Yet another survey is indicating that security is a big issue for those intending to take up cloud computing. Network equipment manufacturer Ipswitch asked 1000 of its customers if they planned to invest in cloud technology in 2011.
The good news is that over two thirds of them reportedly said yes. The bad news is that most want either a private cloud setup (29 percent) or a mix of public and private clouds (21 percent).
The whole point of the cloud is that it’s supposed to do away with the need and cost of managing hardware, so this doesn’t make a lot of sense. But it might be the first step of an evolutionary process for companies that will eventually embrace cloud computing in its purest form.
Encryption is one answer to cloud security worries. If a file is encrypted with 256-bit AES protection, for example, it doesn’t matter if it ends up in the wrong hands because nobody will be able to decrypt it without the correct key. However, finding a system where file encryption can be used in a way that is transparent to users is a goal that arguably hasn’t yet been met.
However, there might be a solution, and it’s been around for years: Digital Rights Management (DRM).
Nobody likes DRM because when applied to movies, music and games, it creates a “them and us” situation: Rights holders impose unfair restrictions on end users, and there’s a lack of trust between both parties.
However, I can’t see any issues with a democratic DRM system, where everybody working for a particular company automatically enforces DRM on documents, and a certificate file needs to be installed on any computer or mobile device that requests to open or edit the file. We could call this Document DRM, or “DDRM.”
Something similar already exists. Microsoft has been building what it calls Rights Management Services into its operating systems and office suites for years. The problem is that this uses a client-server model to protect files–which is to say, to open a document, a computer needs to be logged into a Microsoft server. No doubt Microsoft would argue that this is the best way of enforcing DRM, but cynics might suggest a client-server model was chosen to lock people into using Microsoft’s technology.
What would be better is a simpler, standalone system based on encryption certificate files. If your computer has the correct certificate, then it can open or edit a document. Certificates would expire after, say, one week, meaning that the client computers would need to phone home periodically to refresh their certificates. But they wouldn’t need to phone home every single time they accessed a file.
This proposed system isn’t perfect. Hackers could steal certificate files and possibly decrypt documents, although certificates would ideally be generated using a specific hardware identifier, such as the computer’s CPU serial number, making this more difficult.
But it’s very unlikely there will ever be a perfect cloud security solution. Usability needs to be balanced with security, without too many trade-offs in either camp.
Ideally such a DDRM system would work at the file level within operating systems, and not at an application level. That’s to say there’d be no need to build it into applications, and that would also mean old applications would be entirely compatible with DDRM. Instead, the operating system would take care of encryption, decryption and certificate management. The user would be largely unaware.
Sadly, it already might be too late for such a system. Assuming a company like Google took the initiative–which would require the audacity of such a giant–it would take a year or two to outline a system everybody was happy with, and then even longer for it to be incorporated into operating systems. By that point mobile operating systems will be fully mature, and adding in DDRM would be a matter of ugly retrofitting. Ideally, such a system should have been dreamed up a few years ago, so it would have become a feature in the nascent wave of mobile operating systems.
Additionally, I wouldn’t be surprised if somebody has already thought of a system such as DDRM and patented it. That could create all kinds of problems and expenses.
So for the moment DDRM will have to remain a thought exercise, although a curious one that perhaps deserves more attention.
Keir Thomas has been writing about computing since the last century, and more recently has written several best-selling books. You can learn more about him at http://keirthomas.com and his Twitter feed is @keirthomas.