Isn't encryption on the device the best bet for a safe cloud?
encryption on the device the best bet for a safe cloud?
„cloud computing“ encompasses two aspects:
- Data storage in a cloud for
one’s self, excluding multiple or third-party access.
- Data processing or storage of
information in a cloud, intended for multiple or third-party access.
In the first
case, encrypting data on a device and then transferring it in encrypted form to
the cloud is sufficient. However, should information be shared with third
parties, as in the second case, the secret key would have to be distributed
through some safe channels or by centralized key administration. Transferring
the key through unsafe channels (e.g., a password by e-mail), can lead to
undesired eavesdropping through robots and third parties. However, should the
data not only be stored but also processed in the cloud, data encryption is
necessary once it has been transferred to the cloud. This is because data
processing requires, with the exception of so-called homomorphic encryption, that
the data is available in plain text. Usually at this point, the administrators
of the cloud, as well as the cloud application, have direct access to the
confidential data. Consequently, that kind of data processing requires
trustworthy providers and administrators. The special feature of the sealed
cloud is that it logically, electronically and mechanically prevents the
operators or administrators from accessing the data during processing. Thus,
the sealed cloud creates the possibility to process confidential data in the
cloud. idgard® applies this new basic technology to enable secure communication
via sealed privacy boxes without complicated key management.
Dieser Artikel konnte Ihre Frage nicht beantworten?
Wir helfen Ihnen gerne weiter! Schreiben Sie uns einfach eine Nachricht mit Ihren Fragen und wir melden uns so bald wie möglich bei Ihnen zurück.
Der Inhalt dieser Onlinehilfe dient lediglich zu Informations- und Dokumentationszwecken für das Produkt idgard® und kann jederzeit ohne Vorankündigungen geändert werden. Für Fehler oder Ungenauigkeiten übernehmen wir keine Verantwortung oder Haftung. Aufgrund technischer Weiterentwicklungen behält sich die uniscon GmbH jederzeit vor, den Funktionsumfang des Produkts zu ändern.
(C) uniscon GmbH
Creating a user with guest license
You create a person of another company with a guest license to enable him to exchange data in idgard® with other users. If you have created a user with a guest license, you send him the link for his registration. The user creates login data during ...
idgard® Update and possible Service Interruption on Saturday 06th of August 2022
Dear Customer, We are planning an idgard system update on the evening of August 6, 2022. The update will begin at 9:00 pm and is expected to last until 11:00 pm. We can not guarantee full availability of all idgard features during this period. ...
Move objects within a box
There are 2 methods to move a file, folder or message. You can use the "Move" function or move these objects using "Drag&Drop". If you want to move the objects of others, you need the right of a creator or administrator of a box. To move your own ...
Secure deletion of objects - using the recycle bin
Once the box creator or mamager has enabled the recycle bin function in your box, you can move items (folders, files, messages) to the recycle bin for deletion. Data moved to the Recycle Bin is not permanently deleted - it can be restored by the box ...
Download objects from a box
If you want to download objects, you need at least the right to read. There are two different methods to download objects. One method is used to download one object, another for multiple objects. Screenshot to download an object: Proceed as follows: ...
Operator-safe data exchange with idgard®
Operator-safe data exchange with idgard® With idgard®, operator security means that we have no access to your data. idgard® eliminates this risk completely, not only thanks to its encryption technology but also through intelligent physical access ...
Problem with new login
Problem with new login At the moment, when connecting idgard® Boxes with WebDAV via FullQualifiedDistinguished Name (FQDN) as "networkfolder" and not as "drive", problems occur after a new Windows login due to a problem of the Windows WebDav Client ...
Future developments of idgard®
Future developments of idgard® idgard® is the first cloud service built on sealed cloud technology, which makes it possible, for the first time, to combine end-to-end security with data processing in the cloud. So far, it was possible either to only ...
Enable WebDAV function
Enable WebDAV function WebDAV customarily postulates local storage of a username and password, so that it is only secure and recommendable if the used device is in a trustworthy environment. Protection Class Implications as per Trusted Cloud Data ...
Legal issues related to idgard®
Legal issues related to idgard® The relevant aspects concern the telecommunications and data protection laws, as well as contractual issues regarding cloud services. The service idgard® and its sealed cloud technology are compliant with these norms ...
Create e-mail template for registrations
Create e-mail template for registrations This feature is only available in the Enterprise package. If you have the Admin's permissions in the idgard® account, you can write an individual text for the user registration. This text will be used if you ...
Dear Customer! In June 2022, we will remove certificate pinning from our products. Over the years, security around the use of certificates has improved significantly. In particular, the threat of man-in-the-middle attacks has been mitigated through ...
Welcome to the idgard® online help
Welcome to the idgard® online help This online help is the main source of information for learning and working with idgard®. Click on one of the following links to obtain further information about idgard®. To use the online help: Search article Enter ...
New articles - new functions in idgard® version 1.4
New functions Permission to view and export journal contents in the Data Room Viewing, querying, and exporting activities in the journal of a Data Room Disclaimer The content of this online help is intended solely for information and documentation ...
Isn't encryption on the device the best bet for a safe cloud?
Isn't encryption on the device the best bet for a safe cloud? The term „cloud computing“ encompasses two aspects: Data storage in a cloud for one’s self, excluding multiple or third-party access. Data processing or storage of information in a cloud, ...