Securing files using per-file key encryption
11108753 · 2021-08-31
Assignee
Inventors
Cpc classification
G06F16/00
PHYSICS
H04L63/0435
ELECTRICITY
G06F21/6218
PHYSICS
H04L9/3242
ELECTRICITY
H04L9/088
ELECTRICITY
H04L63/0876
ELECTRICITY
H04L9/0637
ELECTRICITY
International classification
G06F16/00
PHYSICS
H04L9/32
ELECTRICITY
H04L9/08
ELECTRICITY
H04L9/06
ELECTRICITY
Abstract
A computer system and methods for securing files in a file system with storage resources accessible to an authenticable user using an untrusted client device in a semi-trusted client threat model. Each file is secured in the file system in one or more ciphertext blocks along with the file metadata. Each file is assigned a unique file key FK to encrypt the file. A wrapping key WK assigned to the file is used for encrypting the file key FK to produce a wrapped file key WFK. A key manager is in charge of generating and storing keys. The file is encrypted block by block to produce corresponding ciphertext blocks and corresponding authentication tags. The authentication tags are stored in the file metadata, along with an ID of the wrapping key WK, wrapped file key WFK, last key rotation time, an Access Control List (ACL), etc. The integrity of ciphertext blocks is ensured by authentication tags and the integrity of the metadata is ensured by a message authentication code (MAC).
Claims
1. A computer-implemented method for securing a plaintext file F.sub.p as an encrypted, ciphertext file F.sub.c in a distributed file system, said method comprising the steps of: (a) providing storage resources distributed in said distributed file system; (b) providing said storage resources to be accessible to an authenticable user U.sub.x using an untrusted client device; (c) assigning to said plaintext file F.sub.p a symmetric file key FK, wherein said symmetric file key FK is unique to said plaintext file F.sub.p; (d) block by block encrypting by a compatibility shim layer, each block M.sub.i of said plaintext file F.sub.p with said file key FK to produce a corresponding authentication tag T.sub.i, and a corresponding encrypted block C.sub.i of said encrypted, ciphertext file F.sub.c; (e) inserting said compatibility shim layer on top of an Application Programming Interface (API) of said distributed file system for intercepting and servicing file system requests generated on said untrusted client device; (f) storing said corresponding encrypted block C.sub.i in said storage resources distributed in said distributed file system; (g) encrypting said file key FK by a symmetric wrapping key WK to obtain a wrapped file key WFK, wherein said symmetric wrapping key WK is shared among a plurality of said plaintext files secured by said computer-implemented method; (h) placing said authentication tag T.sub.i, said wrapped file key WFK and a key ID of said wrapping key WK, in a metadata of said encrypted, ciphertext file F.sub.c; (i) generating and storing a message authentication code (MAC) of said metadata, for protecting said metadata from tampering by later verifying its integrity based on said MAC; and (j) generating said wrapping key WK by a key manager.
2. The method of claim 1, further storing said wrapping key WK in said key manager.
3. The method of claim 1, further using Advanced Encryption Standard (AES) in Galois/Counter Mode (GCM) mode in said step (d) of block by block encrypting.
4. The method of claim 1, further utilizing in said step (d) of block by block encrypting, an Initialization Vector (IV) to said file key FK, that is based on a block number of said block M.sub.i of said plaintext file F.sub.p.
5. The method of claim 1, prior to said step (d) of block by block encrypting, further consulting a policy engine for authenticating and authorizing said authenticable user U.
6. The method of claim 5, further performing by said policy engine said step of authenticating using Kerberos authentication protocol.
7. The method of claim 5, further releasing by said policy engine said file key FK to said compatibility shim layer to use in said step (d) of block by block encrypting, based on the results of said steps of authenticating and authorizing.
8. The method of claim 1, where said compatibility shim layer further verifies the integrity of said corresponding encrypted block C.sub.i by checking said corresponding authentication tag T.sub.i, before block by block decrypting said corresponding encrypted block C.sub.i with said file key FK to produce corresponding said block M.sub.i of said plaintext file F.sub.p.
9. The method of claim 1, further storing said wrapping key WK in a hardware security module (HSM).
10. A computer system operating under a semi-trusted user threat model that supports an authenticable user U.sub.x with an untrusted client device, said computer system comprising: (a) a file system having storage resources; (b) a plaintext file F.sub.p containing blocks M.sub.i of plaintext data, said plaintext file F.sub.p assigned a symmetric file key FK and a symmetric wrapping key WK, wherein said symmetric file key FK is unique to said plaintext file F.sub.p; (c) a compatibility shim layer inserted on top of an Application Programming Interface (API) accessing said file system for block by block encryption of said blocks M.sub.i with said file key FK to produce corresponding authentication tags T.sub.i, and corresponding encrypted blocks C.sub.i of an encrypted ciphertext file F.sub.c; (d) a policy engine for performing an authentication of said authenticable user U.sub.x accessing said file system via a file system request generated on said untrusted client device, said policy engine further encrypting said file key FK by said symmetric wrapping key WK to obtain a wrapped file key WFK, wherein said symmetric wrapping key WK is shared among a plurality of said plaintext files; (e) metadata related to said encrypted ciphertext file F.sub.c comprising said authentication tags T.sub.i, said wrapped file key WFK, a key ID of said wrapping key WK and an Access Control List (ACL) related to said encrypted ciphertext file F.sub.c, said metadata further protected from tampering by including in it a message authentication code (MAC) for a later verification of the integrity of said metadata; and (f) a key manager for generating and storing said wrapping key WK.
11. The computer system of claim 10, wherein in response to said file system request and after performing said authentication, said policy engine further performs an authorization of said user U.sub.x based on said Access Control List (ACL) read from said metadata.
12. The computer system of claim 11, wherein said policy engine further reads said key ID from said metadata and queries said key manager for said wrapping key WK, then decrypts said wrapped file key WFK with said wrapping key WK to obtain said file key FK, and then releases said file key FK to said compatibility shim layer.
13. The computer system of claim 10, wherein said metadata further comprises the last time that a key rotation of said file key FK was performed.
14. The computer system of claim 10, wherein said policy engine further deploys a policy comprising: (g) a configuration information establishing sections of said file system that are to be encrypted; (h) a configuration information selected from the group consisting of establishing each file in said file system to be uniquely assigned said wrapping key WK, establishing multiple files in a directory of said file system to be assigned said wrapping key WK and establishing multiple files in multiple levels of a directory tree of said file system to be assigned said wrapping key WK; and (i) a configuration information establishing the key rotation period for said sections of said file system that are to be encrypted.
15. The computer system of claim 10, further comprising a hardware security module (HSM) in which said wrapping key WK is stored.
16. A distributed computer system cluster comprising: (a) a distributed file system having storage resources distributed over one or more data-nodes of said cluster; (b) a plaintext file F.sub.p having blocks M.sub.i of plaintext data, said plaintext file F.sub.p secured in said distributed file system as a ciphertext file F.sub.c having cyphertext blocks C.sub.i corresponding to said blocks M.sub.i; (c) a symmetric file key FK and a symmetric wrapping key WK assigned to said plaintext file F.sub.p and said ciphertext file F.sub.c, wherein said symmetric file key FK is unique to said plaintext file F.sub.p; (d) a compatibility shim layer inserted on top of an Application Programming Interface (API) accessing said storage resources; (e) an individual policy engine running on one or more of said data-nodes for performing an authentication of an authenticable user U.sub.x accessing said file system via a file system request generated on an untrusted client device; (f) a metadata related to said plaintext file F.sub.p and said ciphertext file F.sub.c, said metadata comprising authentication tags T.sub.i and ciphertext blocks C.sub.i produced by block by block encryption by said compatibility shim layer of corresponding said blocks M.sub.i, a wrapped file key WFK and a key ID of said symmetric wrapping key WK; and (g) a key manager for generating and storing said wrapping key WK, wherein said symmetric wrapping key WK is shared among a plurality of said plaintext files.
17. The distributed computer system cluster of claim 16, further comprising a master policy engine running on a name-node of said cluster, said master policy engine communicating a policy to said individual policy engine running on said one or more of said data-nodes, said master policy engine further protecting said policy from tampering by utilizing a private key to cryptographically sign said policy.
18. The distributed computer system cluster of claim 16, wherein said individual policy engine receives said wrapping key from said key manager in response to sending said key manager said key ID, then decrypts said wrapped file key WFK by said wrapping key WK to obtain said file key FK, and then transmits said file key FK to said compatibility shim layer.
19. The distributed computer system cluster of claim 18, wherein said compatibility shim layer first verifies the integrity of each of said encrypted blocks C.sub.i by checking its authentication tag, before decrypting it with said file key FK to produce a corresponding block of said blocks M.sub.i of said plaintext file F.sub.p.
20. The distributed computer system of claim 16, further comprising a hardware security module (HSM) in which said wrapping key WK is stored.
Description
BRIEF DESCRIPTION OF THE DRAWING FIGURES
(1)
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
DETAILED DESCRIPTION
(11) The following description relates to preferred embodiments of the present invention by way of illustration only. Likewise, the figures depict embodiments of the present invention for purposes of illustration only. One skilled in the art will readily recognize from the description and figures that alternative embodiments of the methods and systems depicted herein may be employed without departing from the principles of the invention described herein.
(12) The present invention will be best understood by initially referring to the high-level diagram of
(13) Under the semi-trusted client threat model an authenticable user U, in this case designated as a specific authenticable user U.sub.x, is working with an untrusted client device 102. In the present embodiment, client device 102 is a mobile computer, and more specifically still a laptop computer. In general, however, client device 102 can be any type of device capable of making a network connection and performing any useful function. In most cases, of course, client device 102 is a mobile user device such as a mobile phone, a mobile computer, a tablet computer or any thin client device, including devices ranging from electronic watches to sensors with minimal processing capabilities. The latter are sometimes referred to as networked devices making up the Internet of things by those skilled in the art.
(14) Authenticable user U.sub.x uses his laptop computer 102 to connect to computer system 100 over a network connection 104 by any suitable medium 104′. Connection 104 can thus deploy any type of wireless or wired medium 104′. In fact, communication network 104 can include a Wide Area Network (WAN) like the Internet, a Metropolitan Area Network (MAN) or a Local Area Network (LAN).
(15) The physical connection can be supported by any communications infrastructure including wired, optical and wireless.
(16) In the preferred embodiment, computer system 100 is implemented in a computer cluster 106 encompassed by a dashed line. Cluster 106 can be geographically collocated or spread out over several physical locations. For reasons of clarity, only the few parts of cluster 106 required to explain the invention are shown explicitly. It will be evident to a skilled artisan, however, that computer cluster 106 can also be implemented on various computer grids and other configurations well known in the art.
(17) Cluster 106 has a number of machines or computers typically referred to as nodes by those skilled in the art. Of all such nodes, which may number in the hundreds or even thousands, only three, namely nodes 108A, 108B, 108Q are expressly shown. In this example, nodes 108A, 108B, 108Q are all provisioned with computing or processing resources 110A, 110B, 110Q. These may include central processing units (CPUs), graphical processing units (GPUs) and any generally acceptable dedicated or generic processor.
(18) Nodes 108A, 108B, 108Q are provisioned with different types of storage resources 112A, 112B and 112Q. Resources 112A are embodied by any local storage hardware capable of storing files generally designated by reference F in any suitable format including preferably a file system 114A. Resources 112B are embodied by a local hard disk array that can also store files F, in either the same or a different file system. Preferably, in fact, file system 114A is a distributed file system that is stored and managed across cluster 106, thus including node 108B and its storage resources 112B.
(19) The embodiment in
(20) Meanwhile, resources 112Q are heterogeneous and thus include all types of suitable hardware including flash storage drives, disk drives including redundant arrays such as RAID and optical storage resources. There is no limitation on the types of storage devices, other then they should be partitionable into blocks. Thus, resources 112Q are also capable of storing files F distributed over any number of storage blocks belonging to their block-storage devices. Further, resources 112Q are also capable of storing files F belonging to distributed file system 114A.
(21) The nodes of cluster 106, including nodes 108A, 108B, 108Q are interconnected by a corresponding network of interconnections 116. In many situations, interconnections 116 are embodied by a local area network LAN and include any special connections, such as heartbeat lines, etc. Furthermore, when cluster 106 is geographically spread out, interconnections 116 include the requisite intra- and inter-cluster communication fabric including any suitable wide area network lines (WAN) or dedicated pipes.
(22) In accordance with a preferred embodiment of the invention under the semi-trusted client threat model, computer system 100 deploys a key manager 118 for generating and handling user keys KU. Key manager 118 can be a separate unit, a module outside cluster 106 or it can be included in or as part of cluster 106. In the embodiment shown, key manager 118 resides outside cluster 106 and is connected to it via connection 120.
(23) Computer system 100 is also equipped with a policy engine 122. Engine 122 is dedicated to the task of authenticating authenticable users U. More precisely, engine 122 is to perform an authentication step preceding the release of user keys KU from key manager 118. For that reason, in some embodiments engine 122 and key manager 118 can be merged into a single module as a unified service rather than separate services. In fact, such joint key manager and policy engine could even be included in cluster 106. A joint key manager could even be implemented on one of the cluster's nodes, potentially including the master node (not explicitly shown) in charge of administration of cluster 106. On the other hand, in situations where such a merger could compromise security, engine 122 and key manager 118 are kept separate.
(24) In the present embodiment, engine 122 is a stand-alone unit outside of cluster 106 and separate from key manager 118. In order to interface with cluster 106 and with key manager 118, engine 122 is provided with a suitable communication connection 124 to cluster 106, as shown. Clearly, connection 124, just like connection 120, can be made via any suitable wireless or wired communication medium.
(25) The operation of computer system 100 will now be described in reference to the high-level diagram of
(26) In the preferred embodiment of the invention, per-block keys KB as well as user keys KU are symmetric. The method of securing a plaintext file F in file system 114A will be best understood by initially referring to the handling of just one very specific plaintext file F.sub.p,k. This handling is appropriate for unencrypted distributed file system.
(27) As remarked above, file F.sub.p,k belongs to distributed file system 114A. Its encrypted form F.sub.c,k is distributed over blocks C within the designated area of the hard disk belonging to hard disk array 112B. The first portion of the file subscript, “p” or “k”, refers to whether the file is plaintext or ciphertext. The second portion of the file subscript, “k”, refers to the actual file. In the present case “k” indicates the k-th file from among files F present in file system 114A.
(28) Turning our attention to
(29) For better visualization and for purposes of explanation, unencrypted space 130 that holds plaintext files is shown left of a dashed line 132. Meanwhile, an encrypted space 134 where encrypted files are found is located to the right of dashed line 132.
(30) As shown in
(31) Each one of blocks M.sub.1, M.sub.2, . . . , M.sub.n is encrypted using its per-block key KB.sub.1, KB.sub.2, . . . , KB.sub.n. In the case of first block M.sub.1 its per-block key KB.sub.1 is applied to the contents of block M.sub.1 to perform the encryption. The same is done with the remaining blocks M using their respective per-block keys KB.
(32) The encryption step is expressly visualized in
C.sub.i=E.sub.KB(M.sub.i), (Eq. 1)
where the fact that E.sub.KB is operating on i-th block M.sub.i is indicated by the parentheses around block M.sub.i. Decryption is indicated by D.sub.KB. It is performed by just inverting the order of operation as follows:
M.sub.i=D.sub.KB(C.sub.i), (Eq. 2)
since per-block keys KB are symmetric.
(33) The encryption E.sub.KB in accordance with Eq. 1 is applied to all blocks M.sub.1, M.sub.2, . . . , M.sub.n. This results in the encryption of entire k-th plaintext file F.sub.p,k to produce the corresponding k-th encrypted or ciphertext file F.sub.c,k. Again, remaining plaintext files F.sub.p in file system 114A are treated in a similar fashion to obtain their correspondent ciphertext files F.sub.c.
(34) As a visualization aid,
(35) It should be noted that the encryption and decryption steps take place on the client device 102. These steps are precipitated by the actions of user U.sub.x (see
(36) In accordance with the invention, securing of a plaintext file F.sub.p, as demonstrated on the example of k-th plaintext file F.sub.p,k converted to k-th ciphertext file F.sub.p,k, involves the additional step of encrypting each per-block key KB.sub.1, KB.sub.2, . . . , KB.sub.n. In other words, each one of per-block keys KB.sub.1, KB.sub.2, . . . , KB.sub.n, which was used in the encryption of corresponding blocks M.sub.1, M.sub.2, . . . , M.sub.n to thus obtain encrypted blocks C.sub.1, C.sub.2, . . . , C.sub.n and convert plaintext file F.sub.p,k to ciphertext file F.sub.p,k, is itself separately encrypted. The encryption of per-block keys KB that were used to generate encrypted blocks C is performed with the user key KU. In other words, the encryption of per-block keys KB provided for by the present invention is user-specific.
(37) In general, there may be more than one user key KU for any given block M of any file F. Therefore, any block key KB may be encrypted with different user key KU. This will generate several wrapped block keys KB, each wrapped key encrypted with a different user key KU. This type of approach allows access to the same block M by different users U or groups of users that use different user keys.
(38)
(39) In
(40) The application of the key-wrapping step yields one wrapped key CK.sub.i for each of the encrypted blocks C.sub.i. Wrapped keys CK thus obtained, are placed in headers HC of corresponding encrypted blocks C. Therefore, wrapped key CK.sub.i is placed in header HC.sub.i of encrypted block C.sub.i, as indicated by arrow 140. Advantageously, the introduction of wrapped keys CK introduces a new level of indirection to ciphertext file F.sub.c,k that is appropriate for the semi-trusted client threat model.
(41) Computer system 100 implements the above-described method to secure all files F.sub.p in distributed file system 114A on storage resources 112A, 112B, 112Q and any other resources not shown in
(42)
(43) Before proceeding, it should be noted that in many practical situations actual ciphertext blocks CK.sub.1, CK.sub.2, . . . , CK.sub.n will not be sequential or have any prescribed standoff. They may not even be located on the same storage resources. What is required is that ciphertext files F.sub.c and their ciphertext blocks C secured according to the method of the invention be indexed in file system 114A so as to be accessible upon request from users U.
(44) We now return to our specific user U.sub.x operating with untrusted client device embodied by laptop computer 102. User U.sub.x makes a connection with cluster 106 in which a part of computer system 100 is implemented. The contact is made via network connection 104 over medium 104′. In a preferred embodiment, network connection 104 is not a simple connection. Instead, it is a secure and mutually authenticated connection 142. In other words, both laptop computer 102 and policy engine 122 establish mutually authenticated connection 142.
(45) The mutually authenticated connection 142 is desirable for communications between client device 102 and key manager 118. Similarly, the security afforded by mutually authenticated connection 142 is desirable for communications between client device 118 and policy engine 122 itself. In fact, communication with any nodes of cluster 106 may also be within the context of mutually authenticated connection 142. Note, however, that the only secure connections needed are between user's device 102 and key manager 118, and between key manager 118 and policy engine 122. This is true even under circumstances where engine 122 and key manager 118 are integrated into a single module, although in this case connection 142 need in principle only extend to that single module.
(46) The step of authenticating authenticable user U.sub.x is important. Doing so ensures, that despite the fact that client device 102 is untrusted, user U.sub.x is at least authenticated. Any suitable mutual authentication procedure known to those skilled in the art can be recruited for the purpose of establishing mutually authenticated connection 142. For example, connection 142 can be a secure connection such as a Transport Layer Security (TLS) connection with the client authenticated by password, certificate or Kerberos token. Irrespective of the actual processes and services invoked in establishing connection 142, however, it is important that it be protected from modification/tampering/adulteration.
(47) In the present embodiment, it is the policy engine 122 that actually records user's U.sub.x permissions within file system 114A. In other words, engine 122 keeps track of which plaintext files F.sub.p were secured according to the invention in authorized sessions of user U.sub.x and computer system 100. Therefore, engine 122 has a record of which encrypted files F.sub.c can be legitimately requested by user U.sub.x.
(48) In the present embodiment the connection between key manager 118 and engine 122 is also a secure connection. In other words, the path connecting them via connections 120, 124, and interconnections 116 (e.g., the LAN of cluster 106) is secure.
(49) When key manager 118 gets a request from user U.sub.x it queries engine 122 for authentication and access information. If engine 122 approves user U.sub.x, then key manager 118 releases the corresponding user key KU.sub.x.
(50) Since key manger 118 that releases user key KU.sub.x to user U.sub.x is separate from engine 122 in the present embodiment a token-based approach is advantageous to ensure approved key release. Such approach is mostly easily implemented by introducing a token 144 that user U.sub.x can obtain from engine 122 upon authentication.
(51) Key manager 118 can just send user key KU.sub.x directly to user U.sub.x if connection 142 is also encrypted. If connection 142 is not encrypted, then additional safety measures such as key wraps in key exchange keys should be deployed, as discussed in more detail below.
(52) Upon verification of token 144, user key KU.sub.x is released to user U.sub.x from key manager 118. The step of releasing user key KU.sub.x is performed after receiving a request from user U.sub.x for ciphertext file F.sub.c.
(53) As mentioned above, if secure mutually authenticated connection 142 is not used, it is desirable that user key KU.sub.x, when sent to user U.sub.x upon their specific request for ciphertext file F.sub.c,k, be transmitted wrapped in a key exchange key 146. Key exchange key 146 can be any suitable exchange protocol. Such strategies are based on previously negotiated parameters between device 102 and key manager 118. Suitable processes are well known to those skilled in the art.
(54) Once in possession of their user key KU.sub.x, user U.sub.x can decode the desired ciphertext file F.sub.c,k stored in file system 114A. Recall that upon encryption with per-block keys KB.sub.1, KB.sub.2, . . . , KB.sub.n ciphertext file F.sub.c,k was further secured by encrypting per-block keys KB.sub.1, KB.sub.2, . . . , KB.sub.n with user key KU.sub.x. The resulting wrapped keys CK.sub.1, CK.sub.2, . . . , CK.sub.n were then placed in headers HC.sub.1, HC.sub.2, . . . , HC.sub.n. Since user U.sub.x is now in possession of user key KU.sub.x that was used to generate wrapped keys CK.sub.1, CK.sub.2, . . . , CK.sub.n, he can decrypt per-block keys KB.sub.1, KB.sub.2, . . . , KB.sub.n from wrapped keys CK.sub.1, CK.sub.2, . . . , CK.sub.n with user key KU.sub.x. With the decrypted per-block keys KB.sub.1, KB.sub.2, . . . , KB.sub.n, user U.sub.x can now verify the integrity of cipher blocks C.sub.1, C.sub.2, . . . , C.sub.n and decrypt ciphertext file F.sub.c,k by applying the operation of Eq. 2 (also see arrow 138 in
(55) There are thus four steps for accessing any ciphertext file F.sub.c in distributed file system 114A. During the first step, user U.sub.x retrieves blocks C that contain the file of interest from file system 114A onto user's device 102. Then user U.sub.x is authenticated and obtains their user key(s) KU. Upon receipt, user U.sub.x deploys their user key(s) KU to decrypt wrapped key(s) CK, thus obtaining per-block key(s) KB. Finally, user U.sub.x decrypts blocks C of ciphertext file F.sub.c by deploying per-block keys KB to obtain decrypted, plaintext file F.sub.p.
(56) Computer system 100 and the method of the invention offer an efficient way to secure distributed file system 114A of cluster 106. In fact, system 100 and the method are compatible with cluster 106 whether the latter is embodied by a regular cluster or a high performance and high availability cluster. In other words, the system and method are compatible with high-performance implementations where file system 112A is available for processing on multiple nodes 108 within cluster 106 (cluster computing) and simultaneously available to many users U accessing cluster 106 via many untrusted client devices 102.
(57) The two main reasons for this compatibility are the use of symmetric keys and the encoding of per-block keys KB with user keys KU. Since all keys are symmetric, they are inherently fast and efficient in securing files. Additionally, since per-block keys KB can be encoded with user keys KU of different users independently, the user load does not tend to affect the present system and method. Differently put, using the additional level of indirection in accordance with the invention, means that expanding the key pool with additional user keys KU only requires that per-block keys be encrypted in the added user keys rather than forcing encryption of an entire block in the added user key KU. As a result, the present system and method can be used to encrypt data files in a way that cryptographically enforces data access permissions yet does not greatly impact performance or usability. These characteristics allow for fast data analysis on nodes 108 of cluster 106.
(58) Although the invention can be practiced in many contexts, it is preferably implemented in a file system that is a distributed file system (DFS) with distributed storage resources. The embodiment described in reference to
(59) Some encrypted and distributed file systems cannot be easily deployed, as they do not meet certain requirements and are not designed for handling “big data” cluster computing. Even in the case of suitable systems, such as HDFS some modifications are necessary. For example, in the case of HDFS the requirement of confidentiality is not met and hence encryption has to be employed, as already mentioned above. With sufficient modifications however, as will be appreciated by those skilled in the art, almost any distributed file system and even non-distributed file systems can deploy the system and method of the invention. Many additional advantages of the system and method of the invention will now be elucidated in conjunction with the next embodiment.
(60)
(61) As in the prior embodiment, specific user U.sub.x connects to cluster 202 via network 104. This time, however, untrusted client device 204 is embodied by a mobile phone. Phone 204 uses wireless medium 104′ to make network connection 104 and gain access to a distributed file system 206 on cluster 202. Distributed file system 206 contains many ciphertext files F.sub.c. File system 206 is using the file securing methods of the invention already described above in encrypting ciphertext F.sub.c files from plaintext files F.sub.p.
(62) For reasons of clarity, only node 108B with its storage resources 112B is shown explicitly in
(63) Computer system 200 has a module 208 that integrates key manager 118 with policy engine 122. In some embodiments, module 208 can be embodied by corresponding hardware and software resources of a slave or a master node of computer cluster 202.
(64) Upon establishment of secure and mutually authenticated connection between user U.sub.x and computer system 200 in cluster 202, user U.sub.x requests access to ciphertext file F.sub.c,j. This is performed in accordance with the description provided above, namely by deploying user key KU.sub.x to decode per-block key BK.sub.1 from wrapped key CK.sub.j. Then, decrypted per-block key BK.sub.1 is employed to decode ciphertext block C.sub.r containing ciphertext file F.sub.c,j. Upon completion of the decryption process user U.sub.x is in possession of decrypted plaintext file F.sub.p,j.
(65) At this point, user U.sub.x desires to write a new block by adding data to plaintext file F.sub.p,j. To write this new block, user U.sub.x sends a write request 210. Write request 210 identifies the location of the intended block to be written to policy engine 122 in module 208. Engine 122 looks up user U.sub.x, the block location and the file/block permissions in its policy database to determine the permissions associated with user key KU.sub.x.
(66) If cleared, the code on user's device 204 generates a block key KB.sub.s for encrypting the added data in new block C.sub.s in accordance with the above-described procedures. Note that in this example data is being appended in new block C.sub.s rather than being overwritten in already existing block C.sub.r.
(67)
(68) In accordance with an additional security aspect implemented in the present embodiment of the invention, user key IDs are deployed to identify which user key has been used to wrap the block key. This allows for multiple user keys per user and/or for user keys that are shared between users. To this end, each block containing a ciphertext file F.sub.c belonging to distributed file system 206 carries, preferably in its header, user key IDs (UKIs) for users that are allowed access. The UKIs are used by policy engine 122 in granting users access to keys in key manager 118.
(69) Returning to our example, user U.sub.x has just submitted read request 212 for ciphertext file F.sub.c,j in blocks C.sub.r and C.sub.s. Hence, user key IDs (UKIs) for these two blocks, namely UKI-C.sub.r and UKI-C.sub.s need to be collected. In particular, user key IDs UKI-C.sub.r, UKI-C.sub.s are collected and submitted to policy engine 122 in module 208 as shown by dashed arrows D.sub.r, D.sub.s. Of course, in this collection process user key IDs UKI-C.sub.r, UKI-C.sub.s are actually remitted to engine 122 via interconnections 116 of cluster 202.
(70) Engine 122 decides, based on identity and authentication of user U.sub.x, if client device 204 that user U.sub.x is employing is allowed access to any user keys KU, as identified by user key IDs UKI-C. If it is, then engine 122 can allow user U.sub.x access to user keys KU.
(71) In the present case, user U.sub.x has not been suspended, disqualified or even removed since writing file F.sub.c,j in blocks C.sub.r and C.sub.s. Therefore, engine 122 identifies the user keys from key IDs UKI-C.sub.r, UKI-C.sub.s and then determines if user U.sub.x has retained their authorization to use the identified user keys KU.sub.x. If so, then engine 122 sends the corresponding release to key manager 118 for user keys KU.sub.x. User keys KU.sub.x are then returned to user U.sub.x, who can now use them to read and perform any other authorized actions to file F.sub.c,j.
(72) A person skilled in the art will recognize at this point that the central aspects of the invention can be implemented in many ways. First and foremost, it is clear that there can be more than one user key KU per user U. Furthermore, user keys KU can be shared between groups of users U. Using the level of indirection provided in the present invention also means that adding additional user keys KU only requires that the block key KB be encrypted in the added user key KU rather than encrypting the entire block in the added user key, as would have been typical in prior art systems.
(73) In practical implementations almost any particular user U will be a member of a group of authenticable users working on untrusted client devices. In those situations the user key KU can be shared among the group. In administering such situations, it is advantageous to introduce one or more permission zones that are defined by a mapping between the users and a set of permissions. The user key KU can then be shared with the zone or zones based on the established mapping. Establishment of such mappings is well within the capabilities of skilled artisans.
(74) In the event of a compromised user key KU, the affected key is revoked from user U (or users). This means that key KU can no longer be used by that user (or users). This process does not force any re-encryption of the files in the distributed file system or any other file system in which the invention is practiced. Of course, this is due to the fact that the files are encoded in the per-block keys BK, which are not compromised together with the user key(s). Indeed, deployment of the methods of invention in a stackable or layered file system where there is isolation of the encryption functionality from the details of the physical file system is thus very advantageous. In this way, the encryption layer can be reused for many physical file systems.
(75) The present “layered approach” to security under the semi-trusted client model is particularly well-adapted to modern mobile environments. In fact, the computers system of the invention supports applications where users access the file system from many mobile and stationary devices at different times and from different locations. Thus, the untrusted client device can be any mobile user device that may not be the user's permanent or even preferred device. In general, the untrusted client device can be a mobile phone, a mobile computer, a tablet computer and any one of a large and growing number of thin client devices that include sensor-based computing units on the Internet of things.
(76) It is also noted that breaking up the storage units into segments other than blocks may be practicable in some systems. For example, depending on file sizes and types, a per-file approach can be implemented.
(77) Now we will discuss a set of related embodiments of the instant invention that utilize such a per-file approach in detail. For ease of explanation, and as practicable, we will continue to use the same terminology to refer to the various modules and their functions as before.
(78) The per-file approach utilizes a unique file key to encrypt each plaintext file. To understand this approach let us first consider the embodiment 400 shown in
(79) Further, each file key FK is wrapped/encrypted using a wrapping key WK. Wrapping key WK is stored in key manager 418. In the present embodiments, key manager 418 does not generate keys, but rather it only stores wrapping keys that are used to wrap individual file keys FK.sub.k corresponding to each file F.sub.p,k. However, in a variation, key manager 418 can also generate keys in addition to storing them. As with earlier embodiments, it is understood for this embodiments, that user U.sub.x is one of many (dozens, hundreds or thousands or more) users of system 400 of
(80) In order to access distributed file system 406 of the present embodiments, a compatibility or “shim” layer 405 is provided above the Application Programming Interface (API) of distributed file system 406. Those skilled in the art will understand that file system API consists of various types of file system requests/commands that may be issued by a client. Some exemplary file system requests operable on files in file system 406 would include read, write, update, create, delete, etc. It will also be apparent to those skilled in the art, that in practice shim layer 405 will first interface with the client-side portion of file system API which in turn will interact with the corresponding server-side file system API of file system 406. However, for clarity in the illustrations and the below explanation, we will omit these obvious details.
(81) Shim layer 405 is responsible for intercepting and servicing all file system requests generated by user U.sub.x on client 402. The general workings and mechanism behind such a ‘compatibility’ or shim layer will be familiar to those skilled in the art. Shim 405 would also be used by any standard command line programs that access file system 406, so that they would work without requiring any modifications to them.
(82) Policy engine 422 governs as to which parts of file system 406 are to be encrypted. It houses this information in a security or configuration policy. The configuration/security policy further contains configuration information that determines whether a wrapping key WK applies to a single file, or all the files in its directory, or all the files in a directory tree. Because of the isolation between user U.sub.x and his/her access to file system 406 via shim 405, afforded by the wrapping keys, it is possible in the present embodiments to share a wrapping WK amongst several files, directories or directory trees. This will further become apparent by the operational details of the system explained below.
(83) The policy further includes the key rotation time periods applicable to various parts/sections of file system 406 governed by the encryption regime. These time periods dictate as to how often the wrapping keys and file keys for various sections of file system 406 that are encrypted, need to be replaced.
(84) According to the present embodiments, each block of a plaintext file F.sub.p is encrypted with the same file key FK. However, as each block is encrypted, the initialization vector (IV) that is used to seed the file key FK is changed based on the block ID of the block being encrypted.
(85) Now let us see how an authenticable user U.sub.x of our semi-trusted authentication model writes/creates/updates a plaintext file F.sub.p according to the present embodiments. As a first step, user U.sub.x is authenticated by policy engine 422, preferably using a standard authentication protocol such as Kerberos. More specifically, shim 405 which is also referred to in
(86) Only after user U.sub.x is properly authenticated, he/she can then successfully issue any file system requests to underlying distributed file system 406. If user U.sub.x wishes to store a new file F.sub.p into file system 406, then policy engine 422 will generate a new file key FK for file F.sub.p. If it is a new file, then depending on the configuration of file system deployed in the configuration policy of policy engine 422, a wrapping key WK for file F.sub.p may already exist. In other words, an existing wrapping key WK may be applicable to file F.sub.p, because it is being shared by multiple files and/or directories as explained above. If, however, no such wrapping key WK is applicable to new file F.sub.p, then policy engine 422 generates a new wrapping key WK for file F.sub.p. If F.sub.p is an existing file, then WK would certainly already exist. In either case, WK would be stored in key manager 418. Policy engine 422 now queries key manager 418 for wrapping key WK, or in the case where it has generated a new WK, it then sends it the new WK and WK ID for storage.
(87) While in the below teachings and the associated illustrations it is assumed that policy engine 422 is responsible for generating keys, as already stated, this task can also be done by key manager 418 in alternative variations. Note further that in the following explanation, while referring to a plaintext file F.sub.p, it is understood that file F.sub.p is never stored in file system 406 as a plaintext file. It would only exist in file system 406 in its encrypted ciphertext form F.sub.c. Therefore, all references to a new or existing file F.sub.p and its metadata in file system 406 are understood to apply to its encrypted, ciphertext counterpart F.sub.c. In fact, we may use references F.sub.p and F.sub.c interchangeably, knowing that the file will always exist in its encrypted form F.sub.c in file system 406.
(88) Now, let us return to how specifically policy engine 422 queries and communicates with key manager 422 for wrapping key WK. If F.sub.p is an existing file, or more precisely if its encrypted, ciphertext counterpart F.sub.c is an existing file, then policy engine 422 retrieves the key ID of its wrapping key WK, i.e. WK ID, from its metadata. Before reading any metadata attribute, policy engine 422 first verifies the integrity of the metadata using a message authentication code (MAC) algorithm as will be further explained below. If MAC verification fails, an error is returned.
(89) On the other hand, if F.sub.p is a new file, or more precisely if its encrypted, ciphertext counterpart F.sub.c is a new file then policy engine 422 will read the WK ID of its wrapping key WK from the metadata of the parent directory or directory tree whose WK is applicable to F.sub.p. It then sends this WK ID to key manager 418 that in response sends the corresponding wrapping key WK to policy engine 422.
(90) If however, the configuration of file system 406 dictates that a new wrapping key WK be generated for the file, then engine 422 would generate the new wrapping key WK. In this case, it would then send the new WK and a corresponding WK ID to key manager 418 for storage and later retrieval. It would also save the new WK ID in file metadata for subsequent querying of key manager 418. In an alternative embodiment, policy engine 422 will only send the newly generated wrapping key WK to key manager 418. Key manager 418 will then assign a WK ID to the new WK and communicate that WK ID to engine 422 for saving in file metadata. In any case, the automatic generation of new file key FK and wrapping key WK is an important benefit of the present embodiments, affording a smooth and reliable operation of the system.
(91) If an existing wrapping key WK was used for file F.sub.p/F.sub.c per above, then policy engine 422 also reads the corresponding wrapped file key WFK from the metadata of the existing file or its directory or directory tree whose WK was used. It then unwraps WFK with WK obtained/generated above, to attain the corresponding file key FK. In the case of a new file F.sub.p/F.sub.c, policy engine 422 would generate a new FK as already explained above. In this case, it wraps the new file key FK with WK obtained/generated above, to attain the corresponding wrapped file key WFK. It then sends this WFK and FK to shim 405.
(92) Shim 405 now encrypts plaintext file F.sub.p at client device 402 with the above received file key FK. It then subsequently issues write file system requests to write encrypted file F.sub.c and its metadata into file system 406 as will be explained further below. As already discussed, among one of the attributes of the file metadata is wrapped file key WFK which shim 405 stores in file metadata. A flowchart 500 of the above exemplary algorithm of the invention is illustrated in
(93) Specifically, oval shape 502 refers to the start of the process with the issuance of the write/create/update file system request. Box 504 refers to the interception and servicing of the request by shim 405. Boxes 506, 508, 510 and decision diamond 512 cover the authentication of user U.sub.x by policy engine 422 per above explanation. If authentication is successful, box 514, decision diamonds 516 and 518 cover MAC verification of the metadata and reading of the metadata by policy engine 422 and subsequent authorization. If authorization is successful, decision diamond 520 and box 522 cover the new file (create) scenario. Decision diamond 524 and box 526 cover the determination of whether a new wrapping key WK is needed per above teachings.
(94) Boxes 528, 530 and 532 cover reading of wrapped file key WFK from metadata and obtaining WK from key manager 418. Box 534 covers for existing file scenario (write/update) unwrapping of existing wrapped file key WFK with wrapping key WK to obtain corresponding file key FK, and for new file scenario (create) wrapping of new file key FK to generate wrapped file key WFK. Box 536 covers transmission of FK and WFK to shim 405. Finally, oval shape 538 covers encryption of the file by shim 405 and subsequent writing into its metadata per above explanation.
(95) In the present embodiments, since each file is encrypted using a single file key FK, additional measures are taken to ensure the security of the files in the file system. Specifically, the initialization vector (IV) for file key FK is varied for each block of file F.sub.p. More precisely, as each block of file F.sub.p is encrypted, the initialization vector (IV) of file key FK is changed based on the block ID of the block encrypted. Preferably, the IV for each block of file key FK is just the block ID of the block being encrypted.
(96) Such a scheme ensures that FK is constantly evolving as file F.sub.p is encrypted, block by block. Furthermore, since IV of FK is based on block ID that means that it is unnecessary to store the IV in the file metadata. If however, a block in the file is ever overwritten or truncated, such as by a seek and a write operation, then the entire block is re-encrypted. In this case, since re-using the same IV for the block would be insecure, a new IV for the overwritten block is randomly generated, the block is re-encrypted with the FK using the new IV, and the new IV is stored in the file metadata.
(97) Preferably, file is encrypted block by block using the Advanced Encryption Standard (AES) in Galois/Counter Mode (GCM) mode. The advantages of such a GCM mode of symmetric key cryptographic block ciphers are high efficiency and performance. The encryption of each block M.sub.i of file F.sub.p by shim 405 produces a corresponding ciphertext block C.sub.i and an authentication Tag T.sub.i. These authentication tags are then stored in the file metadata. As each block M.sub.i of plaintext file F.sub.p is encrypted, resulting ciphertext block C.sub.i is written to ciphertext file F.sub.c and tag T.sub.i is written into the metadata of file F.sub.c. Once again the reader is reminded that since plaintext file F.sub.p is always stored in file system 406 in its encrypted ciphertext form F.sub.c, its metadata can be referred to as belonging to file F.sub.c or equivalently F.sub.p.
(98) The key advantage of writing tags T.sub.i to encrypted file F.sub.c's metadata is that during a read operation (see further below), the integrity of each encrypted block C.sub.i can be verified using tag T.sub.i. Those familiar with the GCM mode of symmetric key cryptography will understand the mechanisms involved in verifying the integrity of encrypted ciphertext block C.sub.i using the GHASH function and the corresponding authentication tag T.sub.i. These mechanisms are well published and understood and will not be delved into detail here. Suffice it to say, that given a plaintext block M.sub.i, a corresponding ciphertext block C.sub.i and an authentication tag T.sub.i, a GCM implementation will able to verify the integrity of ciphertext block C.sub.i to ensure that it has not been in any way modified/adulterated to compromise the production of the original plaintext block M.sub.i after decryption.
(99) Before proceeding to explain the behavior of a read operation of an encrypted file F.sub.c, let us take a detailed look at the contents of the file metadata. In the preferred embodiment, file system 406 is a Hadoop Distributed File System (HDFS). Preferably, the file metadata is stored in the POSIX-compliant extended attributes of HDFS. Alternately, the file metadata may also be stored or appended to other parts of the file, or alternatively still other implementations of extended attributes may be pursued. The number of such design choices are many as will be appreciated by skilled artisans.
(100) According to the present embodiments, the metadata of encrypted file F.sub.c includes the following attributes. An associated explanation is also provided for each attribute: 1. Authentication tags T.sub.i for encrypted blocks C.sub.i of the file: As already explained above, an authentication tag T.sub.i is produced during the encryption of each plaintext block M.sub.i by shim 405 along with ciphertext block C.sub.i. Tag T.sub.i is then stored by shim 405 in file's metadata, while ciphertext block C.sub.i is stored as a part of the contents of ciphertext file F.sub.c. During decryption, as detailed under read operation below, shim 405 checks the integrity of each ciphertext block C.sub.i based on its corresponding tag T.sub.i read from file's metadata. The block is then decrypted once its integrity has been verified. 2. A map/list of block ID's of blocks of the file that were modified/adulterated and the corresponding Initialization Vectors (VI's): Recall that an IV only need be stored in file metadata if it was randomly generated after a modification/adulteration of the corresponding ciphertext block. In this case the block was re-encrypted by the newly generated IV and the IV was then stored in the metadata. 3. Access Control List (ACL): An ACL governs access to the file such as which user groups the file belongs to, and which users have what type of privileges (read, write, update, delete, etc.) on the file. An ACL is checked by policy engine 422 to determine if user U.sub.x after his/her authentication, has the necessary privileges to perform the desired operation on file F.sub.c. This step in the art is also referred to as authorization, distinct from authentication which verifies the credentials of user U.sub.x to be a bonafide user of system 400 of
(101) Now that we understand the contents of the metadata of ciphertext file F.sub.c, let us further understand how the present embodiments ensure the integrity of this metadata. According to the invention, file metadata is itself protected from tampering/adulteration or unauthorized modification by an adversary or a hacker. This is accomplished by the use of Message Authentication Code (MAC) for the protection of the metadata. Those skilled in the art will know that a MAC is a piece of information used to authenticate and verify a message. In other words, MAC is used to confirm that the message came from the stated sender (its authenticity) and has not been changed in transit (its integrity). A MAC algorithm accepts as input a secret key and an arbitrary-length message to be authenticated, and outputs a MAC (sometimes also known as a tag). The MAC or tag protects both a message's data integrity as well as its authenticity, by allowing verifiers (who also possess the secret key) to detect any changes to the message content.
(102) According to the invention, policy engine 422 uses MAC algorithm to generate a corresponding MAC for all metadata contents 1-6 above and that MAC is also stored into the metadata of file F.sub.c. Preferably, the secret key of the MAC algorithm used, is based on FK. Preferably, the hash function used in the MAC algorithm is Secure Hash Algorithm 2 (SHA-2). In an alternative variation, policy engine 422 produces a MAC value for each individual field 1-6 of metadata above, and stores these individual Hash-based MAC values into the metadata of file F.sub.c (along with the metadata fields 1-6).
(103) We are now ready to understand how a read operation is performed on file system 406, according to the present embodiments of the invention.
(104) Let us assume that user U.sub.x desires to read a file F.sub.c that is stored in secure distributed file system 406 in encrypted form as per above techniques. Recall that user U.sub.x accesses file system 406 via network 104 and through shim layer 405 (labeled as ZeeFS Shim) in
(105) If the authentication is successful, policy engine 422 then reads the metadata of file F.sub.c and verifies its integrity based on the stored MAC values. Based on the specific MAC algorithm implemented, policy engine 422 verifies using the stored MAC values in the metadata, whether the metadata attributes 1-6 above have been tampered with or not. If they are, an error is returned. If the integrity of file metadata is verified, then policy engine 422 reads the ACL and authorizes user U.sub.x for the intended (read) operation. If the authorization is unsuccessful an error is returned and the operation is usually terminated.
(106) If the authorization is successful, policy engine 422 reads WK ID from the metadata and queries key manager 418 for WK. Key manager 418 returns the corresponding WK. Policy engine 422 then decrypts/unwraps WFK read from the metadata with WK obtained from key manager 418, to obtain corresponding file key FK for encrypted ciphertext file F.sub.c. It then releases/transmits FK to shim 405.
(107) At this point, shim 405 is ready to decrypt ciphertext file F.sub.c. In doing so, it first verifies the integrity of each ciphertext block C.sub.i of file F.sub.c by reading the corresponding tag T.sub.i from the file's metadata (after verifying the integrity of metadata based on MAC as explained above). If the integrity of block C.sub.i is verified, shim 405 decrypts ciphertext block C.sub.i of file F.sub.c by FK to obtain the corresponding plaintext block M.sub.i of original plaintext file F.sub.p. If the integrity check fails, an error is returned. This way shim 405 decrypts entire ciphertext file F.sub.c to obtain the original plaintext file F.sub.p block by block. User U.sub.x on untrusted client device 402 can then read/access file F.sub.p to complete the read operation. The above operation is illustrated in an exemplary and simplified flowchart 600 in
(108) Specifically, the process starts with the issuance of the file system request as referenced in the oval shape 602. Boxes 604, 606, 608, 610 and decision diamond 612 cover authentication per above explanation. If authentication is successful, box 614, decision diamonds 616 and 618 cover MAC verification and authorization per above explanation. If authorization is successful, boxes 620, 622 and 624 cover reading WK ID from file metadata, querying key manager for wrapping key WK in exchange and unwrapping wrapped file key WFK read from metadata to produce file key FK. Box 626 covers release of file key FK to shim 405. Finally, oval shape 628 covers verification of ciphertext file F.sub.c's contents by shim 405 based on authentication tags T.sub.i and decryption of the file using file key FK.
(109) With the above provided operational details of system 400 of
(110) Specifically, a file deletion initiated from shim 405 will first trigger authentication and authorization by policy engine 422 as will be apparent by now. A success in those steps is followed by determining if the file's WK was only applicable to the file itself. If so policy engine 422 transmits its WK ID read from file's metadata to key manager 418 so that key manager 418 can remove the corresponding WK from storage. However, if the file to be deleted had a shared WK, then the last step is skipped. Subsequently, policy engine 422 removes the file and its metadata from file system 406 and sends an acknowledgement to shim 405 that the file has been deleted.
(111) It is also conceivable within the scope of the invention to have a simplified variation of file deletion. In such a variation, as before, when a file is deleted, its FK is also deleted. However, since the housekeeping for determining if the WK of the file is being shared by other files/directories may be costly, the WK is not deleted. Instead, when deemed appropriate, the administrator is able deliberately change the state of the WK to “retire”, instead of deleting it outright. In either variation, one reason for keeping older keys as retired instead of deleting them, is for decrypting a restored backup.
(112) A main advantage of the present embodiments of the invention is that data in-transit between the client (user U.sub.x on client device 402) and cluster 116 of file system 406, stays in encrypted form. Those skilled in the art will appreciate that a hallmark of a secure system is that the data should stay secure or encrypted both at-rest i.e. on the storage devices, as well as in-transit i.e. while being transferred between various nodes or modules of the system. It is easy to see that the present embodiments satisfy these both security criteria. Furthermore, wrapping key WK is never revealed to the client. So, the compromise of one file key FK can never jeopardize the security of more than one file in the system.
(113) As with earlier embodiments, it is preferable for the present embodiments that connections 104′, 124, 120 between the untrusted client device 402, shim 405, policy engine 422 as well as key manager 418 be secure and mutually authenticated connections. That is at least because, and as explained above, shim 404 communicates Kerberos token to policy engine 422 and which then communicates file key FK to shim 405. Similarly, key manager 418 communicates wrapping key WK to policy engine 422. In the absence of a secure connection for the transmission of the above keys, a key exchange protocol may need to be utilized. Those skilled in the art will understand the workings and requirements for implementing such a secure key exchange mechanism.
(114) As will be apparent by now that when policy engine 422 needs a FK, it reads the file metadata after proper authentication, authorization and MAC verification of the metadata. It then requests the WK from key manager 418, by querying it with the WK ID read from the metadata. Although not required, having key manager 418 be a discreet component allows the use of commercial off the shelf key managers, such as a Key Management Interoperability Protocol (KMIP) server e.g. IBM's Distributed Key Management System (DKMS), HP's Enterprise Security Key Manage (ESKM), or Amazon's Key Management Service (KMSM), etc. As an additional safeguard typically expected in a high-grade security environment such as the one supported by the instant invention, the keys can be further secured in a hardware security module (HSM).
(115) When files are created, a FK is automatically generated and wrapped in a WK by the policy engine. When a file is moved or copied from another part of the file system, if it is required, the policy engine will re-wrap the FK in the WK appropriate for the destination. This allows move and copy operations to be supported with no special action by the user. By deploying the configuration file of the policy engine, as explained earlier, encryption can be enabled or disabled in various parts of the file system, or the keying policy changed, while the distributed file system is running and being used.
(116) As already explained, the administrator can define which parts of the file system to encrypt, and which keying policy to apply (unique wrapping key per file, per directory, per directory tree). The policy also defines the key rotation period for each section of the file system. Preferably, the policy engine, and the shim, is deployed on all or selected nodes of a Hadoop cluster. These nodes are preferably the data-nodes of Hadoop. Each client has a secure, authenticated connection to the policy engines. An exemplary topology representing the above described embodiment 700 is shown in
(117) Preferably, the policy is cryptographically signed by a public/private key pair registered to the master policy server.
(118) In the embodiment shown in
(119) The details of public key cryptography will be well understood by skilled artisans.
(120) In view of the above teaching, a person skilled in the art will recognize that the invention can be embodied in many different ways in addition to those described without departing from the spirit of the invention. Therefore, the scope of the invention should be judged in view of the appended claims and their legal equivalents.