Systems and methods for proxying encryption key communications between a cloud storage system and a customer security module

Methods in a cloud object store facilitate strong data encryption, customer-management of object (encryption) keys, reductions in latency, globally-distributed object storage, and handling of streamed uploads. A method for encrypting objects stored in a cloud includes encrypting each object with a u...

Full description

Saved in:
Bibliographic Details
Main Authors Jassal, Amrit, Chauhan, Manoj, Jakubowski, Leszek, Rai, Yogesh, Lahiri, Krishanu, Shetty, Sachin
Format Patent
LanguageEnglish
Published 24.03.2020
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Methods in a cloud object store facilitate strong data encryption, customer-management of object (encryption) keys, reductions in latency, globally-distributed object storage, and handling of streamed uploads. A method for encrypting objects stored in a cloud includes encrypting each object with a unique encryption (object) key. The plaintext object keys are generated in advance of uploads. The plaintext object keys can be stored in an object database in the cloud. Alternatively, the plaintext object keys can be provided to a customer's HSM, encrypted, and returned to the cloud, such that encrypted object keys, encrypted by the customer, are stored in the cloud. The cloud can alternatively encrypt the customer's object keys with a master key for the customer, which is then encrypted by the customer's HSM before being stored in the cloud. Proxies are also deployed for efficiently communicating with customer security modules.
Bibliography:Application Number: US201715476488