O'Reilly logo

Cloud Storage Security by Michael Winburn, Aaron Wheeler

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5

Privacy Tools

This chapter provides a discussion of the types of additional privacy protection to supplement or replace that offered by your cloud storage provider. Two-factor authentication makes your mobile device a tool to protect the privacy of your cloud data. Tools for encrypting data yourself leave the encryption keys and passwords under your control and view. Privacy and security depend on good passwords so we present tools and advice for strong password creation and management. Securing data in the cloud means little if devices that connect to it lack security, so we discuss tools to protect private data on these devices as well. As alternatives standard, commercial cloud data storage, we propose private and peer-to-peer distributed ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required