Jump to content

Client-side encryption: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Full stop before ref
Tags: Mobile edit Mobile web edit Advanced mobile edit
Rescuing 1 sources and tagging 0 as dead.) #IABot (v2.0.1
Line 1: Line 1:
'''Client-side encryption''' is the [[cryptographic]] technique of [[encrypting]] data on the sender's side, before it is transmitted to a [[server (computing)|server]] such as a cloud storage service.<ref name=infosectoday>{{cite web |url= http://www.infosectoday.com/Articles/Client-Side_Encryption.htm |title= Why Client-Side Encryption Is the Next Best Idea in Cloud-Based Data Security |date= 2015 |accessdate= February 21, 2016 |author= Tunio Gaffer |website= Information Security Today |publisher= Auerbach Publications}}</ref> Client-side encryption features an encryption key that is not available to the service provider, making it difficult or impossible for service providers to decrypt hosted data. Client-side encryption allows for the creation of applications whose providers cannot access the data its users have stored, thus offering a high level of privacy.<ref name=infosectoday/> Those applications are sometimes marketed under the misleading term "zero-knowledge".<ref>{{Cite web|url=https://news.ycombinator.com/item?id=13303436|title=Spider Oak - Please stop describing your service as "Zero Knowledge" unless and ... {{!}} Hacker News|website=news.ycombinator.com|access-date=2018-07-16}}</ref>
'''Client-side encryption''' is the [[cryptographic]] technique of [[encrypting]] data on the sender's side, before it is transmitted to a [[server (computing)|server]] such as a cloud storage service.<ref name=infosectoday>{{cite web |url= http://www.infosectoday.com/Articles/Client-Side_Encryption.htm |title= Why Client-Side Encryption Is the Next Best Idea in Cloud-Based Data Security |date= 2015 |accessdate= February 21, 2016 |author= Tunio Gaffer |website= Information Security Today |publisher= Auerbach Publications |archive-url= https://web.archive.org/web/20160116160010/http://www.infosectoday.com/Articles/Client-Side_Encryption.htm |archive-date= January 16, 2016 |url-status= dead }}</ref> Client-side encryption features an encryption key that is not available to the service provider, making it difficult or impossible for service providers to decrypt hosted data. Client-side encryption allows for the creation of applications whose providers cannot access the data its users have stored, thus offering a high level of privacy.<ref name=infosectoday/> Those applications are sometimes marketed under the misleading term "zero-knowledge".<ref>{{Cite web|url=https://news.ycombinator.com/item?id=13303436|title=Spider Oak - Please stop describing your service as "Zero Knowledge" unless and ... {{!}} Hacker News|website=news.ycombinator.com|access-date=2018-07-16}}</ref>


==Details==
==Details==

Revision as of 05:05, 24 July 2020

Client-side encryption is the cryptographic technique of encrypting data on the sender's side, before it is transmitted to a server such as a cloud storage service.[1] Client-side encryption features an encryption key that is not available to the service provider, making it difficult or impossible for service providers to decrypt hosted data. Client-side encryption allows for the creation of applications whose providers cannot access the data its users have stored, thus offering a high level of privacy.[1] Those applications are sometimes marketed under the misleading term "zero-knowledge".[2]

Details

Client-side encryption seeks to eliminate the potential for data to be viewed by service providers (or third parties that compel service providers to deliver access to data), client-side encryption ensures that data and files that are stored in the cloud can only be viewed on the client side of the exchange. This prevents data loss and the unauthorized disclosure of private or personal files, providing increased peace of mind for its users.[1]

Current academic scholarship as well as recommendations by industry professionals provide much support for developers to include client-side encryption to protect the confidentiality and integrity of information.[3][4][5]

Examples of cloud storage services that provide client-side encryption are Tresorit, MEGA and SpiderOak. As of February 2016, neither Apple iCloud,[1][6][7] Google Drive,[8] or Dropbox[9] provide client-side encryption.

See also

References

  1. ^ a b c d Tunio Gaffer (2015). "Why Client-Side Encryption Is the Next Best Idea in Cloud-Based Data Security". Information Security Today. Auerbach Publications. Archived from the original on January 16, 2016. Retrieved February 21, 2016.
  2. ^ "Spider Oak - Please stop describing your service as "Zero Knowledge" unless and ... | Hacker News". news.ycombinator.com. Retrieved 2018-07-16.
  3. ^ Deka, Ganesh Chandra (31 October 2014). "3 Security Architecture for Cloud Computing". Handbook of Research on Securing Cloud-Based Databases with Biometric Applications. IGI Global. ISBN 978-1-4666-6560-6. Retrieved 21 February 2016.
  4. ^ Tobias Ackermann (22 December 2012). IT Security Risk Management: Perceived IT Security Risks in the Context of Cloud Computing. Springer Science & Business Media. pp. 136–. ISBN 978-3-658-01115-4. Retrieved 21 February 2016.
  5. ^ "Communications of the Association for Information Systems 13:Article 24". Cloud Computing Sicherheit: Schutzziele, Taxonomie, Marktübersicht. Fraunhofer-Institut für Sichere Informationstechnologie SIT. 2009. ISBN 978-3-9813317-0-7. Retrieved 21 February 2016.
  6. ^ "Does iCloud use client-side encryption?". Stack Overflow. 30 July 2012. Retrieved February 21, 2016.
  7. ^ Tunio Zaffer (8 April 2015). "Client Side Encryption: The Latest Trend In Cloud Storage". Dataconomy. Retrieved February 21, 2016.
  8. ^ Tom McNamara (8 July 2015). "How to make Google Drive more secure: Get file encryption and strong password protection to secure your stuff". CNET’s The Download Blog. Retrieved February 21, 2016.
  9. ^ "Can I specify my own private key for my Dropbox?". Retrieved February 21, 2016.