{"id":8030,"date":"2013-07-01T16:21:00","date_gmt":"2013-07-01T16:21:00","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/2721970"},"modified":"2013-07-01T16:21:00","modified_gmt":"2013-07-01T16:21:00","slug":"tokenization-encryption-two-data-security-methods-for-the-cloud","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/tokenization-encryption-two-data-security-methods-for-the-cloud\/","title":{"rendered":"Tokenization &amp; Encryption &ndash; Two Data Security Methods for the Cloud"},"content":{"rendered":"<p>When organizations look to protect sensitive data at rest in the cloud or in transit on the way to it, there are two primary obfuscation strategies most consider \u2013 tokenization or encryption. But some enterprises may not know the details of how these methods work or how they differ.<br \/>\nA newer technology, tokenization is the process of taking a sensitive data field and replacing it with a surrogate value called a token. De-tokenization is the reverse process of replacing a token with its associated clear text value.<br \/>\nEncryption uses a cipher algorithm to mathematically transform data. Encrypted values can be transformed back to the original value via the use of a key. With encryption, a mathematical link back to its true form still exists.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/2721970\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When organizations look to protect sensitive data at rest in the cloud or in transit on the way to it, there are two primary obfuscation strategies most consider &ndash; tokenization or encryption. But some enterprises may not know the details of how these methods work or how they differ.<br \/>\nA newer technology, tokenization is the process of taking a sensitive data field and replacing it with a surrogate value called a token. De-tokenization is the reverse process of replacing a token with its associated clear text value.<br \/>\nEncryption uses a cipher algorithm to mathematically transform data. Encrypted values can be transformed back to the original value via the use of a key. With encryption, a mathematical link back to its true form still exists.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/2721970\" target=\"_blank\">read more<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-8030","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/8030","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=8030"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/8030\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=8030"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=8030"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=8030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}