23 Nov 2021

Cloud storage everywhere and nowhere

Guest Blog: Adrian Fern from Priszm Technologies - techUK cloud week #CloudFuture

There is no Cloud… 

As cloud computing comes of age, we still hear people referring to the popular meme: “…it’s just someone else’s computer”. Many pundits have tried to debunk this as an oversimplification but for organisations starting out on their cloud journey it still holds true. For them, the cloud is just a place for saving files on remote systems owned by someone else. The downstream impact of this can be seen in recent findings reported by Digital Shadows. They detected exposed information in over 60 billion files (including documents, database backups, configuration files and source code) simply by scanning major cloud storage platforms! 

Information ≠ Data 

The terms information and data are often used interchangeably but they are not the same thing. The information comprises knowledge and understanding that has value and risk. IT systems manage and retain digital data which provides an encoding layer or substrate on which information sits. Data disclosure through storage mismanagement, leakage, or cyber-attack, permits unauthorised decoding of the substrate and, therefore, provides access to the Information it supports. 

Encryption, Encryption, Encryption 

For many years, the use of encryption to secure data using mathematical functions has been sufficient to obfuscate the data substrate and thus protect the information it conveys. Encryption translates information by using an algorithm to alter data in a way that makes the original information unreadable. Authorised users can decrypt digital data using a key to enable access to the original information. Had the owners of the files (found by Digital Shadows) been aware, they would have taken the time and care to encrypt them. However, either they didn’t know they needed to, or they had been given the impression that the cloud environment was secure and would somehow do it for them. 

What about Quantum Computers? 

A growing concern is that the advent of quantum computing threatens the viability of current encryption methods. Quantum computers will provide lightning-fast code-breaking capabilities, devouring the complex mathematics underpinning encryption. The development of quantum cryptography which exploits quantum properties, on the other hand, may provide new and unbreakable forms of information security. However, we cannot be sure these new capabilities will come to fruition in the right order, and current methods for securing digital information may be rendered useless long before quantum cryptography is solved. 

Enabling Quantum Resistant, Hyper-secure Storage in the Cloud 

At Prizsm Technologies, we have developed a computational storage capability that provides a flexible, easy-to-use, solution for quantum-resistant, hyper-secure cloud storage. Our algorithm disrupts data by chopping it up and randomly distributing redundant, complementary shards to locations across multiple cloud platforms, meaning information is stored “everywhere and nowhere”. By disaggregating at bit level Prizsm provides confidentiality, integrity, and availability with security, privacy, and control for all information stored in the cloud. 

Change of mindset 

Prizsm’s approach to cloud storage is mapped in traditional terms but delivered virtually, meaning organisations can deploy it transparently, without impacting or changing any of their existing processes. It’s a new approach but not a novel one; more a change of mindset about how to deliver outcomes that others are conditioned not to see. By instantiating Prizsm between users and cloud storage platforms, organisations can take back control of their information, and the data that underpins it, benefitting from cheap, elastic services orchestrated in an inherently secure way. 

Cloud Enablement 

A quick Google search throws up many definitions for “cloud enablement” but none of them warns that cloud isn’t the thing. For us, it’s one of the things that enable the thing. Despite what the cloud service providers would have you believe, there is not a simple mapping between things that people do on-premises and the services offered on “someone else’s computer” in the cloud. 

 

Author:

Adrian Fern from Priszm Technologies

 

Welcome to Cloud Week 2021!

You can catch up on all news and read all insights published as part of cloud week here

Read more here

Laura Foster

Laura Foster

Head of Technology and Innovation, techUK

Laura is techUK’s Head of Programme for Technology and Innovation.

She supports the application and expansion of emerging technologies, including Quantum Computing, High-Performance Computing, AR/VR/XR and Edge technologies, across the UK. As part of this, she works alongside techUK members and UK Government to champion long-term and sustainable innovation policy that will ensure the UK is a pioneer in science and technology

Before joining techUK, Laura worked internationally as a conference researcher and producer covering enterprise adoption of emerging technologies. This included being part of the strategic team at London Tech Week.

Laura has a degree in History (BA Hons) from Durham University, focussing on regional social history. Outside of work she loves reading, travelling and supporting rugby team St. Helens, where she is from.

Email:
[email protected]
LinkedIn:
www.linkedin.com/in/lauraalicefoster

Read lessmore