11415782 sentrycom enables privacy in public cloud computing storage and webmail
TRANSCRIPT
-
8/7/2019 11415782 Sentrycom Enables Privacy in Public Cloud Computing Storage and Webmail
1/2
PR Log - Global Press Release Distribution
SentryCom enables privacy in Public Cloud Computing Storage and Webmail.
By Dr. Eli Talmor
Dated: Apr 04, 2011
While the benefits of using a public cloud infrastructure are clear, it introduces significant security and
privacy risks.SentryCom allows the users of public cloud infrastructure to keep their sensitive files secure
and private using software app.
Cloud computing includes various types of services where a customer makes use of a service providers
computing, storage or networking infrastructure.
Cloud infrastructures can be roughly categorized as either private or public. In a private cloud, the
infrastructure is managed and owned by the customer and located on-premise (i.e., in the customers region
of control). In particular, this means that access to customer data is under its control and is only granted to
parties it trusts. In a public cloud the infrastructure is owned and managed by a cloud service provider and
is located off-premise (i.e., in the cloud service providers region of control). This means that customer datais outside its control and could potentially be granted to un-trusted parties.
Storage services based on public clouds such Amazons S3 provide customers with scalable and dynamic
storage. By moving their data to the cloud customers can avoid the costs of building and maintaining a
private storage infrastructure, opting instead to pay a service provider as a function of its needs. For most
customers, this provides several benefits including availability (i.e., being able to access data from
anywhere) and reliability (i.e., not having to worry about backups) at a relatively low cost.
While the benefits of using a public cloud infrastructure are clear, it introduces significant security and
privacy risks. In fact, it seems that the biggest hurdle to the adoption of cloud storage (and cloud computing
in general) is concern over the confidentiality and integrity of data.
Ideally we should aim to achieve the best of both worlds by providing the security of a private cloud and
the functionality and cost savings of a public cloud.Thus we need to achieve:
1. confidentiality: the cloud storage provider does cannot access customer's files ,
2. integrity: no unauthorized modification of customer data by the cloud storage provider,
3. non-repudiation: any access to customer data is logged,
while retaining the main benefits of a public storage service:
1. availability: customer data is accessible from any machine and at all times
2. reliability: customer data is reliably backed up
3. efficient retrieval: data retrieval times are comparable to a public cloud storage service
4. data sharing: customers can share their data with trusted parties.
Main privacy concerns with cloud computing were outlined by the Cloud Security Alliance.
SentryCom novel software app. addresses these concerns as following:1.Regulatory compliance. Most countries have laws in place that make organizations responsible for the
protection of the data that is entrusted to them. SentryCom customers can be assured that the confidentiality
of their data is preserved irrespective of the actions of the cloud storage provider. This greatly reduces any
legal exposure for both the customer and the provider.
2.Geographic restrictions. Data that is stored in certain legal jurisdictions may be subject to regulations
even if it was not collected there.
In SentryCom software app. data is only stored in encrypted form so any law that pertains stored data has
little to no effect on the customer. This reduces legal exposure for the customer and allows the cloud
storage provider to make optimal use of its storage infrastructure, thereby reducing costs.
3.Subpoenas. If an organization becomes the subject of an investigation, law enforcement agencies may
request access to its data. If the data is stored in a public cloud, the request may be made to the cloud
provider and the latter could even be prevented from notifying the customer. This can have severe
consequences for customers, since it preempts the customer from challenging the request. In a SentryCom
Page 1/2
http://www.prlog.org/http://www.prlog.org/ -
8/7/2019 11415782 Sentrycom Enables Privacy in Public Cloud Computing Storage and Webmail
2/2
PR Log - Global Press Release Distribution
software app., since data is stored in encrypted form and since the customer retains possession of data
access rights, any request for the data must be made directly to the customer.
4.Security breaches. Even if a cloud storage provider implements strong security practices there is always
the possibility of a security breach. If this occurs the customer may be legally responsible.
Cloud computing encompasses both a server and a client side. With emphasis typically placed on the
former, the latter can be easily overlooked. Having a backdoor Trojan, keystroke logger, or other type ofmalware running on a client device undermines the security of cloud or other Web-based services.
SentryCom software app. is malware resilient.
4.Data retention and destruction. In many cases a customer may be responsible for the retention and
destruction of data it has collected. Inability to decrypt data on the cloud makes this straightforward.
SentryCom allows the users of Cloud-based Webmail such as GMail or Cloud-based file storage services
such as Dropbox to address the privacy issues in the most convenient and secure fashion , while keeping all
the advantages of these popular services .
All you have to do is :
1. Choose the file you want (any type)
2. Choose file delivery method (save to Dropbox folder or send to Webmail)
3. Define file recipient (yourself for backup, or your colleague(s)).
4. Click encrypt.
The file will be encrypted with top-secret grade AES 256 bit key, that will be stored at SentryCom
MACS-Managed Authentication & Crypto Service. To request this key in the real-time- file recipient will
need to perform malware-resilient multi-factor strong authentication vs. SentryCom MACS. This process,
performed independently from Cloud Service Provider, ensures customer's privacy. No one , except
specified file recipient(s) , will be able to access this file.
Please contact SentryCom http://www.sentry-com.net/contactus.html for additional information.
###
SentryCom is a SaaS provider of user-friendly solutions for ID Fraud prevention, using proprietary and
patented Strong Authentication and Crypto technologies,reducing ID Fraud revenue losses and at the same
time reducing the cost of ID Fraud prevention.
Category Security, Computers, Internet
Tags Public Cloud Computing, storage, privacy, security, webmail, dropbox, gmail, saas
Email Click to email author
Phone 972-4-8342392
Fax 972-3-7255867
Address POB 56263
City/Town Haifa
State/Province Haifa
Zip 34989
Country Israel
Page 2/2
http://www.prlog.org/http://www.prlog.org/11415782.htmlhttp://cat-security/http://cat-computers/http://cat-internet/http://cat-internet/http://tag/storage/http://tag/privacy/http://tag/security/http://tag/webmail/http://tag/dropbox/http://tag/gmail/http://tag/saas/http://www.prlog.org/email-contact.html?id=11415782http://tag/saas/http://tag/saas/http://tag/saas/http://il%2Chaifa%2Chaifa/http://il%2Chaifa/http://tag/saas/http://il/http://il/http://tag/saas/http://il%2Chaifa/http://il%2Chaifa%2Chaifa/http://tag/saas/http://tag/saas/http://tag/saas/http://www.prlog.org/email-contact.html?id=11415782http://tag/saas/http://tag/gmail/http://tag/gmail/http://tag/dropbox/http://tag/dropbox/http://tag/webmail/http://tag/webmail/http://tag/security/http://tag/security/http://tag/privacy/http://tag/privacy/http://tag/storage/http://tag/storage/http://cat-internet/http://cat-internet/http://cat-computers/http://cat-computers/http://cat-security/http://cat-security/http://www.prlog.org/11415782.htmlhttp://www.prlog.org/11415782.htmlhttp://www.prlog.org/