Client-side encryption: Difference between revisions

Content deleted Content added
Added content and citation.
Line 2:
 
==Details==
Client-side encryption seeks to eliminate the potential for data to be viewed by service providers (or third parties that compel service providers to deliver access to data), client-side encryption ensures that data and files that are stored in the cloud can only be viewed on the client -side of the exchange. By remaining encrypted through each intermediary server, client -side encryption ensures that data retains privacy from the origin to the destination server.<ref>{{Cite web|date=2015-05-25|title=What is Client-side Encryption and Why Does It Matter?|url=https://www.virtru.com/blog/client-side-encryption/|access-date=2021-05-05|website=Virtru|language=en-US}}</ref> This prevents data loss and the unauthorized disclosure of private or personal files, providing increased peace of mind for its users.<ref name=infosectoday/>
 
Current academic scholarship as well as recommendations by industry professionals provide much support for developers to include client-side encryption to protect the confidentiality and integrity of information.<ref name="Chandra2014">{{cite book |author=Deka, Ganesh Chandra |title=Handbook of Research on Securing Cloud-Based Databases with Biometric Applications |url=https://books.google.com/books?id=iiKXBQAAQBAJ |accessdate=21 February 2016 |date=31 October 2014 |publisher=IGI Global |isbn=978-1-4666-6560-6 |chapter=3 Security Architecture for Cloud Computing}}</ref><ref name="Ackermann2012">{{cite book |author=Tobias Ackermann |title=IT Security Risk Management: Perceived IT Security Risks in the Context of Cloud Computing |url=https://books.google.com/books?id=3WFEAAAAQBAJ&pg=PA136 |accessdate=21 February 2016 |date=22 December 2012 |publisher=Springer Science & Business Media |isbn=978-3-658-01115-4 |pages=136–}}</ref><ref>{{cite book |title=Cloud Computing Sicherheit: Schutzziele, Taxonomie, Marktübersicht |url=https://books.google.com/books?id=JgNUcgAACAAJ |accessdate=21 February 2016 |year=2009 |publisher=Fraunhofer-Institut für Sichere Informationstechnologie SIT |isbn=978-3-9813317-0-7 |chapter=Communications of the Association for Information Systems 13:Article 24}}</ref>