By Alexander Eiriksson, COO at Securstore Online Backup
December 14, 2012

Securstore Online Data Backup Expert Tips: Range of Encryption Algorithms – The Choice is yours

Cryptography is assuming importance with cloud backup and recovery. Huge volumes of mission-critical data are being submitted by enterprises for storage in public, private or hybrid clouds with increased risk. The transmission of the information over the Internet (which is a public network) and the storage of information in shared IT resources require higher levels of security.

Third party certifications of encryption algorithms lend weight to the quality and strength of the algorithms used by cloud backup service providers. The National Institute of Standards and Technology (NIST), an agency under the US Department of Commerce has developed a number of standards for promoting, measuring cryptographic modules. The agency issues a Certificate known as the Federal Information Processing Standards Publications (FIPS PUBS) attesting to the quality of the cryptographic module in use by the cloud backup service provider. Secure Socket layer is an open source and freely implemented encryption technology that ensures data protection and encryption during transmission over the Internet. Versions of this protocol have been used in web browsing, electronic mail, Internet faxing, instant messaging and Voice over IP networks. Both the above encryption and data protection protocols used over the Internet are being used in tandem to provide additional security for information traveling to cloud backup servers.

The input strings used for encryption or the keys can be user defined or system defined. When the keys are user defined and stored exclusively with the user, the encryption mechanism is secure as even the cloud backup vendor has no access to the data stored in the vendor managed server. However, loss of the encryption key will result in loss of access to data. If the keys are system generated and stored with the vendor, the risk is greater and there is an urgent need to ensure that the vendor is bound and hedged around with all kinds of non disclosure agreements and responsibilities. If the key is maintained both at the user premise and the vendor premise a similar security need is identified.

Commonly used cryptographic algorithms in cloud backup are: Triple DES 192; AES 128 or 256 and Blowfish 64; 128; 256; 320; 384 and 448. Not all algorithms are implemented by all cloud backup services. Most services select one or the other of the algorithms and stick with it while others may allow users select the encryption type from a list. For instance, Asigra uses AES 256 while StoreGrid implements both Triple DES 192 and Blowfish (with bit variations).

The bottom line is that cloud backup service users must evaluate the kind of encryption protocols that are being provided; understand the implications and select their vendor accordingly.  There are a range of encryption algorithms. The choice of the right algorithm is always yours.

Securstore provides a bespoke offsite backup solution catered for customers who have both mission-critical data and non-critical data i.e. it provides customers with a secure & efficient backup and recovery solution which is sustainable over time. This coupled with agentless technology and advanced support for all environments and applications makes it suitable for any type of business, data centre provider or reseller.

Watch Securstore video – guided tours here:

About the Author: Alexander Eiriksson is the COO of Securstore, an Asigra based cloud backup provider certified by British Standards Institute for ISO 27001 and ANAB. Established in 1991, Securstore provides businesses and enterprise customers a technically advanced solution in UK, Europe, USA, Africa, Asia and the Middle East.


General Tags: online backup, online file backup, cloud computing, compare online backups, data security, SaaS, online backup providers directory, online backup news, online file storage, online data backup, top rated online backups, software as a service, online backup services, online backup companies, online backup reviews, backing up online, data storage, CEO interviews

Like us on Facebook

Do you like this post? Subscribe to our RSS feed ===========================


Related posts:

  1. SecurStore Online Data Backup Expert Tips: Encryption/Decryption Algorithms – Is your Data Really Safe?
  2. Securstore Online Data Backup Expert Tips: Symmetric Key Encryption for Cloud Computing
  3. Vembu Online Data Backup Expert Tips: Encryption Algorithms Secures Your Backed up Data
  4. Securstore Online Data Backup Expert Tips: The Problem of Securing Data Encryption Key
  5. Vembu Online Data Backup Expert Tips: Vembu’s Encryption Algorithms Secures your Backed up Data
  6. SecurStore Online Data Backup Expert Tips: Compression and Encryption – The Challenges of Storage
  7. Securstore Online Data Backup Expert Tips: Building to Last or Lasting to Build — What is your Choice?
  8. Securstore Online Data Backup Expert Tips: What to Look for While Selecting a Cloud Backup Service
  9. Securstore Online Data Backup Expert Tips: Components of a Cloud Backup and Recovery System
  10. SecurStore Online Data Backup Expert Tips: Face It! Data Security is a Pain in the Neck

Tags: , , ,