918博天堂·(中国区)首页

    Blog
    Topic
    All
    AIoT
    SMB Solutions
    Products and technologies
    Industries
    All
    Retail
    Traffic
    Education
    Logistics
    Building
    Energy
    Manufacturing
    Sports
    Sustainability
    Business trends
    Cybersecurity
    Partner and customer experience
    Deep learning
    Thermal
    Events
    Access control
    Video Intercom
    Security Operations
    Trends
    Solution
    LED
    Resources and events
    IFPD
    Search blog
    Blog
    Filter
    Cancel
    Topic
    All
    AIoT
    SMB Solutions
    Products and technologies
    Industries
    All
    Retail
    Traffic
    Education
    Logistics
    Building
    Energy
    Manufacturing
    Sports
    Sustainability
    Business trends
    Cybersecurity
    Partner and customer experience
    Deep learning
    Thermal
    Events
    Access control
    Video Intercom
    Security Operations
    Trends
    Solution
    LED
    Resources and events
    IFPD
    Resetuj
    Prześlij

    Cloud storage security in the era of Internet of Things

     

    The development of the Internet of Things (IoT) has greatly promoted the development of cloud computing and cloud storage. While the cloud storage technology has developed rapidly, the data security challenges it faces are becoming more and more severe. To ensure user information security, cloud storage protection technology is essential for the development of IoT.

     

    In the past, most security systems worked in a stand-alone way, meaning that they were not connected to other systems, or to the public internet. Now, things have changed, and IoT in particular makes it possible to automate alerts and share them with other systems and users across the organization. Systems are also frequently connected with cloud-based solutions, with video data passing over the WAN and public internet to be stored off-site.

     

    The advantages and risks of cloud storage
    Cloud storage is a cloud-based computing model in which data is stored on remote servers and accessed over the internet. It is maintained, operated and managed by a cloud storage service provider using storage servers built on virtualization techniques.

     

    The core security concern of for cloud storage users is data safety. And the biggest risk of data stored in the cloud is data leakage, which may occur during storage or transmission. Here, we’d like to talk about the risks and solutions associated with cloud data storage while security concerns on data transmission you can find the answer in another blog article regarding HTTPS protocols.

     

    How Hikvision ensure user data security with encryption technologies
    To help you minimize the risk of data leakage in the cloud, EZVIZ[1] Cloud  offers a dual encryption solution which covers both server-side encryption and client-side encryption. We also maximize cybersecurity by following best practices, and we are certified to the relevant security standards, such as CSA STAR Certification.

     

    1. Server-side encryption
    Generally speaking, we ensure encryption before saving data on disks at the data center and downloading it from there. Specifically, the server-side encryption can be further divided into two categories. The first kind occurs when a cloud service provides a secret key, protecting data using server-side encryption with secret key; the second type occurs when developers manage the secret keys themselves, protecting data using server-side encryption with customer-provided encryption keys.

     

    Either way, server-side encryption reduces the complexity of user-managed keys. Additionally, we also advise users to ensure their data is stored on physical devices in encrypted form, which will reduce the risks associated with unauthorized access to physical devices for data.

     

    2. Client-side encryption
    Today, we can not only provide basic cryptographic key solutions to protect cloud-based application development and services, but also leave these protection measures up to our users. In this scenario, data is encrypted on the client-side and uploaded to cloud storage servers, and users manage both the encryption process, the keys, and related tools.

     

    Client-side encryption gives users more power over their keys while increasing the complexity of the user-managed key. The secret key on the client-side is managed by the user. For data security reasons, we will still encrypt data stored in the cloud on the server-side, so no additional user action is required there.

     

    Find out more about boosting your cybersecurity with Hikvision
    We hope this blog has given you a flavour of Hikvision’s cybersecurity innovations and how they can help you protect your people, assets and customers. For more information about how we can help you optimize cybersecurity in the IoT era, read our product security white paper or contact us.

     

    [1]EZVIZ Cloud, a global video cloud service platform provided by EZVIZ, which is the consumer and residentially-focused subsidiary of Hikvision.

    Business trends

    Subscribe to newsletter

    Subscribe to our email newsletter to get the latest, trending content from Hikvision

    Skontaktuj się z nami
    Zapytania Handlowe
    Zapytania Techniczne
    Wsparcie online
    Where to Buy
    Website Feedback
    Website Feedback
    Skontaktuj się z nami
    Hik-Partner Pro close
    Hik-Partner Pro
    Hik-Partner Pro
    Scan and download the app
    Download
    Hik-Partner Pro
    Hik-Partner Pro

    Get a better browsing experience

    You are using a web browser we don’t support. Please try one of the following options to have a better experience of our web content.