When you decide to start using a cloud storage or        online backup provider, you may have some worries about    security: weve all seen the sensational headlines about    starlets having naked pictures of themselves stolen from    their online accounts. The power that the U.S. Senate has    recently granted    to ISPs may also inspire worry.  
    However, with proper security measures, your stored files can    be just as safe in the cloud as they are on your laptop  if    not safer. In this article well talk a little about the most    common ways cloud services protect your data.  
    With cloud storage, you dont have to worry about the physical    security of your data: even if your laptop or tablet gets    stolen, you wont have lost your documents and images. Most    cloud storage breaches were actually facilitated by users who    gave away their passwords, often as the victims of     phishing.  
    Your introduction to the world of cloud storage is likely to be    through the services of Dropbox,    Google    Drive or OneDrive.    These services are backed by big corporations that can offer    storage space free of charge.  
    The slick advertising of these big businesses mean that they    manage to grab the attention of many potential cloud storage    customers. However, thanks to the security blunders of these    major players, specialist providers have found opening in the    market. Good examples are Sync.com for    storage and Carbonite    for backup. Cloudwards.net also has a list ofsecure    Dropbox alternatives.  
    Lets take a look at some of the most common terms youll see    when shopping for a cloud storage or backup provider.  
        HTTPS stands for Hypertext Transfer Protocol Secure. HTTP    (without the secure) is a standard of messaging that all Web    servers use to transfer Web pages to browsers. HTTPS adds a    layer of security to these procedures and it is the bedrock of    ecommerce.  
    You will see https:// at the beginning of some addresses in    the bar at the top of your browser. That means the Web page    that you are looking at was transferred to your computer with    the secured version of HTTP. You dont need to worry too much    about the security behind HTTPS; its the system that protects    your credit card details when you pay for things online.  
    SSL means Secure Socket Layer and this protocol contains the    procedures that put the S in HTTPS. In 2008, after running    for a while, SSL was discovered to have some security    weaknesses.  
    The protocol was open to spoofing,    which means that hackers were able to forge the security    certificates that formed the heart of the SSL verification    system. These certificates contain the encryption key that the    client is supposed to use in order to secure connections. Soon    after, Transport Layer Security (TLS) protocol was designed to    replace SSL.  
    Further weaknesses were discovered over the years and they    caused the International Engineering Taskforce to deprecate    the protocol in 2015, which effectively told everyone not to use SSL for    security. Although no one implements SSL any more, the term is    still often used: in reality, services that say they use SSL    actually use TLS.  
    Although banks used to rely on HTTPS for security when they    provide online banking, most have kicked their privacy features    up a notch with two-factor authentication, which you often will    see written as 2FA.  
    As with most logins, you need a username and a password, but        2FA requires some other method of identification on top of    that. This should be something that only the user has and it    can be a physical possession, or a secret piece of information.    Some banks give clients a special card reader which generates a    second pass code, while others will send you an     access code by SMS.  
        iCloud uses a keychain device that generates a code.    However, that keychain fob quickly disappeared when Apple    integrated 2FA code generation into their standard products.  
    The U.S. National Institute of Standards and Technology    commissioned the creation of the Advanced    Encryption Standard, or AES, to create a secure method of    encryption that could be used by government agencies.  
    The encryption process involves transforming blocks of numbers    by organizing them into a series of grids and then adjusting    each number in the grid by applying a cryptographic key. The    specifications for AES allows for different lengths of    encryption keys. The shortest key used for encryption is 128    bits long and is often used for encryption on mobile devices.    The most common length of key for cloud storage data encryption    is 256 bits.  
    The length of the encryption key is important because the    specifications of AES are publicly available. That means that    anyone who knows the formula could crack the encryption simply    by guessing the key.  
    You may remember some TV cybercrime thriller where the hackers    use a computer program that whizzes through a series of numbers    until it hits the right key, flashes, goes beep, and then one    of the young hackers says, Were in. Thanks to 256-bit    encryption keys, that scene would end up being really long and    boring.  
    There are 1.1 X 1077 possible key combinations. It    would take 3.31 X 1056years    to guess right. To write that number out in full, you would    have 33,100 followed by 53 more zeros. To make decryption even    more time consuming, the AES encryption method transforms each    grid of numbers 14 times over.  
    The AES system is so reliable that it has become the touchstone    for security all over the Internet. However, thanks to the    revelations of Edward Snowden and other leaks regarding the        NSA tampering with encryption systems, some worry that even    AES may not be completely secure.  
    If you just keep pictures of yourself on the beach in Cancun on    your cloud account, then you should be more worried about TMZ    getting them  especially if you are Jennifer Lawrence. For    most people AES provides ample security.  
    Those who worry about an encryption system that was created for    the U.S. government should look out for cloud storage systems    that use the     Blowfish security standard. This is older that AES and it    had never been cracked until 2016 when the Sweet32 birthday attack was    created. Even now, Blowfish is still thought to provide strong    enough security for files smaller than 4GB.  
    The encryption system specification was published in 1993. As    with AES, the definition allows for a range of key lengths,    which each developer can choose from. The key specs range from    32 bits to 448 bits in length. As with AES, the longer the key,    the stronger the security, so check out this stat when    selecting a cloud storage provider, like CrashPlan,    that uses Blowfish.  
     Stephen    Haunts  
    Both AES and Blowfish are symmetrical key systems. That means    that the cipher used to encrypt the data is also needed to    decrypt it. You may already have thought of a flaw with these    methods when used for communicating data. How do both sides in    a connection get the same key? If one sends the common key to    the other, then that message cannot be encrypted because until    it has the key, the corresponding computer would not be able to    decrypt it.  
    The answer to this problem lies with asymmetric key systems,    such as RSA. These encryption methods are also known as public    key. The key that decrypts the protected message is not the    same as the one that encrypts it.  
    It does not matter if a hacker gets hold of the encrypting key    because all she will be able to do with it is encrypt messages    that only the holder of the corresponding private key could    ever decrypt. You cannot derive the private decryption key from    the public encryption key.  
    RSA    is named after its creators  Rivest, Shamir and Adelman. Most    Internet encryption systems use a public key system to    distribute the encryption ciphers needed for symmetric key    systems, such as AES and Blowfish. RSA is the most frequently    used private key system used for key exchange and it is used    for key distribution in TLS methods, including HTTPS.  
    RSA has a 1,024-bit key, which is four times longer than the    most commonly used AES key length of 256 bits and eight times    longer than the minimum-length AES key of 128 bits.  
    Internet-based encryption systems rely on client software that    communicates with the server. The server is the remote computer    that holds the files  the cloud storage facility. The client    is at the other end of the connection. In the case of your    access to cloud storage, the client is your computer.  
    When you sign up for a service such as Dropbox, the first thing    that will happen is that the website will download an installer    file for you to run. This installs the client software. Some    Internet security systems will include the key for    communication with the server in this download.  
    A potential problem with keys that are reused is that once    someone learns that key, they can decrypt all the    communications that your computer has with the server and get    access to your private files.     Perfect Forward Secrecy(PFS)is a methodology by    which a new encryption key is used for each session.  
    If anyone out there has a system to snoop on your connection    and capture the encryption key, they would be wasting their    efforts because the next time you connect they would have to    start their tasks all over again to get the new key.  
    Perfect Forward Secrecy adds an extra layer of protection to    your privacy because it limits the amount of disclosure that    any single security breach can deliver.  
    The specialist storage providers now operate zero-knowledge    encryption. You may search the Web and discover information on    the     Zero Knowledge Protocol. That is something else:     zero knowledge encryption simply means that all of the    encryption of your files takes place on your computer before    they are uploaded to the cloud.  
    The client software uses a separate process to scramble the    files using a key that is resident on your computer. Files are    then transferred using a standard method, such as TLS.  
    The employees of a     zero-knowledge providercan never get to the raw    files, only the encrypted version. As they also could not get    access to the key, you are better off with zero-knowledge    encryption than with ciphers that are applied during the    transfer or when the files reach the server.  
    Zero-knowledge encryption is still not good enough for some.    The security-conscious argue that the encryption software and    keys all originate from the cloud storage provider, so there is    still one central location that is vulnerable to attack.  
    If anyone wanted to get into all the files on a server that    operates a zero-knowledge system, they would just need to    hijack the key distribution stage.  
    If the software on your computer uses an encryption key that    the hacker knows, then it really doesnt matter where the    encryption takes place, he can still get access to all the    files on that cloud storage server.  
    If you install encryption software from another company on your    computer, you increase your privacy. You can encrypt all of    your files manually and then let the cloud storage client    software re-encrypt and transfer the data. That way, if some    miscreant has got into the cloud storage servers encryption    system, all she can do is decrypt a file to reveal another    layer of encryption beneath.  
    Cracking a security system like that would entail breaking into    every encryption software company in the world and manipulating    their key distribution procedures. No one has the resources to    achieve such a feat.  
    The degree of privacy that you need for your files greatly    depends on the type of information you are storing. There is a    wide range of cloud storage options out there and they vary    from consumer-friendly free services, such as Dropbox, through    to business systems that even the NSA could not crack.  
        Sign up for our newsletter to get the latest on new        releases and more.      
    Combining services can give you stronger security. Encrypting    your files with completely separate software before you move    them anywhere can give you the strongest possible levels of    security.  
    Now you understand the terminology and issues behind security    measures, you are better equipped to find the best cloud    serviceto fit your needs. What security measures do you    take? Let us know in the comments below, thank you for reading.  
The rest is here:
Cloud Security: 8 Things You Need to Know When Choosing a ... - Cloudwards
Read More..