Welcome!

Containers Expo Blog Authors: Stefan Bernbo, John Rauser, Elizabeth White, Todd Matters, Liz McMillan

Blog Feed Post

Living with Spies in the Cloud: Protecting Your Privacy with Cloud Encryption

 

NSA Cloud Security Cloud Privacy Cloud Encryption  NSA Living with Spies in the Cloud: Protecting Your Privacy with Cloud Encryption

NSA and Cloud Encryption

The firestorm in the press, driven by the Snowden revelations, keeps growing. As the astonishing leaks get published, we discover that the USA’s National Security Agency (NSA) has a full-fledged program in place, spending hundreds of millions of dollars, to tap into Internet communications and get around the encryption that protects data on the internet.

Both laymen and experts are far from calm. The scandal is both a crisis of public trust in the government, and a technical challenge for the security industry. Technology businesses are worried about the possible fall out to trust, adoption and dollar revenues.

So can we live with it, and how?

What can you trust?

The cautious assessment of experts is that the math underlying modern cryptography remains trustworthy. This is important: it means that the techniques, like AES, that underlie the encryption of data on the internet, are good ones. There are speculations to the contrary, but the main verified information is that the NSA gets around these mathematical techniques instead of breaking them directly. Several ways to get around the math:

  • Steal the keys – any encryption standard is only as good as the key to the encryption; if the keys are stolen, messages can be deciphered and read
  • Influence large corporations to hand over the keys used by their customer base
  • Influence large corporations to code back-doors into their implementations of the math, which are then in unwitting use by companies and consumers

Do I really care?

Suppose you do have sensitive data – personal health information, financial data, intellectual property, or personal information of any kind – should you be worried?

The approach taken by the NSA can be likened to a very wide fish net. They try to tap into everything – all of the emails from everyone, all of the instant messages from everyone, all of the online phone calls from everyone, all of the data stored by everyone. After collecting as much as possible, they have software that sifts through these masses of data, and tries to find the things of real interest. This may be an email between terrorists or drug dealers.

This does mean that your personal email was caught by that wide fish net too. It was then discarded as too boring, by the software that sifts through all the data. Problem is, big government really is big, and it seems that the data collected by the NSA is finding its way to many other branches of government. Tax collectors? Local police? Some of this has already been verified (e.g. the IRS) and some of it can be speculated. The NSA may think you are boring, but does the IRS?

The economics of self-knowledge

Know thyself. If you are on a target list by the NSA (or any other big government), then you are worth their time. This means they may spend the time to hack your computers and steal your keys and your data. They may even spend the time to break into your office or home, and bug your computer. If you are on a target list by the NSA – this post is not for you. As I sarcastically suggested in a recent post, your best bet is to get a safe house in Pakistan.

For the rest of us, the key lies in breaking the economics of surveillance. The wide fish net works well, because it makes economic sense – it is very cheap to grab everyone and only later sift through the information. The key to your personal privacy is to raise the cost of grabbing your private data.

This can be achieved in a cost effective way. As mentioned above, the math behind modern encryption is still pretty good. To make use of that fact, you should use an encryption solution built specifically for the cloud, using encryption code that has been extensively reviewed by a large number of people, and you should make sure that the encryption keys are under your control.

One main reason that the NSA approach has been so scarily effective, is that your encryption keys are usually controlled and owned by big cloud providers. The NSA needs to get the keys only from them, and then it can trawl everybody.

If you take back the encryption keys – it is no longer economic for the NSA to net you, because they need to treat you as an individual. That costs too much, given that you are not really interesting for them. Fortunately cloud encryption is evolving in this direction and solutions are emerging that allow you to use the cloud while keeping control of your encryption keys.

The post Living with Spies in the Cloud: Protecting Your Privacy with Cloud Encryption appeared first on Porticor Cloud Security.

Read the original blog entry...

More Stories By Gilad Parann-Nissany

Gilad Parann-Nissany, Founder and CEO at Porticor is a pioneer of Cloud Computing. He has built SaaS Clouds for medium and small enterprises at SAP (CTO Small Business); contributing to several SAP products and reaching more than 8 million users. Recently he has created a consumer Cloud at G.ho.st - a cloud operating system that delighted hundreds of thousands of users while providing browser-based and mobile access to data, people and a variety of cloud-based applications. He is now CEO of Porticor, a leader in Virtual Privacy and Cloud Security.

@ThingsExpo Stories
SYS-CON Events announced today that IBM has been named “Diamond Sponsor” of SYS-CON's 21st Cloud Expo, which will take place on October 31 through November 2nd 2017 at the Santa Clara Convention Center in Santa Clara, California.
When growing capacity and power in the data center, the architectural trade-offs between server scale-up vs. scale-out continue to be debated. Both approaches are valid: scale-out adds multiple, smaller servers running in a distributed computing model, while scale-up adds fewer, more powerful servers that are capable of running larger workloads. It’s worth noting that there are additional, unique advantages that scale-up architectures offer. One big advantage is large memory and compute capacity...
In his session at @ThingsExpo, Eric Lachapelle, CEO of the Professional Evaluation and Certification Board (PECB), provided an overview of various initiatives to certify the security of connected devices and future trends in ensuring public trust of IoT. Eric Lachapelle is the Chief Executive Officer of the Professional Evaluation and Certification Board (PECB), an international certification body. His role is to help companies and individuals to achieve professional, accredited and worldwide re...
With major technology companies and startups seriously embracing Cloud strategies, now is the perfect time to attend 21st Cloud Expo October 31 - November 2, 2017, at the Santa Clara Convention Center, CA, and June 12-14, 2018, at the Javits Center in New York City, NY, and learn what is going on, contribute to the discussions, and ensure that your enterprise is on the right path to Digital Transformation.
No hype cycles or predictions of zillions of things here. IoT is big. You get it. You know your business and have great ideas for a business transformation strategy. What comes next? Time to make it happen. In his session at @ThingsExpo, Jay Mason, Associate Partner at M&S Consulting, presented a step-by-step plan to develop your technology implementation strategy. He discussed the evaluation of communication standards and IoT messaging protocols, data analytics considerations, edge-to-cloud tec...
Amazon started as an online bookseller 20 years ago. Since then, it has evolved into a technology juggernaut that has disrupted multiple markets and industries and touches many aspects of our lives. It is a relentless technology and business model innovator driving disruption throughout numerous ecosystems. Amazon’s AWS revenues alone are approaching $16B a year making it one of the largest IT companies in the world. With dominant offerings in Cloud, IoT, eCommerce, Big Data, AI, Digital Assista...
Artificial intelligence, machine learning, neural networks. We’re in the midst of a wave of excitement around AI such as hasn’t been seen for a few decades. But those previous periods of inflated expectations led to troughs of disappointment. Will this time be different? Most likely. Applications of AI such as predictive analytics are already decreasing costs and improving reliability of industrial machinery. Furthermore, the funding and research going into AI now comes from a wide range of com...
SYS-CON Events announced today that CA Technologies has been named "Platinum Sponsor" of SYS-CON's 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. CA Technologies helps customers succeed in a future where every business - from apparel to energy - is being rewritten by software. From planning to development to management to security, CA creates software that fuels transformation for companies in the applic...
Multiple data types are pouring into IoT deployments. Data is coming in small packages as well as enormous files and data streams of many sizes. Widespread use of mobile devices adds to the total. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists looked at the tools and environments that are being put to use in IoT deployments, as well as the team skills a modern enterprise IT shop needs to keep things running, get a handle on all this data, and deliver...
Internet of @ThingsExpo, taking place October 31 - November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 21st Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devic...
SYS-CON Events announced today that Cloud Academy named "Bronze Sponsor" of 21st International Cloud Expo which will take place October 31 - November 2, 2017 at the Santa Clara Convention Center in Santa Clara, CA. Cloud Academy is the industry’s most innovative, vendor-neutral cloud technology training platform. Cloud Academy provides continuous learning solutions for individuals and enterprise teams for Amazon Web Services, Microsoft Azure, Google Cloud Platform, and the most popular cloud com...
SYS-CON Events announced today that Enzu will exhibit at SYS-CON's 21st Int\ernational Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Enzu’s mission is to be the leading provider of enterprise cloud solutions worldwide. Enzu enables online businesses to use its IT infrastructure to their competitive advantage. By offering a suite of proven hosting and management services, Enzu wants companies to focus on the core of their ...
We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA
SYS-CON Events announced today that GrapeUp, the leading provider of rapid product development at the speed of business, will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Grape Up is a software company, specialized in cloud native application development and professional services related to Cloud Foundry PaaS. With five expert teams that operate in various sectors of the market acr...
SYS-CON Events announced today that Ayehu will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on October 31 - November 2, 2017 at the Santa Clara Convention Center in Santa Clara California. Ayehu provides IT Process Automation & Orchestration solutions for IT and Security professionals to identify and resolve critical incidents and enable rapid containment, eradication, and recovery from cyber security breaches. Ayehu provides customers greater control over IT infras...
SYS-CON Events announced today that MobiDev, a client-oriented software development company, will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. MobiDev is a software company that develops and delivers turn-key mobile apps, websites, web services, and complex software systems for startups and enterprises. Since 2009 it has grown from a small group of passionate engineers and business...
In his session at Cloud Expo, Alan Winters, an entertainment executive/TV producer turned serial entrepreneur, presented a success story of an entrepreneur who has both suffered through and benefited from offshore development across multiple businesses: The smart choice, or how to select the right offshore development partner Warning signs, or how to minimize chances of making the wrong choice Collaboration, or how to establish the most effective work processes Budget control, or how to ma...
"When we talk about cloud without compromise what we're talking about is that when people think about 'I need the flexibility of the cloud' - it's the ability to create applications and run them in a cloud environment that's far more flexible,” explained Matthew Finnie, CTO of Interoute, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
IoT solutions exploit operational data generated by Internet-connected smart “things” for the purpose of gaining operational insight and producing “better outcomes” (for example, create new business models, eliminate unscheduled maintenance, etc.). The explosive proliferation of IoT solutions will result in an exponential growth in the volume of IoT data, precipitating significant Information Governance issues: who owns the IoT data, what are the rights/duties of IoT solutions adopters towards t...
With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is founded upon. In his session at @ThingsExpo, Nevi Kaja, a Research Engineer at Ford Motor Company, discussed some of the security challenges of the IoT infrastructure and related how these aspects impact Smart Living. The material was delivered interac...