Home > Design Patterns > In-Transit Cloud Data Encryption

In-Transit Cloud Data Encryption (Cope, Erl)

How can data be securely transmitted to, from, and within a cloud environment?

In-Transit Cloud Data Encryption

Problem

Data copied to and from a cloud environment transits networks and servers beyond the control of the organization and can be intercepted by malicious intermediaries.

Solution

A solution is implemented with capabilities that secure and protect data while it transfers between sender and receiver and also ensure that data will not be accepted by the receiver if the original data sent is modified.

Application

An encryption mechanism is implemented to encrypt data between sender and receiver for confidentiality, and a digital signature mechanism is implemented to provide integrity for the data.
In-Transit Cloud Data Encryption: An attacker attempts to intercept data uploading into a cloud environment, however, the data is encrypted and signed before it is sent.

An attacker attempts to intercept data uploading into a cloud environment, however, the data is encrypted and signed before it is sent.

In-Transit Cloud Data Encryption: An attacker intercepts encrypted data before it is received by the cloud provider, and the receiver discards the packet as a result of maintaining data integrity and confidentiality.

An attacker intercepts encrypted data before it is received by the cloud provider, and the receiver discards the packet as a result of maintaining data integrity and confidentiality.