Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Solving the Right to be Forgotten Problem

The Right to be Forgotten (technically the right to erasure or for users to have personal data removed from service providers’ records) creates a big problem for suppliers. This right is becoming standard across the new global wave of data protection and consumer privacy legislation that has followed GDPR. 

The Right to be Forgotten (technically the right to erasure or for users to have personal data removed from service providers’ records) creates a big problem for suppliers. This right is becoming standard across the new global wave of data protection and consumer privacy legislation that has followed GDPR. 

The process of continuous location monitoring and/or on-demand detection of users’ data for erasure is time-consuming and costly. A new tokenization service offers a potential solution.

Tokenization is an attractive option for protecting data. For full benefit, individual characters should be tokenized. However, the processing power necessary for such a process has held back its implementation. Now the compute power and low storage cost of cloud computing is removing this restriction.

Start-up firm Rixon Technology has developed and is using its own patented cloud-based vaultless tokenization engine to provide flexible and almost real-time tokenization and detokenization.

(See SecurityWeek’s report on tokenization and encryption for more information on tokenization technology.)

The basic Rixon approach to tokenization is that cleartext should never be stored on its customer’s network. Raw text is sent to the cloud tokenization engine and returned as tokens. The original cleartext is stored neither locally nor in the cloud – the engine simply remembers the tokenization process. This is held in immutable cloud servers that cannot be accessed by any human, whether the customer, a hacker or Rixon itself. If the server detects anything unusual, it simply burns itself down and rebuilds elsewhere.

Rixon invited Joseph Demarest, former assistant director for the cyber division of the FBI, to review its security. “I couldn’t find any gaps,” he told SecurityWeek. “The technology is durable, very fast, flexible and customizable. The customer retains ownership of the data and can decide on its security policy based on its own risk tolerances.”

Demarest believes that security needs a change of direction. The old moat and castle approach clearly no longer works. “We had a saying in the Bureau,” he said: “if you try to protect everything, you end up protecting nothing.” But concentrating on protecting the data is different. “Tokenization has the potential to transform the way organizations manage and protect their data,” he added.

Advertisement. Scroll to continue reading.

Tokenization is by nature format-preserving, which means that tokenized data can still be processed by existing applications. Since individual characters can be tokenized, enough of the cleartext can be retained to be useful to the company without being useful to any criminal – for example, the last four characters of a bank card number or a portion of an email address that can confirm the identity. 

Rixon has now combined the power and flexibility of its tokenization technology to produce a solution to the RTBF problem by giving control of personal data back to the data owner; that is, the user.

RTBF – the user’s right to have PII erased

PII is ubiquitous within business. It is basically ‘customer information’. RTBF requires that every instance of PII should be available for deletion on demand. But most companies don’t know where it is held. It could be in databases; it could be free form in emails and letters; and with the rise of remote working, it could be on employees’ home computers in spreadsheets or in their Shadow IT cloud apps.

Much of this PII is initially captured by online retailers for purchasing transactions. With Rixon’s RTBF solution, the Rixon customer – such as an online retailer or service provider – can add an additional button to its online payment data collection form. The button is a toggle between ‘allow’ and ‘forget’. The initial state is ‘allow’.

When a user enters payment data into the form it is encrypted and sent to the tokenization engine where that information is tokenized. Since the initial state of the allow/forget button is set to allow, the vendor is ‘allowed’ to see the cleartext detokenized data. Payment for the purchased goods can proceed and be processed.

But if the user subsequently decides, on completion of the transaction, that he or she does not want the vendor to keep any personal information, the toggle button can be switched to ‘forget’. This sends an instruction to the tokenization engine, and the vendor’s ability to see cleartext is immediately removed. All that remains is the meaningless tokenized characters.

User ‘consent’ is given by entering the data and is removed by resetting the toggle button to forget. The vendor is released from any need to manage PII, and data auditing becomes simple: there is no PII to audit.

The flexibility of the system goes further. Provided the user retains the initial data entry form, the toggle button can be switched back to ‘allow’. If that user wishes to make future purchases from the same vendor using the same bank card, switching to ‘allow’ immediately allows the vendor to see the detokenized data to process the purchase. The user can subsequently switch to ‘forget’, to once again remove the PII from the vendors system. 

This allow/forget/allow process can be continued indefinitely. It means that the user has control over personal data and its use, and the vendor no longer has to manage or worry about PII. The vendor is protected from any compliance issues because he doesn’t store any personal data. He is less attractive to hackers since there is no PII to steal, and data auditing requirements are minimized if not effectively eliminated.

On October 14, 2021, Rixon Technology was announced as one of three platinum award winners in the annual Pepperdine ‘Most Fundable Companies’ competition. This year, 3,300 U.S start-ups entered the competition.

Related: Tokenization: Benefits and Challenges for Securing Transaction Data

Related: California Attorney General Outlines Enforcement of Upcoming Privacy Law

Related: Eight Steps to Data Privacy Regulation Readiness

Related: The Implications of China’s New Personal Information Protection Law

Written By

Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Data Protection

While quantum-based attacks are still in the future, organizations must think about how to defend data in transit when encryption no longer works.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...