Claims
- 1. A method for protecting files on a storage system, comprising:
assigning a read key to a file in response to a creation of said file; assigning a write key to said file; encrypting said file with said write key; and restricting access to said file by distributing said read key to a first plurality of users and distributing said write key to a second plurality of users.
- 2. The method according to claim 1, further comprising
discarding said write key in response to a concern of security; encrypting said read key with a long-term key; and storing said encrypted file and encrypted read key.
- 3. The method according to claim 2, wherein said storage of said encrypted file and encrypted read key is in a central location.
- 4. The method according to claim 2, wherein said storage of said encrypted file and encrypted read key is in a local location.
- 5. The method according to claim 1, further comprising:
requesting access to encrypted file; accessing a complementary long-lived key to said long-lived key; decrypting said encrypted read key with said complementary long-lived key and modifying said un-encrypted file.
- 6. The method according to claim 5, further comprising:
generating another read-write key pair for said modified un-encrypted fragment of said file; encrypting said modified un-encrypted said file with a write key of said another read-write key pair; encrypting a read key of said another read-write key pair; and storing said encrypted modified file and said encrypted read key of said another read-write key pair.
- 7. The method according to claim 1, wherein said file is a file fragment of a plurality of file fragments.
- 8. The method according to claim 7, wherein said read key being a plurality of read keys, each read key being assigned a corresponding file fragment of said plurality of file fragments.
- 9. The method according to claim 7, wherein said write key being a plurality of write keys, each write key being assigned a corresponding file fragment of said plurality of file fragments.
- 10. The method according to claim 7, wherein said read key and said write key being an asymmetric key pair.
- 11. A method for ensuring data privacy, comprising:
dividing a file into a plurality of fragments; generating a set of read-write keys for each fragment of said plurality of fragments; encrypting each fragment of plurality of fragments with respective write key of said set of read-write keys; and restricting access to said plurality of file fragments by distributing a plurality of read keys from said plurality of read-write keys to a first plurality of users and distributing a plurality of said write keys of said plurality of read-write keys to a second plurality of users.
- 12. The method according to claim 11, further comprising:
requesting access to one encrypted fragment of said plurality of encrypted fragments of said file; accessing a complementary long-lived key to said long-lived key; decrypting said encrypted read key with said complementary long-lived key; and modifying un-encrypted fragment of said file.
- 13. The method according to claim 11, further comprising:
generating another read-write key pair for said modified un-encrypted fragment of said file; encrypting said modified un-encrypted fragment of said file with a write key of said another read-write key pair; encrypting a read key of said another read-write key pair; and storing said encrypted modified file and said encrypted read key of said another read-write key pair.
- 14. The method according to claim 13, further comprising:
discarding said plurality of write keys of said plurality of read-write keys in response to a concern of security; encrypting said plurality of read keys of said plurality of read-write keys with a long-term key; and storing said encrypted plurality of fragments and encrypted plurality of read keys.
- 15. The method according to claim 14, wherein said storage of said encrypted plurality of fragments and encrypted plurality of read keys is in a central location.
- 16. The method according to claim 14, wherein said storage of said encrypted plurality of fragments and encrypted plurality of read keys is in a local location.
- 17. A method of increasing security and efficiency in a distributed file system, said method comprising:
specifying a fragment size; fragmenting said file according to said fragment size into at least one fragment in response to a creation of a file; encrypting said at least one fragment with a write key of an asymmetric read/write key pair; encrypting a read key of said asymmetric read/write key pair with a long-lived key; and storing said encrypted at least one fragment and said encrypted read key.
- 18. The method according to claim 17, further comprising:
receiving a request for access to said encrypted at least one fragment; authorizing said request; and providing a complementary long-lived key to said long-lived key to decrypt said encrypted read key.
- 19. The method according to claim 19, further comprising:
requesting access to said encrypted at least one fragment; decrypting said encrypted read key with a complementary long-lived key to said long-lived key; and re-encrypting said read key with a long-lived key of a user.
- 20. The method according to claim 19, further comprising:
decrypting said re-encrypted read key with a complementary long-lived key of said user; and decrypting said encrypted at least one fragment with said read key.
- 21. The method according to claim 17, further comprising:
receiving access to said encrypted at least one fragment; decrypting said encrypted read key with a complementary long-lived key to said long-lived key; decrypting said encrypted at least one fragment with said read key; and modifying said at least one fragment.
- 22. The method according to claim 21, further comprising:
generating another asymmetric read-write key pair; encrypting modified said at least one fragment with a write key of said another asymmetric read-write key pair; and encrypting said read key of said another asymmetric read-write key pair with said long-lived key.
- 23. A system for ensuring data privacy, comprising:
a file system; a user station; and a security module configured to be executable in said user station, wherein said security module is configured to assign a read key to a file in response to a creation of said file, is also configured to assign a write key to said file, is further configured to encrypt said file with said write key, and is yet further configured to restricting access to said file by distributing said read key to a first plurality of users and distributing said write key to a second plurality of users.
- 24. The system according to claim 23, wherein said security module comprises:
a key generation module to generate said asymmetric read-write key pair; an encryption/decryption module configured to encrypt said read key with said long-lived key; and an authentication module configured to grant access to said encrypted fragment stored on said file system.
- 25. The system according to claim 23, wherein said file system comprises:
a file controller module configured to provide access to said encrypted fragment; at least one disk drive configured to provide storage of said encrypted fragment; and a fragmenter module configured to provide a fragment size to said security module.
- 26. The system according to claim 23, further comprising:
a network configured to provide a communication channel between said user station and said file system.
- 27. The system according to claim 23, further comprising:
a key distribution center configured to provide storage and distribution of a complementary long-lived key to said long-lived key.
RELATED APPLICATIONS
[0001] The following commonly assigned applications, filed concurrently, may contain some common disclosure and may relate to the present invention. Thus, the following applications are hereby incorporated by reference:
[0002] U.S. patent application Ser. No. 09/______, entitled “SYSTEM FOR ENABLING LAZY-REVOCATION THROUGH RECURSIVE KEY GENERATION” (Attorney Docket No. 10017428-1);
[0003] U.S. patent application Serial No. 09/______, entitled “SYSTEM FOR ENCRYPTED FILE STORAGE OPTIMIZATION VIA DIFFERENTIATED KEY SIZES” (Attorney Docket No. 10017431-1); and
[0004] U.S. patent application Ser. No. 09/______, entitled “SYSTEM FOR OPTIMIZED KEY MANAGEMENT WITH FILE GROUPS” (Attorney Docket No. 10017430-1).