Click here to close now.


Cloud Security Authors: Pat Romanski, Liz McMillan, Cloud Best Practices Network, Teresa Schoch, Marc Crespi

Related Topics: @CloudExpo, Cloud Security

@CloudExpo: News Item

Trusting Data in the Cloud Is About Losing a Key

The online storage and collaboration market has been hot

The online storage and collaboration market has been hot, with early market entrants Dropbox, and YouSendIt appearing to have taken the initial lead in providing individuals and businesses with the ability to easily store, share, and send large files between multiple parties.

In the spirit of secure collaboration, at this year's RSA event, Ftopia and GuardTime announced a partnership that hopes to shake up the market a bit by raising even higher the pressing question of one's ability to trust their precious data in the cloud. To answer this question, the Ftopia service is designed to allow businesses to securely collaborate by sharing their files anywhere they want over the Internet without having to rely on trust. Rather, they provide the service with built-in data integrity features that utilize mathematics as its form of proof.

Ftopia does cloud-based data collaboration and storage, and together with GuardTime, a cloud security company, signed a deal to offer the market a provably secure collaboration and storage service. Ftopia uses GuardTime's keyless signature technology to digitally sign the clients' data as it is stored in Ftopia rooms.

As described in the public announcement, GuardTime's Keyless Signature technology provides proof of signing authority, time of the signature, and lifelong integrity for data stored in the cloud and in transit between business collaborators. The signature never expires and its verification is based solely on mathematics, eliminating the need for secrets or keys and the unwieldy management associated with traditional PKI technologies that fail in the cloud.

During an interview with Ftopia CEO Philippe Honigman, I was able to ask him what prompted the creation of the partnership and his new release. "As more information moves to the cloud as the primary place of storage, concerns about trust and security are growing as well," he said. "Traditional, defensive security measures, such as intrusion detection, intrusion prevention, strict network access control policies, or even the tried and true anti-malware technologies, are not enough anymore. Business customers are more likely to entrust their information to a third party when they know for certain - more specifically, when they can prove - that their data has not been altered in any way."

After a quick run-through of the capabilities with Honigman, the workflow appears to remain simple and seemingly unchanged. There is no additional action for the users to take on either end of the file sharing transaction. Each file gets its own signature. The signature is a small file that is automatically created and saved alongside the signed file. If the user wants proof that the file in question has not changed since the exact point in time that it was uploaded, they simply collect the file and its signature and use the verification tool provided by GuardTime to perform the comparison. If the signature can be verified, the file is guaranteed to be the same exact file and can be confirmed that it is that exact file from the exact point in time for which it was signed. If the signature cannot be verified, then the file cannot be guaranteed to be the same.

"The solution is both simple and powerful," said Honigman. "On the surface, it would appear that all that GuardTime is providing us is the ability to timestamp or simply sign a file. But, because the signature is keyless, meaning nobody is forced to manage any keys or keep any secrets, the client can get undeniable proof that the file has not been tampered with, not even by Ftopia."

GuardTime CEO Mike Gault says, "We solved the problem of trust by removing the reliance on keys or secrets to prove that the data remains intact. This is accomplished through a series of concatenated SHA-256 hashes for each file that are used to create and destroy a Merkle tree of hashes every second since the beginning of Unix time, 1970."

According to Guardtime, the resulting root hash, referred to by the company as the "Integrity Code", is published monthly in publications such as the Financial Times. To verify the integrity of the data, all one needs is the published Integrity Code, the original file, and its corresponding signature file. With these three pieces, any organization can use the tools provided or, if they are really paranoid, they could do the reverse hash function mathematics to prove that the file remains intact. In short, GuardTime claims that there is no need to rely on any tool, or any third party to gain proof.

It will be interesting to keep an eye on Ftopia to see how their clients use this feature. It seems that the value becomes painfully apparent when an organization is required by law or regulation to provide proof that their data has remained intact - especially if their own integrity was being questioned. Hopefully this is not the case for most organizations. Which company would want to get all twisted up in court because they couldn't prove they weren't involved in a coverup? I feel safe going out on a limb to say none of them.

More Stories By Victor Cruz

Victor Cruz is a writer whose articles have appeared in American Venture, Cloud Computing Journal,, CSO Magazine, Communications News, Computer Technology Review, eSecurity Planet, Harvard Review, Medical Design Technology, and WebSecurity Journal. He has advised some 50 IT companies in the past 20 years on their marketing strategies. You can reach him at vcruz[at]

@ThingsExpo Stories
The IoT market is on track to hit $7.1 trillion in 2020. The reality is that only a handful of companies are ready for this massive demand. There are a lot of barriers, paint points, traps, and hidden roadblocks. How can we deal with these issues and challenges? The paradigm has changed. Old-style ad-hoc trial-and-error ways will certainly lead you to the dead end. What is mandatory is an overarching and adaptive approach to effectively handle the rapid changes and exponential growth.
Today’s connected world is moving from devices towards things, what this means is that by using increasingly low cost sensors embedded in devices we can create many new use cases. These span across use cases in cities, vehicles, home, offices, factories, retail environments, worksites, health, logistics, and health. These use cases rely on ubiquitous connectivity and generate massive amounts of data at scale. These technologies enable new business opportunities, ways to optimize and automate, along with new ways to engage with users.
Can call centers hang up the phones for good? Intuitive Solutions did. WebRTC enabled this contact center provider to eliminate antiquated telephony and desktop phone infrastructure with a pure web-based solution, allowing them to expand beyond brick-and-mortar confines to a home-based agent model. It also ensured scalability and better service for customers, including MUY! Companies, one of the country's largest franchise restaurant companies with 232 Pizza Hut locations. This is one example of WebRTC adoption today, but the potential is limitless when powered by IoT.
There are so many tools and techniques for data analytics that even for a data scientist the choices, possible systems, and even the types of data can be daunting. In his session at @ThingsExpo, Chris Harrold, Global CTO for Big Data Solutions for EMC Corporation, will show how to perform a simple, but meaningful analysis of social sentiment data using freely available tools that take only minutes to download and install. Participants will get the download information, scripts, and complete end-to-end walkthrough of the analysis from start to finish. Participants will also be given the pract...
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty and ambiguity? Organizations of all sizes need to evolve and transform, often under massive pressure, as industry lines blur and merge and traditional business models are assaulted and turned upside down. In this new data-driven world, marketplaces reign supreme while interoperability, APIs and applications deliver un...
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data shows "less than 10 percent of IoT developers are making enough to support a reasonably sized team....
You have your devices and your data, but what about the rest of your Internet of Things story? Two popular classes of technologies that nicely handle the Big Data analytics for Internet of Things are Apache Hadoop and NoSQL. Hadoop is designed for parallelizing analytical work across many servers and is ideal for the massive data volumes you create with IoT devices. NoSQL databases such as Apache HBase are ideal for storing and retrieving IoT data as “time series data.”
Clearly the way forward is to move to cloud be it bare metal, VMs or containers. One aspect of the current public clouds that is slowing this cloud migration is cloud lock-in. Every cloud vendor is trying to make it very difficult to move out once a customer has chosen their cloud. In his session at 17th Cloud Expo, Naveen Nimmu, CEO of Clouber, Inc., will advocate that making the inter-cloud migration as simple as changing airlines would help the entire industry to quickly adopt the cloud without worrying about any lock-in fears. In fact by having standard APIs for IaaS would help PaaS expl...
SYS-CON Events announced today that ProfitBricks, the provider of painless cloud infrastructure, will exhibit at SYS-CON's 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. ProfitBricks is the IaaS provider that offers a painless cloud experience for all IT users, with no learning curve. ProfitBricks boasts flexible cloud servers and networking, an integrated Data Center Designer tool for visual control over the cloud and the best price/performance value available. ProfitBricks was named one of the coolest Clo...
Organizations already struggle with the simple collection of data resulting from the proliferation of IoT, lacking the right infrastructure to manage it. They can't only rely on the cloud to collect and utilize this data because many applications still require dedicated infrastructure for security, redundancy, performance, etc. In his session at 17th Cloud Expo, Emil Sayegh, CEO of Codero Hosting, will discuss how in order to resolve the inherent issues, companies need to combine dedicated and cloud solutions through hybrid hosting – a sustainable solution for the data required to manage I...
NHK, Japan Broadcasting, will feature the upcoming @ThingsExpo Silicon Valley in a special 'Internet of Things' and smart technology documentary that will be filmed on the expo floor between November 3 to 5, 2015, in Santa Clara. NHK is the sole public TV network in Japan equivalent to the BBC in the UK and the largest in Asia with many award-winning science and technology programs. Japanese TV is producing a documentary about IoT and Smart technology and will be covering @ThingsExpo Silicon Valley. The program, to be aired during the peak viewership season of the year, will have a major impac...
Apps and devices shouldn't stop working when there's limited or no network connectivity. Learn how to bring data stored in a cloud database to the edge of the network (and back again) whenever an Internet connection is available. In his session at 17th Cloud Expo, Bradley Holt, Developer Advocate at IBM Cloud Data Services, will demonstrate techniques for replicating cloud databases with devices in order to build offline-first mobile or Internet of Things (IoT) apps that can provide a better, faster user experience, both offline and online. The focus of this talk will be on IBM Cloudant, Apa...
WebRTC is about the data channel as much as about video and audio conferencing. However, basically all commercial WebRTC applications have been built with a focus on audio and video. The handling of “data” has been limited to text chat and file download – all other data sharing seems to end with screensharing. What is holding back a more intensive use of peer-to-peer data? In her session at @ThingsExpo, Dr Silvia Pfeiffer, WebRTC Applications Team Lead at National ICT Australia, will look at different existing uses of peer-to-peer data sharing and how it can become useful in a live session to...
As a company adopts a DevOps approach to software development, what are key things that both the Dev and Ops side of the business must keep in mind to ensure effective continuous delivery? In his session at DevOps Summit, Mark Hydar, Head of DevOps, Ericsson TV Platforms, will share best practices and provide helpful tips for Ops teams to adopt an open line of communication with the development side of the house to ensure success between the two sides.
SYS-CON Events announced today that IBM Cloud Data Services has been named “Bronze Sponsor” of SYS-CON's 17th Cloud Expo, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. IBM Cloud Data Services offers a portfolio of integrated, best-of-breed cloud data services for developers focused on mobile computing and analytics use cases.
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
Nowadays, a large number of sensors and devices are connected to the network. Leading-edge IoT technologies integrate various types of sensor data to create a new value for several business decision scenarios. The transparent cloud is a model of a new IoT emergence service platform. Many service providers store and access various types of sensor data in order to create and find out new business values by integrating such data.
The broad selection of hardware, the rapid evolution of operating systems and the time-to-market for mobile apps has been so rapid that new challenges for developers and engineers arise every day. Security, testing, hosting, and other metrics have to be considered through the process. In his session at Big Data Expo, Walter Maguire, Chief Field Technologist, HP Big Data Group, at Hewlett-Packard, will discuss the challenges faced by developers and a composite Big Data applications builder, focusing on how to help solve the problems that developers are continuously battling.
WebRTC converts the entire network into a ubiquitous communications cloud thereby connecting anytime, anywhere through any point. In his session at WebRTC Summit,, Mark Castleman, EIR at Bell Labs and Head of Future X Labs, will discuss how the transformational nature of communications is achieved through the democratizing force of WebRTC. WebRTC is doing for voice what HTML did for web content.