Data encryption technology improves cloud security

Source: Internet
Author: User
Keywords Cloud security Cloud security
Tags automatic encryption based beginning cloud cloud security cloud server computer content

There is no doubt that people who understand the technology of data encryption should be able to protect the security of the source of technology. Because of the direct use of data, so that data even if the security crisis lost, was stolen, encryption protection can still guarantee the real content of the data security.

But the flexibility of data encryption is the place where people have been criticized. From the initial information encryption is not convenient to transparent encryption, from the beginning of a single encryption to the current Multimode encryption, encryption technology is also constantly improving to cope with the increasingly rich demand for encryption. and the development of data encryption technology is not only this, in order to cope with the increasingly complex cloud and cloud computing security, a new type of encryption technology also appeared in front of people.

From a single encryption of tools to automatic encryption-encryption is becoming more and more transparent

In the early days of information, people in order to protect some system core data and information security, introduced from ancient times used to protect information security encryption technology, through the algorithm of implantation and change, those data obtained by modern encryption technology protection. But because this process is relatively complex, requires the characteristics of software tools to carry out, encryption has also become a "time-consuming and laborious" thing.

With the progress of the times, encryption technology and encryption software is also progressing, encryption speed is also getting faster. With the support of modern information technology, the modern fast encryption means to get rid of the binding of the encryption tool can make the user not feel at all when encrypting, this is also the acme of the development of modern automatic encryption technology--transparent encryption.

From single file, single format encryption to multimode encryption--encryption protection is covering the entire field

As far as objects are concerned, encryption is being encrypted from a single file at the beginning to multiple-format, multiple-file encryption, and encryption technology is covering the entire field of information technology architecture. and modern can be flexible and perfect to achieve this effect of the non-multimode encryption technology.

With the combination of symmetric algorithm and asymmetric algorithm, the Multimode encryption technology can ensure the quality of the data source protection, and the Multi-mode feature allows users to choose the encryption mode autonomously so as to deal with various encryption requirements and security environment more flexibly. It is worth mentioning that, as a typical representative of this technology, the SAM-Lai waterproof wall multimode encryption module also combines the system kernel based transparent encryption technology, thereby further improving the convenience and integrity of encryption protection (encryption and format-independent).

Technology is endless-end-to-end encryption technology can solve the "cloud" problem

By proving that the server has the ability to handle encrypted data and return to a process that is still encrypted, MIT researchers have taken an important step forward in cloud security.

The technology developed by MIT is based on homomorphic cryptography. This technology allows the cloud server to process encrypted data without decrypting it.

The new approach involves consolidating the same state encryption technology with two other technologies into a program that is called a "functional encryption scheme" by developers. At present, this technology is not suitable for large-scale applications. The researchers believe that because the technology requires considerable computational power, it is not ready to be applied.

However, as time goes on, the problem will eventually be solved. Now researchers have made it clear that processing encrypted data without decrypting it is achievable. Raluca Ada Popa of the research co-author, MIT's Department of Electrical Engineering and computer science, said: "Before that, we didn't know if this approach was possible." ”

Under the existing technical conditions, if the retrieved items are not decrypted first, the receiving server has no other choice but to send back the information in each database record. Therefore, the recipient's computer must decrypt and process the necessary calculation instructions to determine the applicable results.

Homomorphic cryptography is a promising research subject in cryptography, which makes it possible to process data while preserving end-to-end encryption. By allowing the cloud server to run a single specific calculation for the same-state encryption results-for example, "Does this record a pair of matches?" -without extracting any other information, the new functional encryption scheme developed by researchers has moved this technology forward a step further.

To achieve this, the researchers also used two other schemes, the garbled circuit and the attribute based encryption scheme. Each scenario contains the functionality necessary for functional encryption.

The new system first carries on the Homomorphic encryption, then embeds the decryption algorithm in the garbled circuit. The key of the garbled circuit is protected by the cryptographic scheme based on the attribute, while the latter will keep the entire handler in the encrypted state.

The MIT study came up last week at the American Computer Society's 45th session on computational theory. In addition to MIT researchers, researchers from the University of Toronto and Microsoft are also involved in the study.

As the most close to the data source of the protection technology, encryption technology has shown a strong data protection capabilities, but in order to deal with more security challenges and challenges, encryption technology is still improving. And those who need more and more urgent, more and more attention to data security protection needs of individuals, enterprises and even countries, the use of flexible and the source of data encryption technology and its software protection is always the smartest way!

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.