharing is more complex – Security : the Cloud provider still can… • Monitor your activity • Know the file sizes
  • 20.
    Cloud Security Gateways: Goal Allow to use Software as a Service applications While preserving data confidentiality
  • 21.
    How it works(in-house gateway)
  • 23.
  • 24.
    User view The userlogs in to the gateway url instead of the SaaS application url Then : transparent use of the application
  • 25.
    Cloud Security Gateways: market • Providers – Certes Networks – CipherCloud – Concealium – Intel – PerspecSys – Symantec Source : Gartner 2012
  • 26.
    Conclusion on CloudSecurity Gateways • Allow to use Saas applications while protecting data • Things are moving fast • Trade-off between – Functionality – Security
  • 27.
    Opinion • Encryption foruser-oriented storage in the Cloud – Use can be transparent – Impact on performance can be limited – True security gain • Encryption for other SaaS applications – Protect the data – Impact on some cloud features • Functionality • Cost • Availaibility
  • 28.
    Recommendations • If youthink about buying a Cloud Security Gateway you should : – Precisely find out how much security you gain from it – Think about availibility of the service – Determine which functions of your SaaS application are crucial