Compute
High-performance, scalable computing resources for your critical workloads. Orchestrate your cloud-native applications with our modern container solutions.
Discover the Calcul offer
Dedicated servers
VM Instances
An on-demand, flexible and secure virtual machine solution on a shared infrastructure.
OpenSource IaaS
Open source virtualised infrastructure in a trusted SecNumCloud-qualified cloud environment for complete technological sovereignty.
VMWare IaaS
Your VMware virtual machines in a trusted SecNumCloud-qualified and HDS-certified cloud environment.
Containers
Openshift PaaS
The unified platform for creating, modernising and deploying your large-scale applications in a sovereign cloud.
Managed Kubernetes
Managed container orchestration solution offering security, resilience and advanced automation on sovereign infrastructure.
Bare Metal
Bare Metal
Dedicated, fully customisable servers for total autonomy over your sovereign infrastructure.
Storage
Adaptable, high-performance storage solutions for all your needs. Optimise your data with our highly available block and object solutions.
Discover our Storage offer
Storage
Block storage
The adaptable block storage solution for optimum storage performance in a sovereign cloud.
Object storage
The scalable, cost-effective storage solution for your unstructured data in a sovereign cloud.
Backup
Backup solutions
Differentiated backup solutions tailored to your challenges and environments
Network
Advanced network solutions to connect and secure your infrastructures. Deploy your private networks automatically and securely.
Discover the Network offer
Network
Virtual Private Cloud
Deploy and manage your private networks 100% automatically and securely.
Private Backbone
Take full control of your network with extended Layer 2 connectivity, designed for hybrid architectures and bespoke configurations.
Firewall
Managed Firewall
Advanced security solutions for complete insulation and enhanced protection
Accommodation Dry
Housing - Dedicated space
Secure hosting for your equipment in a dedicated or shared environment, depending on your needs.
Security
Advanced security solutions to protect your critical infrastructures. Control access and defend against online threats.
Discover the Security offer
Security
Anti DDoS
The shield against online attacks
Bastion host
Transparent, centralised access control for robust protection of your infrastructure
Managed KMS
Sovereign cryptographic key management, with HSM hardware root of trust, to protect your most sensitive data on SecNumCloud infrastructure.
Managed SIEM
A centralised platform for collecting and correlating security logs, combining AI-based automation and advanced detection rules (MITRE ATT&CK).
IA
Artificial intelligence solutions to transform your data into insights and accelerate your business processes.
Discover the IA offer
IA
LLMaaS
Access cutting-edge language models on a sovereign, SecNumCloud-qualified and HDS-certified infrastructure for high-performance, secure AI applications.
GPU
NVIDIA GPU instances to accelerate your artificial intelligence and high-performance computing in a sovereign cloud.
Data
Data solutions to manage, analyse and exploit your critical data.
Discover the Data offer
Databases
Managed MariaDB
A fully managed MariaDB relational database and PITR backup on SecNumCloud sovereign infrastructure.
Managed PostGreSQL
The fully managed relational database solution on SecNumCloud sovereign infrastructure
Big Data
Managed Kafka
The open-source distributed platform for streaming data in real time
Managed File System
A managed, sovereign, high-availability distributed file system, accessible via NFS and SMB on the SecNumCloud infrastructure.
Management & Governance
Coaching and support services to help you with your cloud transformation.
Find out about our support services
Support
Support levels
Discover the 3 levels of support available to help you meet your challenges.
Professional services
From design to optimisation, Cloud Temple is with you every step of the way.
Governance
Console - API - Terraform Provider
A single interface for viewing and managing your products and services
Observability
Infrastructure metrics available in market standards
The magazine > Cloud and privacy: is it possible?
Published on 08/03/2021 by Giuliano Ippoliti, Director of Cybersecurity at Cloud Temple

More and more businesses and individuals are turning to the cloud, but security is still the main obstacle to its adoption. The concern most often expressed is the loss of control over one's data, particularly if the Cloud Service Provider (CSP) is foreign, as is the case with the public cloud giants Amazon (AWS), Microsoft (Azure) and Google (GCP).

There are many feared events: data seizure by the US government (cf. Cloud Act, NSA), compromise of the cloud by a hostile state (cf. cyber attacks from Russia or North Korea), breach of confidentiality by CSP staff, etc.

This article looks at the simplest use case: using the cloud for file storage, where the customer uses a SaaS offering of the 'drive' type (OneDrive, Google Drive, Dropbox) or the 'object storage' type (AWS S3, Azure Blob Storage).

How can data confidentiality be protected in the face of these threats? The answer, of course, lies in encryption, but not just any old way!

Let's look at several alternatives, in ascending order of safety.

Unencrypted data: let's move on quickly, this offers no security whatsoever, not even in the face of a curious system administrator within the supplier.

Server Side Encryption (SSE) with encryption keys managed by the CSP: in this case, the cloud host itself encrypts the data with its own keys when it is stored, without the user having to do anything other than tick a box (AWS), if this is not automatically activated (Azure). This protects against certain basic threats, such as the reuse of storage media from client A for client B, or the theft of hard disks from a data centre. However, it is clear that, insofar as the supplier manages the keys, this provides only limited confidence.

Server-side encryption (SSE) with encryption keys supplied by the customer: otherwise known as Bring Your Own Key (BYOK), this method does not, in my view, provide any real additional security compared with the previous method. Admittedly, in this case the CSPs declare that they do not store the keys supplied by customers, but technically they could do so if they wanted to or if they were forced to.

Client Side Encryption (CSE): also known as zero-knowledge, this is undoubtedly the most secure alternative. The client encrypts the data with its own key before outsourcing it to the cloud; the CSP has no knowledge of this key at any time. In this case, even an attacker who managed to compromise an entire cloud could only recover unintelligible encrypted data. Data confidentiality is guaranteed as long as the customer's endpoint is not itself compromised.

There's no doubt about it: client-side encryption is *the* solution for protecting your data in the cloud.

Some providers already offer this, either free of charge or for a fee: Sync, pCloud, Mega, Icedrive, SpiderOak. Note that Icedrive does not even trust AES, which it considers suspect, preferring Bruce Schneier's Twofish.

That said, CSE is not yet off the ground and is mainly limited to the use of backup to the cloud. Why is that?

Its weakness is the flip side of its strength: because the server cannot see the data in clear text, it is unable to index it and extract its value. This greatly limits business uses: even a simple keyword search in a file becomes problematic on the server side. Indexing ends up being carried out by mirroring the data on the client side, on its unencrypted local copy, which is not really in the spirit of the cloud.

Are we therefore obliged to sacrifice the computing performance of cloud servers, and carry out the "heavy-lifting" on the client side?

It would appear not, as new techniques are emerging that allow the server to search directly on the encrypted data. A very promising method is explained in the paper that can be downloaded from [1]: it is based on the generation of an encrypted index by the client, which allows the server to retrieve the corresponding documents, without knowing their content or even the keyword searched.

This research will undoubtedly continue, giving us real hope of being able to combine the power of the cloud with data protection.

[1] https://info.ionic.com/hubfs/IonicDotCom/Resources/Assets/Securing%20the%20Cloud%20with%20Client-Side%20Encryption.pdf

The magazine
Cookie policy

We use cookies to give you the best possible experience on our site, but we do not collect any personal data.

Audience measurement services, which are necessary for the operation and improvement of our site, do not allow you to be identified personally. However, you have the option of objecting to their use.

For more information, see our privacy policy.