Content deleted Content added
No edit summary |
m "widely recognized"? |
||
Line 1:
'''Client-side encryption''' is the [[cryptographic]] technique of [[encrypting]] data on the sender's side, before it is transmitted to a [[server (computing)|server]] such as a cloud storage service.<ref name=infosectoday>{{cite web |url= http://www.infosectoday.com/Articles/Client-Side_Encryption.htm |title= Why Client-Side Encryption Is the Next Best Idea in Cloud-Based Data Security |date= 2015 |accessdate= February 21, 2016 |author= Tunio Zaffer |website= Information Security Today |publisher= Auerbach Publications}}</ref> Client-side encryption features a passphrase that is not available to the servers, making it impossible for service providers to decrypt hosted data. Client-side encryption allows for the creation of [[zero-knowledge proof|zero-knowledge applications]] whose providers cannot access the data its users have stored, thus offering a high level of privacy.<ref name=infosectoday/>
Client-side encryption is widely recognized{{who}} as an exceptionally robust data security strategy. By eliminating the potential for data to be viewed by service providers (or third parties that compel service providers to deliver access to data), client-side encryption ensures that data and files that are stored in the cloud can only be viewed on the client side of the exchange. This prevents data loss and the unauthorized disclosure of private or personal files, providing increased peace of mind for both personal and business users.<ref name=infosectoday/>
Current academic scholarship as well as recommendations by industry professionals provide much support for developers to include client-side encryption to protect the confidentiality and integrity of information.<ref name="Chandra2014">{{cite book |author=Deka, Ganesh Chandra |title=Handbook of Research on Securing Cloud-Based Databases with Biometric Applications |url=http://books.google.com/books?id=iiKXBQAAQBAJ |accessdate=21 February 2016 |date=31 October 2014 |publisher=IGI Global |isbn=978-1-4666-6560-6 |chapter=3 Security Architecture for Cloud Computing}}</ref><ref name="Ackermann2012">{{cite book |author=Tobias Ackermann |title=IT Security Risk Management: Perceived IT Security Risks in the Context of Cloud Computing |url=http://books.google.com/books?id=3WFEAAAAQBAJ&pg=PA136 |accessdate=21 February 2016 |date=22 December 2012 |publisher=Springer Science & Business Media |isbn=978-3-658-01115-4 |pages=136–}}</ref><ref>{{cite book |title=Cloud Computing Sicherheit: Schutzziele, Taxonomie, Marktübersicht |url=http://books.google.com/books?id=JgNUcgAACAAJ |accessdate=21 February 2016 |year=2009 |publisher=Fraunhofer-Institut for Sicker Informationstechnologie SIT |isbn=978-3-9813317-0-7 |chapter=Communications of the Association for Information Systems 13:Article 24}}</ref>
|