@CloudExpo Authors: Elizabeth White, Zakia Bouachraoui, Liz McMillan, Pat Romanski, Roger Strukhoff

Related Topics: @CloudExpo

@CloudExpo: Blog Feed Post

Don’t Depend on Trust to Protect Data in the Cloud

Startup Porticor addresses key management

In one survey after another, we see that security concerns are a top inhibitor to cloud adoption. Companies want to get the flexibility and cost advantages of cloud computing, but there’s often trepidation about putting data on servers that are outside a company’s own data center. Cloud security is an issue of trust and control.

Startup company Porticor just released a product that addresses the concern about data at rest in the cloud: a split key encryption solution where the cloud customer is the only one who ever knows the master key.

The basic problem of encrypting data in the cloud is where to store the keys. An enterprise wouldn’t want to store the keys on a disk in the cloud; they could be vulnerable to hackers. Allowing the vendor to store the keys means putting trust in a third party. An organization could bring the keys back into its data center, but that seems to negate some of the advantage of outsourcing data center services to the cloud.

Porticor uses the metaphor of the Swiss banker to explain its offering. Think of a personalized bank vault that has two keys: one is held by the customer, and the other is held by the “banker,” or in this case, the Porticor Virtual Key Management Service.  The customer actually has one key per project, which is usually an application. Porticor has thousands of keys, one for each file or disk belonging to that project.

Here’s the unique part of the solution. The keys, which are split between the customer and Porticor, are themselves encrypted by the customer’s master key, which only the customer holds and knows. Therefore, Porticor holds project keys but it can’t read them because they are encrypted. The only additional requirement on the enterprise end is to secure the master key.

Porticor’s solution works with any cloud implementation, but partnerships with Amazon Web Services (AWS) and RedHat facilitate implementation with those services.

For example, to set up encryption for a project on AWS servers, you would launch the web-based Porticor Virtual Private Data (VPD) and specify a preferred geographic location for data storage and create a master key.

After specifying the master key, the enterprise can create encrypted disks in its environment within AWS. The keys are created and split between the master key and the encrypted “banker’s” key. After that, the disks can be mounted and used.

It takes just minutes to create a trusted system that is completely controlled by the master key held only by the customer. Existing unsecured disks can be attached to the Porticor Virtual Private Data product and automatically detected and encrypted.

Porticor says this is military grade security since only one party – the customer – holds the master key to unlock the data. The master key only needs to be accessed when the entire server cluster is rebooted, which should be a rare occurrence. When new application servers are created, they inherit the encryption automatically through the VPD.

Read the original blog entry...

More Stories By Gilad Parann-Nissany

Gilad Parann-Nissany, Founder and CEO at Porticor is a pioneer of Cloud Computing. He has built SaaS Clouds for medium and small enterprises at SAP (CTO Small Business); contributing to several SAP products and reaching more than 8 million users. Recently he has created a consumer Cloud at G.ho.st - a cloud operating system that delighted hundreds of thousands of users while providing browser-based and mobile access to data, people and a variety of cloud-based applications. He is now CEO of Porticor, a leader in Virtual Privacy and Cloud Security.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.

CloudEXPO Stories
The platform combines the strengths of Singtel's extensive, intelligent network capabilities with Microsoft's cloud expertise to create a unique solution that sets new standards for IoT applications," said Mr Diomedes Kastanis, Head of IoT at Singtel. "Our solution provides speed, transparency and flexibility, paving the way for a more pervasive use of IoT to accelerate enterprises' digitalisation efforts. AI-powered intelligent connectivity over Microsoft Azure will be the fastest connected path for IoT innovators to scale globally, and the smartest path to cross-device synergy in an instrumented, connected world.
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
ScaleMP is presenting at CloudEXPO 2019, held June 24-26 in Santa Clara, and we’d love to see you there. At the conference, we’ll demonstrate how ScaleMP is solving one of the most vexing challenges for cloud — memory cost and limit of scale — and how our innovative vSMP MemoryONE solution provides affordable larger server memory for the private and public cloud. Please visit us at Booth No. 519 to connect with our experts and learn more about vSMP MemoryONE and how it is already serving some of the world’s largest data centers. Click here to schedule a meeting with our experts and executives.
Darktrace is the world's leading AI company for cyber security. Created by mathematicians from the University of Cambridge, Darktrace's Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal' for all devices and users, updating its understanding as the environment changes.
Codete accelerates their clients growth through technological expertise and experience. Codite team works with organizations to meet the challenges that digitalization presents. Their clients include digital start-ups as well as established enterprises in the IT industry. To stay competitive in a highly innovative IT industry, strong R&D departments and bold spin-off initiatives is a must. Codete Data Science and Software Architects teams help corporate clients to stay up to date with the modern business digitalization solutions. Achieve up to 50% early-stage technological process development cost cutdown with science and R&D-driven investment strategy with Codete's support.