Client-side encryption explained

Client-side encryption is the cryptographic technique of encrypting data on the sender's side, before it is transmitted to a server such as a cloud storage service. Client-side encryption features an encryption key that is not available to the service provider, making it difficult or impossible for service providers to decrypt hosted data. Client-side encryption allows for the creation of applications whose providers cannot access the data its users have stored, thus offering a high level of privacy.

Applications utilizing client-side encryption are sometimes marketed under the misleading or incorrect term "zero-knowledge", but this is a misnomer, as the term zero-knowledge describes something entirely different in the context of cryptography.

Details

Client-side encryption seeks to eliminate the potential for data to be viewed by service providers (or third parties that compel service providers to deliver access to data), client-side encryption ensures that data and files that are stored in the cloud can only be viewed on the client-side of the exchange. By remaining encrypted through each intermediary server, client-side encryption ensures that data retains privacy from the origin to the destination server.[1] This prevents data loss and the unauthorized disclosure of private or personal files, providing increased peace of mind for its users.

Current recommendations by industry professionals as well as academic scholars offer great vocal support for developers to include client-side encryption to protect the confidentiality and integrity of information.[2] [3] [4]

Examples of services that use client-side encryption by default

Examples of services that optionally support client-side encryption

Examples of services that do not support client-side encryption

Examples of client-side encrypted services that no longer exist

See also

Notes and References

  1. Web site: 2015-05-25. What is Client-side Encryption and Why Does It Matter?. 2021-05-05. Virtru. en-US.
  2. Book: Deka, Ganesh Chandra . Handbook of Research on Securing Cloud-Based Databases with Biometric Applications . 21 February 2016 . 31 October 2014 . IGI Global . 978-1-4666-6560-6 . 3 Security Architecture for Cloud Computing.
  3. Book: Tobias Ackermann . IT Security Risk Management: Perceived IT Security Risks in the Context of Cloud Computing . 21 February 2016 . 22 December 2012 . Springer Science & Business Media . 978-3-658-01115-4 . 136–.
  4. Book: Cloud Computing Sicherheit: Schutzziele, Taxonomie, Marktübersicht . 21 February 2016 . 2009 . Fraunhofer-Institut für Sichere Informationstechnologie SIT . 978-3-9813317-0-7 . Communications of the Association for Information Systems 13:Article 24.