Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Networking
    • PC Hardware
    • Storage

    Group Eyes Fortress-like Hard Drives

    Written by

    John G. Spooner
    Published June 8, 2006
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Headline-making data losses may someday be a thing of the past, thanks to widespread use of data encryption, hard drive makers hope.

      The Trusted Computing Groups Storage Work Group—whose membership includes representatives from hard drive, tape drive and optical drive manufacturers—is readying a hardware-based data encryption technology standard it says will allow hard drive makers to add encryption capabilities directly into their products in the future.

      The TCGs standard, which has been in the works for some time, wont arrive in time to help the 26.5 million United States military veterans whose personal data was lost recently when a Veterans Administration employees laptop was stolen.

      However, the TCG believes its approach might help prevent similar losses in the future by fostering broader adoption of tough encrypted schemes inside hard drives in coming years.

      “I think that youll see [encrypted drives] proliferate, because the business case is kind of obvious,” said Michael Willett, chairman of the Storage Work Group and senior director of security for drive maker Seagate, in Pittsburg, Penn.

      “Just look at a laptop theft. Look at the reputational loss alone a company faces from that.”

      Given that the encryption standard can help prevent data breaches if a computer is stolen or lost, most hard drive makers are expected to adopt the standard for PC and server drives, when the TCG makes it public this fall.

      /zimages/4/28571.gifClick here to read more about the TCGs work in security chips.

      “The indication I have is that all the [hard] drive industry—if not the flash and the tape and the optical people—realize the value of encryption,” Willett said.

      “Weve got strong controls over communications of data—or data in motion. But the data at rest [on a hard drive] is the last frontier. The sense of the industry is [now] that all data at rest should be encrypted.”

      TCG says its approach differs from software-based encryption, such as Microsofts forthcoming Bitlocker, by piggybacking on secure communications protocols built into drive interfaces and using hardware built into drives themselves to keep tight control of cryptography keys. The standard also allows for drives to be married to a given TPM (Trusted Platform Module) security chip-equipped system.

      /zimages/4/28571.gifClick here to read more about Microsofts Bitlocker.

      The approach works by employing a TPM-like crypto chip, located in the drive electronics, to store an encryption key that unlocks the data stored on the drive.

      Given that its stored in hardware and placed there during manufacturing, the key is nearly impossible to capture or tamper with, Willett said.

      The key is unlocked by a password. The standard supports long passwords and a multimode password that uses a combination of a password, fingerprint, challenge response or certificates.

      The TCG standard, which works with ATA and SCSI interfaces drives, will support multiple encryption algorithms. It expects most manufacturers to employ the AES (Advanced Decryption Standard) algorithm.

      The standard will also focus on key management and making it a straightforward process to allowing multiple master and multiple user access as well as different domains on a hard drive, therefore granting IT managers the ability to limit the way some users access to their drives for example. The group also aims to offer escrowing and backup of keys.

      Given that a person with a proper password can still unlock the data on a drive, it is still possible for data to fall into the wrong hands. However, the intricate password systems supported by TCG make that less likely, Willett said.

      “Im not worried about the user. Its who steals the drive [and] what they have access to,” he said. “The real protections are the exception cases of loss or theft or repurposing, or end of life.”

      The TCG is shooting to release its hard drive encryption the standard to peer review in August. Following that process, which will a take about two months, the TCG hopes to make the standard widely available in late October.

      Given that hard drive makers have been working on the standard all along within the Storage Working Group, “I suspect products will soon follow,” Willett said.

      They “will be premium products at first…and then reduce to commodity [prices] very quickly.”

      Although the standard will be applied to hard drives at first, it could be used with flash memory-based drives and optical drives as well in the future, he said.

      Over time, the TCGs Storage Work Group will look to make its encryption standard even more business-friendly in subsequent updates.

      Although its encryption scheme will apply to drives used in NAS and SAN applications, the group believes it can simplify matters such as managing all of the encryption keys in a drive array.

      “The administrator may want to have the same key on all drives, different keys, or a migration schedule or a backup schedule,” Willett said. “Thats one of the things well be working on next.”

      /zimages/4/28571.gifCheck out eWEEK.coms for the latest news, reviews and analysis on enterprise and small business storage hardware and software.

      John G. Spooner
      John G. Spooner
      John G. Spooner, a senior writer for eWeek, chronicles the PC industry, in addition to covering semiconductors and, on occasion, automotive technology. Prior to joining eWeek in 2005, Mr. Spooner spent more than four years as a staff writer for CNET News.com, where he covered computer hardware. He has also worked as a staff writer for ZDNET News.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×