{"id":7083,"date":"2021-08-13T15:29:42","date_gmt":"2021-08-13T08:29:42","guid":{"rendered":"http:\/\/gcloudvn.wam.vn\/data-protection-bao-mat-du-lieu-khi-luu-tru-va-su-dung\/"},"modified":"2023-09-13T16:45:07","modified_gmt":"2023-09-13T09:45:07","slug":"data-protection-bao-mat-du-lieu-khi-luu-tru-va-su-dung","status":"publish","type":"post","link":"https:\/\/gcloudvn.com\/en\/kienthuc\/data-protection-bao-mat-du-lieu-khi-luu-tru-va-su-dung\/","title":{"rendered":"Data protection: Secure data when storing and using"},"content":{"rendered":"<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-19628 size-large\" src=\"https:\/\/gcloudvn.com\/wp-content\/uploads\/2021\/08\/z2681120192047_ae0c8f8cd11c5c4cce733b1b3bb7ad1e-1024x427.jpg\" alt=\"Data protection: Secure data when storing and using\" width=\"1024\" height=\"427\" \/><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">In <\/span><a href=\"https:\/\/cloudsecuritypodcast.libsyn.com\/website\/confidentially-speaking\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">first episode<\/span><\/a><span style=\"font-weight: 400;\"> of the Cloud Security Podcast, a pleasure to speak with <\/span><a href=\"https:\/\/twitter.com\/nellyporter?lang=en\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Nelly Porter<\/span><\/a><span style=\"font-weight: 400;\">, Group Product Manager of the Cloud Security group.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">In this interview, Anton, Tim and Nelly consider an important question about data security:<strong> <em>How can we handle extremely sensitive data in the cloud while keeping it protected against insider access?<\/em><\/strong> Turns out it&#039;s easy<\/span><span style=\"font-weight: 400;\"> for Google Cloud.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Some public cloud customers worry about their data in a variety of ways. And they have all kinds of sensitive data, from healthcare records, to credit card numbers, company secrets, etc. For some organizations, entrusting that data to a Public cloud provisioning is considered risky. Or, some organizations may have data that is extremely sensitive or highly damaging, if lost or stolen.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">In the past, most companies would collect the data, process it themselves, and do any conversion or aggregation on-site. They know who is using the data, how and when. That makes roles and responsibilities really clear.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">With the cloud, everything has changed. The ability to store and use is much better, but it also leaves some companies unable to manage data. Cloud security is a shared responsibility model: some is handled by the customer, some is handled by the provider.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">For example, let&#039;s say you&#039;ve collected a bunch of customer behavioral data, purchasing patterns, and purchase history. You&#039;ve uploaded it all to Cloud Storage \u2013 it&#039;s encrypted and you can keep the keys (e.g. via Google Cloud EKM); you are safe. This will work for many types of sensitive and regulated data. Correct?<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Next, you start performing data analysis, perhaps even training an AI model on your data. Now that you&#039;re using the data, it&#039;s no longer protected by the same encryption. You still get the advantage of <\/span><span style=\"font-weight: 400;\">reserved memory<\/span><span style=\"font-weight: 400;\">, but the data is not obfuscated, as may be desired by some clients in some use cases.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\"><a href=\"https:\/\/gcloudvn.com\/en\/google-cloud-platform\/\">Google Cloud Platform<\/a> Solve this difficult problem by <\/span><strong>confidential computing<\/strong><span style=\"font-weight: 400;\">, allowing you to complete the cycle and keep data protected in transit, storage, and use. Although it started with CPUs, they also expanded the service to include GPUs and Accelerators, so your data is protected wherever you are.<\/span><\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-19630 size-full\" src=\"https:\/\/gcloudvn.com\/wp-content\/uploads\/2021\/08\/Confidential-computing.jpg\" alt=\"Confidential computing\" width=\"476\" height=\"340\" \/><\/p>\n<p style=\"text-align: justify;\"><strong>Confidential computing<\/strong><span style=\"font-weight: 400;\"> becomes possible with suitable CPU hardware, allowing data encryption during load and use. And because this is a hardware upgrade, nothing needs to be changed with your code to take advantage of it.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">The alternative for most companies would be to just process and process <\/span><span style=\"font-weight: 400;\">ultra-sensitive data on-premise<\/span><span style=\"font-weight: 400;\">, which means missing out on the scale, functionality, and reliability of public cloud infrastructure. With this improved cryptographic isolation, companies of all types can use sensitive data across services and tools. The only downside is a slight increase in latency and increased cost.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Whether you&#039;re handling highly regulated financial services data, sensitive photos from your customers, or need to protect highly valuable intellectual property, <\/span><a href=\"https:\/\/cloud.google.com\/confidential-computing\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Let&#039;s check the secret calculation<\/span><\/a><span style=\"font-weight: 400;\"> and hear more about how it works on <\/span><a href=\"https:\/\/cloudsecuritypodcast.libsyn.com\/website\/confidentially-speaking\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">this episode of the Cloud Security Podcast<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p style=\"text-align: right;\"><strong>Source: Gimasys<\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>Trong t\u1eadp \u0111\u1ea7u ti\u00ean c\u1ee7a ch\u01b0\u01a1ng tr\u00ecnh Cloud Security Podcast, r\u1ea5t vinh d\u1ef1 khi \u0111\u01b0\u1ee3c n\u00f3i chuy\u1ec7n v\u1edbi Nelly Porter, Group Product Manager c\u1ee7a nh\u00f3m Cloud Security. Trong cu\u1ed9c ph\u1ecfng v\u1ea5n n\u00e0y, Anton, Tim v\u00e0 Nelly xem x\u00e9t m\u1ed9t c\u00e2u&hellip;<\/p>","protected":false},"author":1,"featured_media":7084,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-7083","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kienthuc","entry","has-media"],"_links":{"self":[{"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/posts\/7083","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/comments?post=7083"}],"version-history":[{"count":0,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/posts\/7083\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/media\/7084"}],"wp:attachment":[{"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/media?parent=7083"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/categories?post=7083"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/tags?post=7083"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}