Data Encryption technology advances end-to-end encryption to protect cloud security

Source: Internet
Author: User

Those who know Data Encryption technology are sure to be confident in its ability to protect the security of data sources. Because of the direct effect on data, even if the data is lost or stolen in the security crisis, encryption protection can still ensure the security of the real data content.

However, the flexibility of data encryption has always been criticized. From the inconveniences of encryption at the early stage of information technology to transparent encryption, from the beginning of a single encryption to the current multi-mode encryption, encryption technology is constantly improving to meet the increasingly rich encryption requirements. Of course, the development of data encryption technology does not end with this. To cope with increasingly complex cloud and cloud computing security, a new type of encryption technology has emerged.

From single tool encryption to automatic encryption-encryption is becoming increasingly transparent

In the early stages of informatization, in order to protect the security of some system core data and information, people have introduced encryption technologies that have been used to protect information security since ancient times. Through algorithm implantation and change, the data is protected by modern encryption technologies. However, this process is relatively complex and requires software tools. encryption also becomes a "time-consuming and laborious" task.

With the development of the times, encryption technology and encryption software are constantly improving, and the encryption speed is getting faster and faster. With the support of modern information technology, the modern rapid encryption means that get rid of the limitations of encryption tools can make users feel completely invisible during encryption, which is also the ultimate development of modern automatic encryption technology-transparent encryption.

From Single file and single format encryption to multi-mode encryption-encryption protection covers all fields

In terms of objects, the encryption technology starts from single file encryption to multi-format and multi-file encryption. The encryption technology covers the entire field starting from the information technology architecture. The modern non-multimode encryption technology is flexible and perfect to achieve this effect.

Multi-Mode encryption technology combines symmetric and asymmetric algorithms to ensure the quality of data source protection, its multi-mode features allow users to choose their own encryption mode to flexibly respond to various encryption requirements and security environments. It is worth mentioning that, as a typical representative of this technology, the multi-mode encryption module of shanli waterproof wall also integrates the transparent encryption technology based on the system kernel, this further improves the convenience and integrity of encryption protection (encryption is not related to the format ).

Complete Technology-end-to-end encryption technology can solve the "Cloud" Problem

By proving that the server is capable of processing encrypted data concurrently and returning encrypted results, MIT researchers have taken an important step forward in cloud security.

The technology developed by MIT is based on homomorphic encryption. With this technology, ECs can process encrypted data without decryption.

The new method involves integrating the homomorphic encryption technology with the other two technologies into a solution called "functional encryption solution" by developers. Currently, this technology is not suitable for large-scale applications. The researchers believe that this technology requires considerable computing power, so far it cannot be put into practical use.

However, as time passes, this problem will eventually be solved. Currently, the researchers know that encryption data can be processed without decryption. Raluca Ada Popa from the department of electronic engineering and computer science at the Massachusetts Institute of Technology, co-author of the study, said: "Before that, we were not sure whether this approach was possible ."

Under the existing technical conditions, if the encrypted search item is not decrypted first, the receiving server has no other choice and can only send back the information in each database record. Therefore, the recipient's computer must decrypt and process the necessary computing commands to determine the applicable results.

Homomorphic encryption is a promising research topic in cryptography. It makes it possible to process data while maintaining end-to-end encryption. By enabling ECs to run a single specific Computation for homomorphic encryption results-for example, "Does this record a matching item ?" -- No additional information needs to be extracted. The new functional encryption solution developed by researchers has taken this technology further.

To achieve this, the researchers also used two other solutions, namely, garbled circuit and attribute-based encryption. Each solution includes the functions required for functional encryption.

The new system first performs homomorphic encryption and then embeds the decryption algorithm into the garbled circuit. The key of the garbled circuit is protected by the attribute-based encryption scheme, while the latter keeps the entire processing program encrypted.

The results of the MIT study appeared last week at the 45th computing theory seminar of the American Computer Society. In addition to researchers at the Massachusetts Institute of Technology, researchers from the University of Toronto and Microsoft participated in the study.

As a protection technology that is most close to the source of data, encryption technology has demonstrated strong data protection capabilities. However, in order to address more security challenges and challenges, encryption technology is still improving. For individuals, enterprises, and even countries that require increasingly urgent data security protection, adopting flexible and original data encryption technologies and their software is always the smartest way to protect them!

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.