Cloudproof Encryption
Access & search encryption for your data in the cloud
In complex, scalable infrastructures, encryption must abstract physical implementations and must provide a way to securely and quickly find and extract discrete data across the entire encrypted repository.
You need application-level encryption with encrypted search.
Cloudproof Encryption brings improved security, high performance at the application level.
And it’s open source.
Adapts to your business organization
Application level encryption with freely defined attributes along multiple axes and user decryption keys embedding access policies, simply defined as boolean expressions over the attributes.
The cloud learns nothing
Everything is encrypted: the data, the indexes, the search queries, and their response. Data is kept encrypted at all times and only decrypted on the end user’s device.Adapts to your business organization
Application level encryption with freely defined attributes along multiple axes and user decryption keys embedding access policies, simply defined as boolean expressions over the attributes.
The cloud learns nothing
Everything is encrypted: the data, the indexes, the search queries, and their response. Data is kept encrypted at all times and only decrypted on the end user’s device.
Designed for big data repositories
Encrypted data partitioning facilitates feeding data from multiple sources, the management of ciphertext rotations, and defining policies for extractions. Encrypted search provides a secure mechanism to quickly find encrypted data across the partitions.Designed for big data repositories
Encrypted data partitioning facilitates feeding data from multiple sources, the management of ciphertext rotations, and defining policies for extractions. Encrypted search provides a secure mechanism to quickly find encrypted data across the partitions.
Cryptographic Technology
Cloudproof Encryption is based on 2 open source cryptographic stacks: Covercrypt and Findex. They respectively provide a fast version of access control encryption and searchable encryption.
These stacks are actively designed by Cosmian cryptographers in collaboration with the ENS/CNRS/INRIA cryptographic lab headed by Pr. David Pointcheval. The reference implementation of the stacks is developed in Rust according to the ANSSI guidelines and is submitted for their review.
Pricing
Annual license based on the number of encrypting servers.
Packaging
Cloudproof Encryption is packaged in open-source libraries, and directly available on [Cosmian GitHub] in multiple languages, including Java, Javascript, Python, and Rust. They expose APIs meant for developers who are not cryptographers.
Libraries run on all operating systems, including Android and IOS, as well as inside browsers (using Javascript and Web Assembly).Plugins are available for Spark and Denodo, with examples in Java for Kafka and the Hadoop ecosystem
Cryptographic Technology
Cloudproof Encryption is based on 2 open source cryptographic stacks: CoverCrypt and Findex. They respectively provide a fast version of access control encryption and searchable encryption.
These stacks are actively designed by Cosmian cryptographers in collaboration with the ENS/CNRS/INRIA cryptographic lab headed by Pr. David Pointcheval. The reference implementation of the stacks is developed in Rust according to the ANSSI guidelines and is submitted for their review.
Packaging
Cloudproof Encryption is packaged in open-source libraries, and directly available on [Cosmian GitHub] in multiple languages, including Java, Javascript, Python, and Rust. They expose APIs meant for developers who are not cryptographers.
Libraries run on all operating systems, including Android and IOS, as well as inside browsers (using Javascript and Web Assembly).Plugins are available for Spark and Denodo, with examples in Java for Kafka and the Hadoop ecosystem
Pricing
Annual license based on the number of encrypting servers.
Improved security model
Using application layer encryption limits the attack surface. Ciphertext partitioning limits the consequences of key leakage. Post-quantum hybridization provides security against future threats.
Post-quantum
Hybridization with post quantum cryptography provides security against future threats (following ANSSI recommendation).
Easier to deploy
Encrypting systems do not need to be secured since they only use the public key. Decryption keys are only created when needed.
Scalable
Everything but private keys is in the cloud. Everything in the cloud is encrypted.
Latest News
Why Ubiquitous Encryption is key to cloud security.
Blog / SecurityWhy Ubiquitous Encryption is key to cloud security.ShareCosmian • March 28, 2023Table of ContentsTopCloud Act: a sword of Damocles hanging over data confidentiality.Tools adapted to modern...
At SCN 2022, Paola de Perthuis, Cryptographer at Cosm …
Blog / CryptographyAt SCN 2022, Paola de Perthuis, Cryptographer at Cosmian, will present her joint work paper on MyOPE - Malicious security for Oblivious Polynomial EvaluationShareCosmian • Sep 13,...
Deeptech Cosmian raises €4.2m to accelerate the dep …
This financing, mainly operated by La Banque Postale - via its new 115K innovation fund - and Elaia Partners, historical investor, will allow the French encryption specialist to accelerate the distribution of its first products and continue to innovate. Its ambition...