Secure IOT through KaaS

Cocoon Data’s data-centric approach to security that is the underlying technology behind SafeShare can be applied to IOT through the KaaS Platform. Our patented approach to securing the “data itself” is unique and forms the foundation of KaaS.

Secure Objects

A secure object combines what we believe are the pillars of data security; Identity, Policy and Key Management.  

A key is related to one or more authorised identities. Each identity’s rights and privileges to a key are captured by access control policies. Cocoon Data’s technology is built on the notion that key management, identity and policy must be a unified, integrated capability and that anything less is a security compromise.  

1. Identity determines who/what can obtain a key and by verifying that this identity has  an authorised credential to access the data.

2. Policy imposes a second layer of checks that are applied after the Identity credential has been authorised. These checks must be satisfied before the key is issued. 

3. Key Management/Encryption is achieved by designating a unique key for each piece of data.

3 Elements of core security
Cocoon Data’s Key-as-a-Service (KaaS) Platform

A modern approach to security that enables everyone who enjoys the creativity and openness of the Internet to continue to do business securely with the same ease and flexibility they expect.

Cocoon Data’s Key-as-a-Service provides a framework for protecting content wherever it resides, it supports policy driven access, and allows for full access remediation. KaaS combines the elements of Security, Privacy, and Accessibility to build confidence that all data can be moved and shared without losing control of it.  

The proliferation of privacy regulations, connected devices, connected software, cloud resident data, and individuals needing secure data access anywhere, means many organisations do not want or have the resources to manage keys, or process associated governance and compliance requirements.

KaaS Geofencing

KaaS helps organisations address increasingly stringent  requirements for data sovereignty in a manageable way, by shifting the focus from trying to  control where data is, to controlling where the keys that protect the data reside.

Access to a key is only granted after validating the location of the corresponding data. If access is requested within the data sovereign jurisdiction, then the policy permits the release of the key. 

Use Case

A typical use case for Geofencing objects is for an employee who has just travelled to a foreign country and doesn’t realise that their phone or data has been compromised. Unknown to them, a request to open encrypted data has been sent to the US key server. Cocoon Data’s geofencing technology blocks access based on the requesting user location. Data sovereignty is achieved through Key Sovereignty that is contained within map coordinates.

Controlled Key Access via geographical eg. within US borders

Cocoon Data’s KaaS platform can also be deployed though partnerships to address specific industries such as Health, Mining and critical infrastructure.

We welcome the opportunity to explore your specific industry needs.


For more information please contact us.