Method and system for managing security in a computing environment
First Claim
1. A method for managing data security in a computing environment, said method comprising:
- receiving, by a processor of a gateway server from a user device, at least one message, wherein each message requests that an encryption key be downloaded to the user device, and wherein the gateway server interfaces between the user device and a cloud comprising a plurality of interconnected computing systems external to the user device;
in response to the received at least one message;
said processor generating, for each message, at least one unique encryption key for encrypting and decrypting data, sending each encryption key of the at least one generated encryption key to the user device, and not storing any of the generated encryption keys in the cloud, wherein the at least one generated encryption key comprises a first encryption key;
for each encryption key of the at least one generated encryption key having been sent to the user device, said processor receiving each sent encryption key of the at least one generated encryption key returned from the user device;
for each received encryption key, said processor validating each received encryption key for use by the processor to encrypt data to be stored in the cloud, wherein said validating each received encryption key comprises storing each received encryption key in the cloud at a time specific to each received encryption key, wherein said storing each received encryption key in the cloud comprises storing the first encryption key in the cloud at a first key storage time;
said processor storing first data in the cloud at a first data storage time after the first key storage time;
said processor encrypting the first data, at a first data encryption time after the first data storage time, by using the first encryption key to encrypt the first data; and
said processor decrypting the encrypted first data, at a first data decryption time after the first data encryption time, by using the first encryption key to decrypt the encrypted first data.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system for managing data security in a computing environment. A processor at the gateway server receives, from a user device, at least one message. Each message requests that an encryption key be downloaded to the user device. The gateway server interfaces between the user device and a cloud that includes interconnected computing systems external to the user device. In response to the received at least one message, the processor generates at least one unique encryption key for each message and sends the at least one generated encryption key to the user device, but does not store any of the generated encryption keys in the cloud. For each encryption key having been sent to the user device, the processor receives each encryption key returned from the user device. For each encryption key received from the user device, the processor stores each received encryption key in the cloud.
75 Citations
15 Claims
-
1. A method for managing data security in a computing environment, said method comprising:
-
receiving, by a processor of a gateway server from a user device, at least one message, wherein each message requests that an encryption key be downloaded to the user device, and wherein the gateway server interfaces between the user device and a cloud comprising a plurality of interconnected computing systems external to the user device; in response to the received at least one message;
said processor generating, for each message, at least one unique encryption key for encrypting and decrypting data, sending each encryption key of the at least one generated encryption key to the user device, and not storing any of the generated encryption keys in the cloud, wherein the at least one generated encryption key comprises a first encryption key;for each encryption key of the at least one generated encryption key having been sent to the user device, said processor receiving each sent encryption key of the at least one generated encryption key returned from the user device; for each received encryption key, said processor validating each received encryption key for use by the processor to encrypt data to be stored in the cloud, wherein said validating each received encryption key comprises storing each received encryption key in the cloud at a time specific to each received encryption key, wherein said storing each received encryption key in the cloud comprises storing the first encryption key in the cloud at a first key storage time; said processor storing first data in the cloud at a first data storage time after the first key storage time; said processor encrypting the first data, at a first data encryption time after the first data storage time, by using the first encryption key to encrypt the first data; and said processor decrypting the encrypted first data, at a first data decryption time after the first data encryption time, by using the first encryption key to decrypt the encrypted first data. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer program product, comprising a computer readable storage device having computer readable program code stored therein, said program code containing instructions which, upon being executed by a processor of a gateway server of a computer system implements a method for managing data security in a computing environment, said method comprising:
-
receiving, by the processor of the gateway server from a user device, at least one message, wherein each message requests that an encryption key be downloaded to the user device, and wherein the gateway server interfaces between the user device and a cloud comprising a plurality of interconnected computing systems external to the user device; in response to the received at least one message;
said processor generating, for each message, at least one unique encryption key for encrypting and decrypting data, sending each encryption key of the at least one generated encryption key to the user device, and not storing any of the generated encryption keys in the cloud, wherein the at least one generated encryption key comprises a first encryption key;for each encryption key of the at least one generated encryption key having been sent to the user device, said processor receiving each sent encryption key of the at least one generated encryption key returned from the user device; for each received encryption key, said processor validating each received encryption key for use by the processor to encrypt data to be stored in the cloud, wherein said validating each received encryption key comprises storing each received encryption key in the cloud at a time specific to each received encryption key, wherein said storing each received encryption key in the cloud comprises storing the first encryption key in the cloud at a first key storage time; said processor storing first data in the cloud at a first data storage time after the first key storage time; said processor encrypting the first data, at a first data encryption time after the first data storage time, by using the first encryption key to encrypt the first data; and said processor decrypting the encrypted first data, at a first data decryption time after the first data encryption time, by using the first encryption key to decrypt the encrypted first data. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A computer system comprising a gateway server that includes a processor, a memory coupled to the processor, and a computer readable storage device coupled to the processor, said storage device containing program code which, upon being executed by the processor, implements a method for managing data security in a computing environment, said method comprising:
-
receiving, by the processor of the gateway server from a user device, at least one message, wherein each message requests that an encryption key for encrypting and decrypting data be downloaded to the user device, and wherein the gateway server interfaces between the user device and a cloud comprising a plurality of interconnected computing systems external to the user device; in response to the received at least one message;
said processor generating, for each message, at least one unique encryption key for encrypting and decrypting data, sending each encryption key of the at least one generated encryption key to the user device, and not storing any of the generated encryption keys in the cloud, wherein the at least one generated encryption key comprises a first encryption key;for each encryption key of the at least one generated encryption key having been sent to the user device, said processor receiving each sent encryption key of the at least one generated encryption key returned from the user device; for each received encryption key, said processor validating each received encryption key for use by the processor to encrypt data to be stored in the cloud, wherein said validating each received encryption key comprises storing each received encryption key in the cloud at a time specific to each received encryption key, wherein said storing each received encryption key in the cloud comprises storing the first encryption key in the cloud at a first key storage time; said processor storing first data in the cloud at a first data storage time after the first key storage time; said processor encrypting the first data, at a first data encryption time after the first data storage time, by using the first encryption key to encrypt the first data; and said processor decrypting the encrypted first data, at a first data decryption time after the first data encryption time, by using the first encryption key to decrypt the encrypted first data. - View Dependent Claims (12, 13, 14, 15)
-
Specification