Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cloud
    • Cloud
    • Cybersecurity
    • Small Business
    • Storage

    Dropbox Password Shutoff Highlights Importance of Proper Data Encryption

    Written by

    Fahmida Y. Rashid
    Published June 23, 2011
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      As Dropbox tries to appease irate customers after the weekend debacle where it accidentally turned off passwords to all user accounts, debate rages about the security of the encryption scheme used to protect data on cloud services.

      It’s not “surprising” that companies embrace online storage solutions such as Dropbox because they are very convenient and allow companies to expand storage capacity easily, Bassam Tabbara, CTO and co-founder of online storage company Symform, told eWEEK. However, the Dropbox incident should act as a reminder for organizations to “carefully evaluate” how safe their data really is.

      Tabbara recommended that data should be encrypted before it leaves the enterprise. Dropbox relied on server-side encryption, which meant the files were encrypted in the cloud, not locally. Even though the file transfers themselves were encrypted as Dropbox used HTTP over SSL, having the keys on the server meant the cloud provider has ultimate control over the data, not the user.

      Key management is “too complex” to push down to the user, Mushegh Hakhinian, a security architect at cloud provider IntraLinks, told eWEEK. “It sounds good on the surface for end users as they get full control but inevitably it means that they take on additional costs and responsibilities,” Hakhinian said.

      There needs to be a layered approach, where master keys are used to protect other keys used to encrypt user data, Hakhinian said. More importantly, the company has to ensure those keys are securely stored in a data center.

      Wuala, an online storage service provided by external storage company LaCie follows a layered approach advocated by Hakhinian. “Encrypting your files before they are sent to the cloud makes Wuala inherently more secure than solutions that rely on server-side encryption,” Luzius Meisser, CTO of Wuala, wrote on the company’s blog June 21. However, Meisser shies away from claiming this system is “100 percent secure.”

      “If the user chooses an easily guessable password like ‘12345,’ security is somewhat limited,” Meisser told eWEEK.

      That’s because Wuala derives a master key from the username and password to encrypt a file stored on Wuala’s servers. The file contains a list of all the encrypted files belonging to the user as well as its unique key. The master list is encrypted with a master key. All Wuala has is a file that’s already encrypted with the master key, which is generated from the user’s local machine each time the user logs in, Meisser said. Wuala doesn’t store passwords on the server and it’s not stored as a cookie locally, so there’s no way for anyone to access the information stored on the servers without correct login credentials, Meisser said.

      “We couldn’t expose our users’ data to others (neither accidentally nor intentionally),” Meisser said.

      Problems like what happened with Dropbox aren’t an issue with services like Wuala because the files are already encrypted on the user’s local computer before it is uploaded onto Wuala’s servers, Meisser said. If an unauthorized user ever accidentally stumbles into a Wuala account, the files are encrypted and inaccessible.

      Organizations are increasingly using services such as Dropbox, typically driven by employees who also use it at home and want a way to securely move data back and forth, Geoff Webb, a product manager at Credant Technologies, told eWEEK. Dropbox and similar services are useful, but organizations should never rely on controls put in place by a third-party for their security, Webb said.

      Organizations should understand how the data is encrypted, which keys are used and what will be compromised if the key is lost, Tabbara said. Hakhinian agreed, noting that many providers claim to have implemented “military grade AES-256 encryption” but all its means is that “they are merely smart enough to do basic research and to call out crypto-APIs of the language they use for coding.”

      “Find a vendor with properly implemented cryptography,” before entrusting them with the organization’s data, Hakhinian said.

      Fahmida Y. Rashid
      Fahmida Y. Rashid

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×