ARM Proposes Innovative Cloud Security Solution

ARM Proposes Innovative Cloud Security Solution

After Edward Snowden exposed the US government’s ingenious plan to monitor every major web platform in existence, including Facebook, Twitter and even Microsoft, trust in Cloud Storage security has come down to an all time low. However, with Google coming with a free encryption service for its clients, UK-based IT manufacturer ARM has come up with an even more innovative solution to protect your cloud data.

On August 15, Google announced that it would provide a free 128-bit encryption service for data stored in the Cloud Service. However, one major fallacy in that announcement was that it was VIP-access only, as only enterprise clients would be provided with the new service. This left the common users in the same dilemma as they were before. Furthermore, it meant that the same platforms like Facebook and Twitter were given the service who failed to protect their personal data in the first place, whereas the common user were left to grieve for a better solution.

However, ARM CTO Mike Muller believes there is a far easier, delicate solution to the problem, as he revealed ARM’s plans for introducing a microcontroller to cloud data for security and protection purposes during an interview with the Forbes magazine.

Microcontrollers are not a cutting-edge technology- ATM cards and security passes have long been using them for validation and better protection of their data. The same technology can be used in cloud data security as well, and the ARM CTO tells you how.

As we accumulate data on the cloud, based on the amount, a certain number of tokens would be generated which can be accessed by the user only. As the tokens would be spent, it would make the data inaccessible for anyone, thus requiring much more effort for anyone trying to snoop in on the data. And with the system spread everywhere, spying on your data in the cloud storage would be next to impossible.

However, the move is yet to see any sort of fruition as ARM’s proposal is yet to sink in with the IT community. Nonetheless, in the near future, the proposed token system, in an advanced form, might do wonders to protect data on the Cloud Storage for every common user out there.

By Blake Adams

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!
FacebookTwitterLinkedInGoogle+Share

Sorry, comments are closed for this post.

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Advertising Programs

Click To Find Out!

Sponsored Posts

Sponsored Posts

CloudTweaks has enjoyed a great relationship with many businesses, influencers and readers over the years, and it is one that we are interested in continuing. When we meet up with prospective clients, our intent is to establish a more solid relationship in which our clients invest in a campaign that consists of a number of

Popular

Top Viral Impact

The Future Of Work: What Cloud Technology Has Allowed Us To Do Better

The Future Of Work: What Cloud Technology Has Allowed Us To Do Better

The Future of Work: What Cloud Technology Has Allowed Us to Do Better The cloud has made our working lives easier, with everything from virtually unlimited email storage to access-from-anywhere enterprise resource planning (ERP) systems. It’s no wonder the 2013 cloud computing research IDG survey revealed at least 84 percent of the companies surveyed run at

Cloud Infographic – Big Data Survey: What Are The Trends?

Cloud Infographic – Big Data Survey: What Are The Trends?

Jaspersoft Big Data Survey Shows Rise in Commitment to Projects and Decline in Confusion Nearly 1,600 Jaspersoft Community Members Participate in Second Jaspersoft Big Data Survey San Francisco, February 4, 2014 – Jaspersoft, the Intelligence Inside applications and business processes, today shared results from its Big Data Survey. Nearly 1,600 Jaspersoft community members responded to

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter The city of the future is impeccably documented. Sensors are used to measure air quality, traffic patterns, and crowd movement. Emerging neighborhoods are quickly recognized, public safety threats are found via social networks, and emergencies are dealt with quicklier. Crowdsourcing reduces commuting times, provides people with better transportation

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate long term with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

Please review the guidelines before applying.

Whitepapers

Top Research Assets

HP OpenStack® Technology Breaking the Enterprise Barrier

HP OpenStack® Technology Breaking the Enterprise Barrier

Explore how cloud computing is a solution to the problems facing data centers today and highlights the cutting-edge technology (including OpenStack cloud computing) that HP is bringing to the current stage. If you are a CTO, data center administrator, systems architect, or an IT professional looking for an enterprise-grade, hybrid delivery cloud computing solution that’s open,

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security Cloud applications are a priority for every business – the technology is flexible, easy-to-use, and offers compelling economic benefits to the enterprise. The challenge is that cloud applications increase the potential for corporate data to leak, raising compliance and security concerns for IT. A primary security concern facing organizations moving