Isn't encryption on the device the best bet for a safe cloud | idgard®

Isn't encryption on the device the best bet for a safe cloud?

Isn't encryption on the device the best bet for a safe cloud?

The term „cloud computing“ encompasses two aspects:
  1. Data storage in a cloud for one’s self, excluding multiple or third-party access.
  1. Data processing or storage of information in a cloud, intended for multiple or third-party access.
In the first case, encrypting data on a device and then transferring it in encrypted form to the cloud is sufficient. However, should information be shared with third parties, as in the second case, the secret key would have to be distributed through some safe channels or by centralized key administration. Transferring the key through unsafe channels (e.g., a password by e-mail), can lead to undesired eavesdropping through robots and third parties. However, should the data not only be stored but also processed in the cloud, data encryption is necessary once it has been transferred to the cloud. This is because data processing requires, with the exception of so-called homomorphic encryption, that the data is available in plain text. Usually at this point, the administrators of the cloud, as well as the cloud application, have direct access to the confidential data. Consequently, that kind of data processing requires trustworthy providers and administrators. The special feature of the sealed cloud is that it logically, electronically and mechanically prevents the operators or administrators from accessing the data during processing. Thus, the sealed cloud creates the possibility to process confidential data in the cloud. idgard® applies this new basic technology to enable secure communication via sealed privacy boxes without complicated key management.


Dieser Artikel konnte Ihre Frage nicht beantworten?

Wir helfen Ihnen gerne weiter! Schreiben Sie uns einfach eine Nachricht mit Ihren Fragen und wir melden uns so bald wie möglich bei Ihnen zurück.

   Ticket erstellen

Haftungshinweis/Disclaimer

Der Inhalt dieser Onlinehilfe dient lediglich zu Informations- und Dokumentationszwecken für das Produkt idgard® und kann jederzeit ohne Vorankündigungen geändert werden. Für Fehler oder Ungenauigkeiten übernehmen wir keine Verantwortung oder Haftung. Aufgrund technischer Weiterentwicklungen behält sich die uniscon GmbH jederzeit vor, den Funktionsumfang des Produkts zu ändern.


(C) uniscon GmbH



    • Recent Articles

    • Duplicating a folder structure with Extended Rights Management (ERM)

      Duplicating a folder structure with Extended Rights Management (ERM) In data rooms, you can now use an existing folder structure with group permissions as a template. Files are not transferred to the duplicated structure. Open the "3-dot" menu in the ...
    • Batch job

      Batch job If you have started an extensive work process, it will be executed in batches. In the sidebar to the left you will find the tab batch process. If you open it, you can see the sequence of the processed job. The batch job is used for copy ...
    • Copy data

      Copy data You can copy multiple folders, files, or messages to another location within the Box or to another Box. To copy to another Box, you must be a Box member. You  need read permission to copy. Use the check box to select the items you want to ...
    • Role "Assistant" in a data room

      Role "Assistant" in a data room The "Assistant" role can be found in the member administration of a data room. It can only be assigned to a full license user. The assistant should act as an stand-in for an Administrator with the "Room Assistant" ...
    • Create e-mail template for notifications

      Create e-mail template for notifications This feature is available only in the Enterprise package. If you have the administrator permissions in the idgard® account, you can write an individual text for the notification of new/unread documents for ...
    • Related Articles

    • Operator-safe data exchange with idgard®

      Operator-safe data exchange with idgard® With idgard®, operator security means that we have no access to your data. idgard® eliminates this risk completely, not only thanks to its encryption technology but also through intelligent physical access ...
    • Problem with new login

      Problem with new login At the moment, when connecting idgard® Boxes with WebDAV via FullQualifiedDistinguished Name (FQDN) as "networkfolder" and not as "drive", problems occur after a new Windows login due to a problem of the Windows WebDav Client ...
    • Enable WebDAV function

      Enable WebDAV function WebDAV customarily postulates local storage of a username and password, so that it is only secure and recommendable if the used device is in a trustworthy environment. Protection Class Implications as per Trusted Cloud Data ...
    • Future developments of idgard®

      Future developments of idgard® idgard® is the first cloud service built on sealed cloud technology, which makes it possible, for the first time, to combine end-to-end security with data processing in the cloud. So far, it was possible either to only ...
    • idgard® webinars

      idgard® webinars Find out how easy it is to work with idgard®. We have recorded various webinars for you. The content ranges from product presentations to demonstrations of special applications. You don’t miss any information because you can watch ...
    • Popular Articles

    • Create e-mail template for registrations

      Create e-mail template for registrations This feature is only available in the Enterprise package. If you have the Admin's permissions in the idgard® account, you can write an individual text for the user registration. This text will be used if you ...
    • Welcome to the idgard® online help

      Welcome to the idgard® online help This online help is the main source of information for learning and working with idgard®. Click on one of the following links to obtain further information about idgard®. To use the online help: Search article Enter ...
    • Isn't encryption on the device the best bet for a safe cloud?

      Isn't encryption on the device the best bet for a safe cloud? The term „cloud computing“ encompasses two aspects: Data storage in a cloud for one’s self, excluding multiple or third-party access. Data processing or storage of information in a cloud, ...
    • Legal issues related to idgard®

      Legal issues related to idgard®   The relevant aspects concern the telecommunications and data protection laws, as well as contractual issues regarding cloud services. The service idgard® and its sealed cloud technology are compliant with these norms ...
    • What specific risks are eliminated by idgard® in business communication?

      What specific risks are eliminated by idgard® in business communication? Business communication without leaks and liability risks. Communication and collaboration across company boundaries is usually done using ordinary email. Neither confidentiality ...