11415782 Sentrycom Enables Privacy in Public Cloud Computing Storage and Webmail

  • Published on
    08-Apr-2018

  • View
    221

  • Download
    0

Embed Size (px)

Transcript

  • 8/7/2019 11415782 Sentrycom Enables Privacy in Public Cloud Computing Storage and Webmail

    1/2

    PR Log - Global Press Release Distribution

    SentryCom enables privacy in Public Cloud Computing Storage and Webmail.

    By Dr. Eli Talmor

    Dated: Apr 04, 2011

    While the benefits of using a public cloud infrastructure are clear, it introduces significant security and

    privacy risks.SentryCom allows the users of public cloud infrastructure to keep their sensitive files secure

    and private using software app.

    Cloud computing includes various types of services where a customer makes use of a service providers

    computing, storage or networking infrastructure.

    Cloud infrastructures can be roughly categorized as either private or public. In a private cloud, the

    infrastructure is managed and owned by the customer and located on-premise (i.e., in the customers region

    of control). In particular, this means that access to customer data is under its control and is only granted to

    parties it trusts. In a public cloud the infrastructure is owned and managed by a cloud service provider and

    is located off-premise (i.e., in the cloud service providers region of control). This means that customer datais outside its control and could potentially be granted to un-trusted parties.

    Storage services based on public clouds such Amazons S3 provide customers with scalable and dynamic

    storage. By moving their data to the cloud customers can avoid the costs of building and maintaining a

    private storage infrastructure, opting instead to pay a service provider as a function of its needs. For most

    customers, this provides several benefits including availability (i.e., being able to access data from

    anywhere) and reliability (i.e., not having to worry about backups) at a relatively low cost.

    While the benefits of using a public cloud infrastructure are clear, it introduces significant security and

    privacy risks. In fact, it seems that the biggest hurdle to the adoption of cloud storage (and cloud computing

    in general) is concern over the confidentiality and integrity of data.

    Ideally we should aim to achieve the best of both worlds by providing the security of a private cloud and

    the functionality and cost savings of a public cloud.Thus we need to achieve:

    1. confidentiality: the cloud storage provider does cannot access customer's files ,

    2. integrity: no unauthorized modification of customer data by the cloud storage provider,

    3. non-repudiation: any access to customer data is logged,

    while retaining the main benefits of a public storage service:

    1. availability: customer data is accessible from any machine and at all times

    2. reliability: customer data is reliably backed up

    3. efficient retrieval: data retrieval times are comparable to a public cloud storage service

    4. data sharing: customers can share their data with trusted parties.

    Main privacy concerns with cloud computing were outlined by the Cloud Security Alliance.

    SentryCom novel software app. addresses these concerns as following:1.Regulatory compliance. Most countries have laws in place that make organizations responsible for the

    protection of the data that is entrusted to them. SentryCom customers can be assured that the confidentiality

    of their data is preserved irrespective of the actions of the cloud storage provider. This greatly reduces any

    legal exposure for both the customer and the provider.

    2.Geographic restrictions. Data that is stored in certain legal jurisdictions may be subject to regulations

    even if it was not collected there.

    In SentryCom software app. data is only stored in encrypted form so any law that pertains stored data has

    little to no effect on the customer. This reduces legal exposure for the customer and allows the cloud

    storage provider to make optimal use of its storage infrastructure, thereby reducing costs.

    3.Subpoenas. If an organization becomes the subject of an investigation, law enforcement agencies may

    request access to its data. If the data is stored in a public cloud, the request may be made to the cloud

    provider and the latter could even be prevented from notifying the customer. This can have severe

    consequences for customers, since it preempts the customer from challenging the request. In a SentryCom

    Page 1/2

    http://www.prlog.org/http://www.prlog.org/
  • 8/7/2019 11415782 Sentrycom Enables Privacy in Public Cloud Computing Storage and Webmail

    2/2

    PR Log - Global Press Release Distribution

    software app., since data is stored in encrypted form and since the customer retains possession of data

    access rights, any request for the data must be made directly to the customer.

    4.Security breaches. Even if a cloud storage provider implements strong security practices there is always

    the possibility of a security breach. If this occurs the customer may be legally responsible.

    Cloud computing encompasses both a server and a client side. With emphasis typically placed on the

    former, the latter can be easily overlooked. Having a backdoor Trojan, keystroke logger, or other type ofmalware running on a client device undermines the security of cloud or other Web-based services.

    SentryCom software app. is malware resilient.

    4.Data retention and destruction. In many cases a customer may be responsible for the retention and

    destruction of data it has collected. Inability to decrypt data on the cloud makes this straightforward.

    SentryCom allows the users of Cloud-based Webmail such as GMail or Cloud-based file storage services

    such as Dropbox to address the privacy issues in the most convenient and secure fashion , while keeping all

    the advantages of these popular services .

    All you have to do is :

    1. Choose the file you want (any type)

    2. Choose file delivery method (save to Dropbox folder or send to Webmail)

    3. Define file recipient (yourself for backup, or your colleague(s)).

    4. Click encrypt.

    The file will be encrypted with top-secret grade AES 256 bit key, that will be stored at SentryCom

    MACS-Managed Authentication & Crypto Service. To request this key in the real-time- file recipient will

    need to perform malware-resilient multi-factor strong authentication vs. SentryCom MACS. This process,

    performed independently from Cloud Service Provider, ensures customer's privacy. No one , except

    specified file recipient(s) , will be able to access this file.

    Please contact SentryCom http://www.sentry-com.net/contactus.html for additional information.

    ###

    SentryCom is a SaaS provider of user-friendly solutions for ID Fraud prevention, using proprietary and

    patented Strong Authentication and Crypto technologies,reducing ID Fraud revenue losses and at the same

    time reducing the cost of ID Fraud prevention.

    Category Security, Computers, Internet

    Tags Public Cloud Computing, storage, privacy, security, webmail, dropbox, gmail, saas

    Email Click to email author

    Phone 972-4-8342392

    Fax 972-3-7255867

    Address POB 56263

    City/Town Haifa

    State/Province Haifa

    Zip 34989

    Country Israel

    Page 2/2

    http://www.prlog.org/http://www.prlog.org/11415782.htmlhttp://cat-security/http://cat-computers/http://cat-internet/http://cat-internet/http://tag/storage/http://tag/privacy/http://tag/security/http://tag/webmail/http://tag/dropbox/http://tag/gmail/http://tag/saas/http://www.prlog.org/email-contact.html?id=11415782http://tag/saas/http://tag/saas/http://tag/saas/http://il%2Chaifa%2Chaifa/http://il%2Chaifa/http://tag/saas/http://il/http://il/http://tag/saas/http://il%2Chaifa/http://il%2Chaifa%2Chaifa/http://tag/saas/http://tag/saas/http://tag/saas/http://www.prlog.org/email-contact.html?id=11415782http://tag/saas/http://tag/gmail/http://tag/gmail/http://tag/dropbox/http://tag/dropbox/http://tag/webmail/http://tag/webmail/http://tag/security/http://tag/security/http://tag/privacy/http://tag/privacy/http://tag/storage/http://tag/storage/http://cat-internet/http://cat-internet/http://cat-computers/http://cat-computers/http://cat-security/http://cat-security/http://www.prlog.org/11415782.htmlhttp://www.prlog.org/11415782.htmlhttp://www.prlog.org/

Recommended

View more >