Client-side encryption: Difference between revisions

Content deleted Content added
Rescuing 1 sources and tagging 0 as dead.) #IABot (v2.0.1
Added content and citation.
Line 2:
 
==Details==
Client-side encryption seeks to eliminate the potential for data to be viewed by service providers (or third parties that compel service providers to deliver access to data), client-side encryption ensures that data and files that are stored in the cloud can only be viewed on the client side of the exchange. By remaining encrypted through each intermediary server, client side encryption ensures that data retains privacy from the origin to the destination server.<ref>{{Cite web|date=2015-05-25|title=What is Client-side Encryption and Why Does It Matter?|url=https://www.virtru.com/blog/client-side-encryption/|access-date=2021-05-05|website=Virtru|language=en-US}}</ref> This prevents data loss and the unauthorized disclosure of private or personal files, providing increased peace of mind for its users.<ref name=infosectoday/>
 
Current academic scholarship as well as recommendations by industry professionals provide much support for developers to include client-side encryption to protect the confidentiality and integrity of information.<ref name="Chandra2014">{{cite book |author=Deka, Ganesh Chandra |title=Handbook of Research on Securing Cloud-Based Databases with Biometric Applications |url=https://books.google.com/books?id=iiKXBQAAQBAJ |accessdate=21 February 2016 |date=31 October 2014 |publisher=IGI Global |isbn=978-1-4666-6560-6 |chapter=3 Security Architecture for Cloud Computing}}</ref><ref name="Ackermann2012">{{cite book |author=Tobias Ackermann |title=IT Security Risk Management: Perceived IT Security Risks in the Context of Cloud Computing |url=https://books.google.com/books?id=3WFEAAAAQBAJ&pg=PA136 |accessdate=21 February 2016 |date=22 December 2012 |publisher=Springer Science & Business Media |isbn=978-3-658-01115-4 |pages=136–}}</ref><ref>{{cite book |title=Cloud Computing Sicherheit: Schutzziele, Taxonomie, Marktübersicht |url=https://books.google.com/books?id=JgNUcgAACAAJ |accessdate=21 February 2016 |year=2009 |publisher=Fraunhofer-Institut für Sichere Informationstechnologie SIT |isbn=978-3-9813317-0-7 |chapter=Communications of the Association for Information Systems 13:Article 24}}</ref>