Are structural designs safe in the cloud?

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Are structural designs safe in the cloud?

Keep up with the latest from CCR-Mag.com

Fill out the form Below


In spring 2017, Apple’s iCloud service was held to ransom by hackers threatening to delete customer iPhone, iPad and Mac data. With this and several other high-profile hacks on cloud services, many structural engineers wonder whether it is trustworthy enough to handle their design projects. Here, Paul Comino, chief technology officer and co-founder of cloud engineering software provider SkyCiv, explains the measures taken to protect structural designs.
Since Adobe first launched its Creative Cloud suite of programs in 2013, there has been more than 198 million downloads of the suite’s mobile apps. This of course excludes the desktop editions and, since much of Adobe’s target audience uses desktop Macs, this means the actual statistic is likely significantly higher.
This uptake of Adobe’s cloud services gives us a clear indication of the overall adoption of cloud computing in modern times. Changing work habits and the advancement of mobile technology has meant that the flexibility of access to data that cloud platforms provide is almost a modern necessity.
However, with this adoption comes increased awareness of any attacks on cloud platforms. Incidents such as the 2017 ransom of Apple’s iCloud by hackers or the infamous attack on Sony’s Playstation Network in 2011 gained significant public attention, which has led many to question cloud’s security.
This is understandable and a particularly strong fear for structural engineers, whose design projects are often confidential. With cloud-based structural software such as SkyCiv’s becoming more popular among engineers, how can engineers be sure that their projects are safe and secure?
Three steps to safety
At SkyCiv, there are three steps we take to ensure the security of data. The first and most obvious is encryption, which we believe to be the cornerstone of data security. Almost every cloud service provider or company using the internet to handle sensitive data will use encryption to safeguard it, but it’s important that the provider understands developments in cryptographic algorithms.
For example, two of the most common cryptographic hash functions are message digest five (MD5) and secure hashing algorithm one (SHA-1). These two forms of encryption have existed for a decade and have extensive vulnerabilities, which means they are not secure enough for confidential or sensitive data.
In layman’s terms, a provider using these would be unable to ensure data safety as most hackers can decrypt the hashing with relative ease and decode user data. SkyCiv’s cloud services do not use these encryption techniques for this exact reason and instead use more recent and secure alternatives to protect user data.
Another process we have in place is access security. The benefit of cloud is that it makes software accessible from anywhere in the world with an internet connection, which means it’s important that users can track where they are logged in. Engineers must therefore have assurances that, if unusual activity is detected, they are notified in case it is an unauthorised infiltration.
Cloud software providers can address this problem by limiting the number of users that can be logged on to one account at a time. SkyCiv also monitors the IP addresses of these login attempts and, if attempts are detected from five different IPs within a space of three days, the account could be frozen to prevent potential misuse of the software.
The third key security factor is one that some providers fail to address. To ensure security, the servers housing the data must be kept regularly updated to minimise the risk of vulnerabilities or loopholes being exploited by hackers.
This is why software providers should partner with dedicated cloud hosting companies, whose job it is to maintain the servers. Often, software providers believe that hosting their own server will give them more control over updating the system, but this more often leads to delays or neglect due to other business obligations.
At the Black Hat USA conference in 2014, security researchers from Adallom explained that one of the biggest threats to web services is the users themselves. Although publicised attacks on cloud platforms have driven suspicion of the technology, by choosing to work with the right partner, engineers can ensure that the process is no riskier than using any other service and the benefits outweigh the risks.

Events

Read more BELOW

News

Skanska, Cold Spring Harbor Laboratory Top Out Campus Building

Skanska and Cold Spring Harbor Laboratory (CSHL) celebrated the topping out of the Artificial Intelligence and Quantitative Biology (AIQB) building at CSHL. This marks a key milestone of Phase I of CSHL’s Foundations for the Future campaign that aims to invest in the institute’s infrastructure so

Supplements/Podcast
See Website for Details

This content (including text, artwork, graphics, photography, and video) was provided by the third party(ies) as referenced above. Any rights or other content questions or inquiries should be directed such third-party provider(s).

Receive the CCR 2024 Idustry Report

Get ahead of your Competitors with CCR's FREE Industry Insider's Report 2024!

Always stay two steps ahead of your Competitors. Stay informed with the latest in the Industry. 

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

This site uses cookies to ensure that you get the best user experience. By choosing “Accept” you acknowledge this and that ccr-mag.com operates under the Fair Use Act. Furthermore, Changing privacy laws now require website visitors from EEA based countries to provide consent in order to use personalized advertising or data modeling with either Google Ads & Analytics. Find out more on the Privacy Policy & Terms of Use Page