Sponsored Links

Minggu, 10 Juni 2018

Sponsored Links

Using 'bring your own encryption' to secure cloud based data ...
src: www.securitynewsdesk.com

Bring your own encryption (BYOE)--also called bring your own key (BYOK)--refers to a cloud computing security marketing model that purports to help cloud service customers to use their own encryption software and manage their own encryption keys. BYOE allows cloud service customers to use a virtualized example of their own encryption software together with the business applications they are hosting in the cloud, in order to encrypt their data. The business applications hosted is then set up such that all its data will be processed by the encryption software, which then writes the ciphertext version of the data to the cloud service provider's physical data store, and readily decrypts ciphertext data upon retrieval requests. This gives the enterprise the perceived control of its own keys and producing its own master key by relying on its own internal hardware security modules (HSM) that is then transmitted to the HSM within the cloud. Data owners may believe their data is secured because the master key lies in the enterprise's HSM and not that of the cloud service provider's. When the data is no longer needed (i.e. when cloud users choose to abandon the cloud service), the keys can simply be deleted. That practice is called crypto-shredding.


Video Bring your own encryption



History

The term BYOE or BYOK was coined in 2014 which was known as the "Year of Encryption" and "Year of Bring Your Own Encryption" after the acronym bring your own device came to prominence in 2011. The idea of BYOE came about in the wake of Edward Snowden's revelations where it is becoming known even the most secure data might be at risk from a government or writ demanding the revelation of its contents. The idea was started to protect the secrecy of an enterprise's sensitive information stored in a third party's data store from convoluted legal issues, where in the past, enterprises are more concerned with the security issues between the cloud service provider and the enterprise.


Maps Bring your own encryption



Issue

Balancing security against practicality

Two lessons have been learnt that see the need to strike a balance between security with practicality (or efficiency) as security continues to be the one of the largest issues.

The two lessons learnt over the years relate to both the context and natural tendency of a human in security technology matters. Firstly, human context should always be used in security technology as problems often occurred due to weaknesses in humans. As a result, cyber threats arise as human nature is easily targeted by complicated security matters. Second, the natural tendency of a human means that a person must never use his or her instinct and place trust on security matters. Instincts often lead to more cyber attacks, thus, regardless of the trustworthiness of a source, instinct should never be used to evaluate particular information.


Make Your Own Encryption Program - YouTube
src: i.ytimg.com


Advantages

Reduction of risks

BYOE somewhat reduce the risks of data leakage involved in cloud storage. BYOE enables the modification of encryption keys by the owning company. There are endless combinations to handle encryption, thus providing a better-than-nothing shield of the company's data from a single bug or hacking attack.

Perceived data ownership

With their own tenant keys, data owners get a sense of ownership over their data. Formally, the responsibility for the data lies only with the owner, and government agencies may not be able to obtain information from Cloud computing providers (CCP) directly. Even if the providers do pass the data to government agencies, data owners assume data will still be in its encrypted form, hence the provider may not be deemed of evading the data owner's privacy. Anyone who wants the encrypted data may request access directly from the owner of the data, allowing the owner of the data time and space to hire lawyers for the negotiation process of what is to be handed over to the requesting party.

By definition, BYOE secret keys are brought to the Cloud computing provider, hence actual security of BYOE is far from its perceived security. Secret keys are copied over to the Cloud environment, and providers may leak them or hand them over to government agencies at their own discretion, sometimes even without notifying the data owner.

Secured migration

BYOE facilitates a more secured migration from one CCP to another. There is no absolute clean migration available because a deleted file from the cloud does not mean that the file is completely wiped out from the server's hardware. The only way to secure a totally clean migration is to hold its own key, preventing CCP from accessing the residual encrypted data. The company's data will be kept safe and locked even after the migration.


Robert Kapanen on Twitter:
src: pbs.twimg.com


Challenges

Security guarantees vs. marketing efforts

BYOE was born as a reformulation of traditional key management solutions for the Cloud era. Explicitly named to resemble successful trends like bring your own device, BYOE branding hints that responsibility for key management translates to exclusive ownership of keys and data. In reality however, BYOE burdens the data owner with the responsibility for key management, while the owned secret keys are always handed over (read: brought) to the Cloud provider.

Inability to support all applications

BYOE lacks the ability to support all kinds of applications, for example, the software as a service (SaaS) applications. SaaS applications (most of it) do not allow a person to own encryption of data. This is due to the insufficiency of advances that SaaS providers give to their clients to hold their own particular keys.

Key management

Furthermore, it is important to note that the greatest challenge of BYOE is in relation to the key management as stated by Chief Architect Steve Pate of HyTrust. Companies are required to be good in their own encryption key management to ensure that the encrypted data would be able to be read again. Besides having a straightforward key management, key management solution ought to be readily accessible when it is requested by a server. At the same time, key management server must be secure in order to ensure that staff in its own data centres would never be able to get the keys.

Global standard

There is also a need for global standard cloud security platform in order for BYOE to become a practical solution. This standard is required so that any encryption offering can be registered for support by that platform. Therefore, if the industry could not ensure that users choose their encryption from a set of global standard platform, BYOE can be as disturbing as BYOD.


Webinar: Gain True Cloud Privacy by Hosting Your Own Encryption ...
src: i.ytimg.com


Trends

The nature of cloud encryption started off disorderly with some cloud service vendors providing it while others do not. Previously, some of such encryption has to be locked in and still not well-integrated while some encryption schemes solely belong to a specific vendor. In many cases, if encryption was provided, the cloud provider holds the keys which creates a controversial problem for the enterprise. This made many end users lose trust in cloud providers. This trend started to shift when: encrypted data is stored or processed in the cloud, the end users should be the ones controlling the keys.

Both Amazon and Microsoft have cloud-hosted key management systems, the Amazon KMS and Microsoft Azure Key Vault but they both focus on key management instead of providing a way to encrypt customer data. Thales had come forward to assist Microsoft Azure in creating BYOK services for their cloud applications, adding confidence for the Microsoft Azure cloud users.

Businesses have also spotted the opportunity to provide new services. One of such is Key Storage-as-a-Service (KSaas). Dark Matter Labs introduced a new division, KeyNexus, in September 2013, a secured cloud encryption key management service for Amazon Web Services. This independent platform allow companies to store their keys on a separate platform as their data storage while having sole control over their keys. Enterprise storage collaboration company, Box, also announced its new service, Box Enterprise Key Management that allows enterprises to use their own encryption keys to encrypt data in Box. Other cloud storage services that provide encryption are SpiderOak, Wuala, Tresorit and MEGA.


NCSC UK on Twitter:
src: pbs.twimg.com


See also

  • Cloud computing security
  • Encryption
  • Trust no one (Internet security)

How to Make Your Own Encryption Program - YouTube
src: i.ytimg.com


References

Source of the article : Wikipedia

Comments
0 Comments