Welcome!

@CloudExpo Authors: Yeshim Deniz, Elizabeth White, Zakia Bouachraoui, Pat Romanski, Liz McMillan

Related Topics: Containers Expo Blog, @CloudExpo

Containers Expo Blog: Article

Can You Own Your Public Cloud?

Public cloud computing is surging forward into healthcare, finance, and utilities

Can You Own Your Public Cloud?

Public cloud computing is surging forward into healthcare, finance, and utilities. Popular cloud based implementations run the gamut from big data analysis to customer service applications, and everything in between. As more and more sensitive data processing is done in the cloud, encryption of data has become the obvious best practice. Google Compute Engine has provided data encryption for some time; and in a recent interview, AWS’s CTO said they’d like all data, or at least all sensitive business data, to be always encrypted.

Encrypting data immediately brings up the challenge of managing your encryption keys. The owner of encryption keys is the real owner of the data and of the application. Several transitional solutions take this point partially into account. You can sometimes store keys with hardware based solutions, which store keys outside the cloud model and compromise elasticity and flexibility. Or you can choose to let your cloud provider own your keys.

public vs private cloud public cloud security Cloud Key Management Cloud Encryption  Wired public cloud Can You Own Your Public Cloud?

Do you really care about this? The answer is yes, you should. Not owning your keys is actually a significant exposure, which can sometimes surprise you when you understand its consequences. Basically, not owning your keys means that encryption completely depends on your cloud credentials: if an attacker has somehow obtained your administrative credentials to your cloud environment, the cloud provider will believe they are you, and may automatically provision the encryption keys. So you are in a situation where you are not quite getting the benefit.

Is there a solution? You want — at one and the same time — to enjoy the full cloud elasticity and flexibility, and to enjoy the regulatory and security benefits of strong cloud encryption.

Take a look at split key encryption and homomorphic key management. These provide pure, software defined key management that is as secure as you need. These techniques were recently chosen by Hewlett Packard (HP) for solving the cloud key management dilemma. They could be appropriate for you too.

The post Can You Own Your Public Cloud? appeared first on Porticor Cloud Security.

More Stories By Gilad Parann-Nissany

Gilad Parann-Nissany, Founder and CEO at Porticor is a pioneer of Cloud Computing. He has built SaaS Clouds for medium and small enterprises at SAP (CTO Small Business); contributing to several SAP products and reaching more than 8 million users. Recently he has created a consumer Cloud at G.ho.st - a cloud operating system that delighted hundreds of thousands of users while providing browser-based and mobile access to data, people and a variety of cloud-based applications. He is now CEO of Porticor, a leader in Virtual Privacy and Cloud Security.

CloudEXPO Stories
"Calligo is a cloud service provider with data privacy at the heart of what we do. We are a typical Infrastructure as a Service cloud provider but it's been designed around data privacy," explained Julian Box, CEO and co-founder of Calligo, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Transformation Abstract Encryption and privacy in the cloud is a daunting yet essential task for both security practitioners and application developers, especially as applications continue moving to the cloud at an exponential rate. What are some best practices and processes for enterprises to follow that balance both security and ease of use requirements? What technologies are available to empower enterprises with code, data and key protection from cloud providers, system administrators, insiders, government compulsion, and network hackers? Join Ambuj Kumar (CEO, Fortanix) to discuss best practices and technologies for enterprises to securely transition to a multi-cloud hybrid world.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by FTC, CUI/DFARS, EU-GDPR and the underlying National Cybersecurity Framework suggest the need for a ground-up re-thinking of security strategies and compliance actions. This session offers actionable advice based on case studies to demonstrate the impact of security and privacy attributes for the cloud-backed IoT and AI ecosystem.
@DevOpsSummit at Cloud Expo, taking place November 12-13 in New York City, NY, is co-located with 22nd international CloudEXPO | first international DXWorldEXPO and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete at launch. DevOps may be disruptive, but it is essential.
DXWorldEXPO LLC announced today that "IoT Now" was named media sponsor of CloudEXPO | DXWorldEXPO 2018 New York, which will take place on November 11-13, 2018 in New York City, NY. IoT Now explores the evolving opportunities and challenges facing CSPs, and it passes on some lessons learned from those who have taken the first steps in next-gen IoT services.