Client-side encryption: Difference between revisions

Content deleted Content added
m Reverted 1 edit by 86.124.62.164 (talk) to last revision by ErikHaugen. (TW)
Crice88 (talk | contribs)
improved content and added references
Line 1:
'''Client-side encryption''' is the [[cryptographic]] technique of [[encrypting]] data on the sender's side, before it is transmitted to a [[server (computing)|server]] insuch as a [[computercloud network]]storage service.<ref Usually,name=infosectoday>{{cite encryptionweb is|url= performedhttp://www.infosectoday.com/Articles/Client-Side_Encryption.htm with|title= aWhy [[keyClient-Side (cryptography)|key]]Encryption thatIs isthe notNext knownBest toIdea thein server.Cloud-Based Data Security |date= 2015 |accessdate= February Consequently21, the2016 service|author= providerTunio isZaffer unable|website= toInformation decryptSecurity theToday hosted|publisher= data.Auerbach InPublications}}</ref> orderUnlike [[End-to-end accessencryption|end-to-end encryption]], client-side encryption features a passphrase that is not available to the dataservers, making it mustimpossible alwaysfor beservice decryptedproviders byto thedecrypt clienthosted data. [[Client-side]] encryption allows for the creation of [[zero-knowledge proof|zero-knowledge applications]] whose providers cannot access the data its users have stored, thus offering a high level of privacy.<ref name=infosectoday/>
{{unreferenced|date=February 2011}}
 
Client-side encryption is widely recognized as an exceptionally robust data security strategy. By eliminating the potential for data to be viewed by service providers (or third parties that compel service providers to deliver access to data), client-side encryption ensures that data and files that are stored in the cloud can only be viewed on the client side of the exchange. This prevents data loss and the unauthorized disclosure of private or personal files, providing increased peace of mind for both personal and business users.<ref name=infosectoday/>
'''Client-side encryption''' is the [[cryptographic]] technique of [[encrypting]] data before it is transmitted to a [[server (computing)|server]] in a [[computer network]]. Usually, encryption is performed with a [[key (cryptography)|key]] that is not known to the server. Consequently, the service provider is unable to decrypt the hosted data. In order to access the data, it must always be decrypted by the client. [[Client-side]] encryption allows for the creation of [[zero-knowledge proof|zero-knowledge applications]] whose providers cannot access the data its users have stored, thus offering a high level of privacy.
 
Current academic scholarship as well as recommendations by industry professionals provide much support for developers to include client-side encryption to protect the confidentiality and integrity of information.<ref name="Chandra2014">{{cite book |author=Deka, Ganesh Chandra |title=Handbook of Research on Securing Cloud-Based Databases with Biometric Applications |url=http://books.google.com/books?id=iiKXBQAAQBAJ |accessdate=21 February 2016 |date=31 October 2014 |publisher=IGI Global |isbn=978-1-4666-6560-6 |chapter=3 Security Architecture for Cloud Computing}}</ref><ref name="Ackermann2012">{{cite book |author=Tobias Ackermann |title=IT Security Risk Management: Perceived IT Security Risks in the Context of Cloud Computing |url=http://books.google.com/books?id=3WFEAAAAQBAJ&pg=PA136 |accessdate=21 February 2016 |date=22 December 2012 |publisher=Springer Science & Business Media |isbn=978-3-658-01115-4 |pages=136–}}</ref><ref>{{cite book |title=Cloud Computing Sicherheit: Schutzziele, Taxonomie, Marktübersicht |url=http://books.google.com/books?id=JgNUcgAACAAJ |accessdate=21 February 2016 |year=2009 |publisher=Fraunhofer-Institut for Sicker Informationstechnologie SIT |isbn=978-3-9813317-0-7 |chapter=Communications of the Association for Information Systems 13:Article 24}}</ref>
 
As of February 2016, neither [[iCloud|Apple iCloud]],<ref name=infosectoday/><ref name=stackexchange>{{cite web |url= http://apple.stackexchange.com/questions/58508/does-icloud-use-client-side-encryption |title= Does iCloud use client-side encryption? |date= 30 July 2012 |accessdate= February 21, 2016 |website= Stack Overflow}}</ref><ref name=dataconomy>{{cite web |url= http://dataconomy.com/client-side-encryption-the-latest-trend-in-cloud-storage/ |title= Client Side Encryption: The Latest Trend In Cloud Storage |date= 8 April 2015 |accessdate= February 21, 2016 |author= Tunio Zaffer |website= Dataconomy}}</ref> [[Google Drive]],<ref name=googledriveinsecure>{{cite web |url= http://download.cnet.com/blog/download-blog/how-to-make-google-drive-more-secure/ |title= How to make Google Drive more secure: Get file encryption and strong password protection to secure your stuff. |author= Tom McNamara |date= 8 July 2015 |accessdate= February 21, 2016 |website= CNET’s The Download Blog}}</ref> or [[Dropbox (service)|Dropbox]]<ref name=“dropboxnoprivatekey”>{{cite web |url= https://www.dropbox.com/en/help/28 |title= Can I specify my own private key for my Dropbox? |accessdate= February 21, 2016}}</ref> provide client-side encryption, though all three provide the far-less secure end-to-end encryption.
 
==See also==
* [[End-to-end encryption]]
* [[Homomorphic encryption]]
 
==References==
{{reflist}}
 
[[Category:Cryptography]]
[[Category:Clients (computing)]]
[[Category:Cloud storage]]
[[Category:Online backup services]]
 
{{Crypto-stub}}