Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore end-to-end encryption in cloud services through this 47-minute conference talk from GOTO Chicago 2015. Dive into the advantages and weaknesses of cloud-hosted services, focusing on data management and security. Learn about transport level security, key management, authentication, and hybrid deployment strategies. Discover how Cisco Spark implements these concepts and understand the challenges of securing data in the cloud. Gain insights into the IETF draft for end-to-end encryption and explore solutions for key security and indexing. Enhance your knowledge of cloud security practices and their implications for both service providers and users.
Syllabus
Introduction
Cisco Spark
Goals
Transport Level Security
Security by Default
Key Management
Key Management Flow
Authentication
Search
Off the Record
Hybrid Deployment
OfftheRecord
The pieces of the puzzle
IETF draft
How are keys secure
Key management system
Indexing
Question
Taught by
GOTO Conferences