<html>
<head>
<meta content="text/html; charset=ISO-8859-1"
http-equiv="Content-Type">
</head>
<body bgcolor="#FFFFFF" text="#000000">
<div class="moz-cite-prefix">On 03/05/14 01:40, John Ioannidis
wrote:<br>
</div>
<blockquote
cite="mid:CABrqyHwrw_ZJSnoSaLJV2gx1-sq0ExgKCgGoNXho7NT4FV7drQ@mail.gmail.com"
type="cite">
<pre wrap="">On Fri, May 2, 2014 at 6:39 AM, Caspar Bowden (lists)
<a class="moz-txt-link-rfc2396E" href="mailto:lists@casparbowden.net"><lists@casparbowden.net></a> wrote:
</pre>
<blockquote type="cite">
<pre wrap="">Relax guys, those of you straining to achieve 10^9 speed-up in homomorphic
crypto, or other ingenious ways to use crypto in Cloud computing can slacken
the pace.
Apparently one third of IT managers* (Q.25), are already using crypto in
Cloud applications, and they have exclusive control of the key, so panic
over.
</pre>
</blockquote>
<pre wrap="">
What was the point of posting this in a video? What's wrong with text?</pre>
</blockquote>
<br>
Hmm. When I posted it there was a clickbox to download whole .pdf
report (28 pages), but apologies I did not alert that registration
required (but it was kind of obvious)<br>
<br>
The Download box is not there any more (but maybe pdf still
available behind registration). I wonder why that might be.<br>
<br>
Here's the relevant text (red is my emphasis) and screenshot with
graphs<br>
<br>
CB<br>
<br>
<blockquote><b>Who controls the encryption keys</b><br>
<br>
Figure 24 examines the issue of control over encryption keys in
the cloud environment for both encryption of data<br>
at rest and encryption of data at the application level.
Thirty-four percent of respondents believe their organization<br>
is in control of encryption keys for <font color="#ff0000"><b>both</b></font>
data encrypted at the <b><font color="#ff0000">application level</font></b>
and at rest in the cloud<br>
environment. Another 28 percent and 29 percent believe control of
encryption keys is a <font color="#ff0000"><b>shared activity
between</b><b><br>
</b><b>the organization and the cloud provider</b></font>. Only
19 percent and 17 percent of respondents, respectively, view the<br>
cloud provider as having control over encryption keys for either
encryption at the application level or for data at<br>
rest<br>
<br>
[Figure 24]<br>
<br>
Figure 25 shows German organizations are the most likely to say
their organizations have control of encryption<br>
keys <b><font color="#ff0000">at the application level </font></b>and
for data at rest in the cloud. Brazilian respondents are the least
likely to say their<br>
organizations have control over encryption keys at the application
level and for data at rest in the cloud.<br>
<br>
<b>Figure 25. Percentage of respondents who say their organization
is in control of encryption keys</b><br>
Consolidated analysis for encryption at <b><font color="#ff0000">both
the application level</font></b> and for data at rest in the
cloud by country<br>
sample<br>
<br>
[Figure 25]<br>
<img alt="screenshot of Fig.24/25 of pdf"
src="cid:part1.04000007.04010302@casparbowden.net" height="718"
width="606"><br>
</blockquote>
<br>
</body>
</html>