



Encrypted But Searchable Online Storage? 266
An anonymous reader asks "Is there a solution for online storage of encrypted data providing encrypted search and similar functions over the encrypted data? Is there an API/software/solution or even some online storage company providing this? I don't like Google understanding all my unencrypted data, but I like that Google can search them when they are unencrypted. So I would like to have both: the online storage provider does not understand my data, but he can still help me with searching in them, and doing other useful stuff. I mean: I send to the remote server encrypted data and later an encrypted query (the server cannot decipher them), and the server sends me back a chunk of my encrypted data stored there — the result of my encrypted query. Or I ask for the directory structure of my encrypted data (somehow stored in my data too — like in a tar archive), and the server sends it back, without knowing that this encrypted chunk is the directory structure. I googled for this and found some papers, however no software and no online service providing this yet." Can anyone point to an available implementation?
It's not possible even in theory (Score:5, Informative)
It's not possible to do this even in theory, unless you're relying on very weak encryption. The point of encryption is that you can't infer anything about the contents. If Google was able to infer enough to give you meaningful search results (if for example each word was encrypted by itself, and you searched for the encrypted version of the word), they would therefore necessarily be able to know enough to perform a frequency analysis attack on your data and compromise it in no time flat unless it was a very small amount of data (thus meaning search isn't really of value anyway).
You'll find a similar problem plagues any attempt at searching. Searching requires a certain knowledge or meta knowledge of the material being searched; and that knowledge necessarily dramatically weakens your encryption.
Re:It's not possible even in theory (Score:5, Interesting)
It is possible. When you upload the data, you also upload an index. When you connect again, you download the index (which is much smaller than the data) and search that on the local machine. Neither the index, nor the data, is ever unencrypted on the server.
As for frequency analysis, I don't think any encryption algorithms published in the last 40 years have been vulnerable to this sort of attack...
Re: (Score:2)
Re:It's not possible even in theory (Score:5, Informative)
Re: (Score:3, Insightful)
That's not how I read it. But the approach still sounds useless:
If Alice wants to search for the word W, she can tell Bob (the server) the word W and the ki corresponding to each location I in which W may occur
What's the use of encrypting the data if you're going to send keywords in cleartext to a party you're trying to hide the data from?
Re:It's not possible even in theory (Score:4, Interesting)
Re: (Score:3, Informative)
That's because they don't encrypt the filenames. (Score:2, Insightful)
Re:It's not possible even in theory (Score:5, Funny)
Gee guys, isn't this a little bit too much work just to hide your porn?
Just mark the directory as hidden, your mom will not find it.
Re: (Score:2)
Just make sure you aren't sharing a parent folder over a network as hidden folders may not be hidden to other operating systems.
Re: (Score:2)
So does Spare Backup [sparebackup.com]. Just like Mozy, they don't encrypt the file names though. So you can search the file names, but not the contents.
Re: (Score:3, Informative)
And that would practically defeat the purpose of the encryption.
For the index to be useful it has to provide too much information about the encrypted data. The point of encryption is to ensure that nothing can be inferred about the contents of the encrypted data. If you give them a nice big bunch of information about whats encrypted, why bother encrypting it in the first place?
Given enough information in the index they could actually derive your encryption key as well with some simply brute forcing.
not hard (Score:2, Interesting)
Just use a book (or multiple books) code cipher for your index. You don't need to remember a thing beyond which books and what your key starting number is, the pattern. And if someone is in your house throwing all your books at cracking the remote server, you are already screwed and have much bigger problems, such as they probably already installed a keylogger on you. If you are that much of a target for someone to take that much interest....time for plan B or C then, involving plastic surgery, new ID and s
Encrypt the Index (Score:2)
Re: (Score:2)
An encrypted file filled with financial information, locked up and merely tagged "financial information" would only tell you what sort of data is in there. If you can't view the data, no harm no foul?
Re: (Score:2)
The only thing that I know is that it's gonna somehow involve Locate32 http://www.locate32.net/ [locate32.net]
Re: (Score:2)
Re: (Score:2)
Maybe, maybe not (Score:2)
Unless you do the indexing client-side, and upload an index that's somehow encrypted...
I'm not saying I know how to do this, but it seems possible.
Re:Maybe, maybe not (Score:4, Interesting)
Maybe something like this -
Create an index of hashes using the unencrypted data on the client.
Encrypt the data on the client so we now have an index of hashes that apply to an encrypted file.
Upload the hash index and the encrypted data file to the server.
To search, hash the search criteria on the client.
Server search the indexes for the hash value, returning a list of encrypted files with an index matching the criteria hash.
Re: (Score:2)
Sounds good to me. You wouldn't be able to get a "ransom note" but I guess that's an acceptable limitation.
Re: (Score:2)
Not possible in theory? You should tell the authors of the linked paper that describe how to do it in theory.
Re: (Score:2)
Re: (Score:2)
That's true for their Scheme I, but I don't think it's true for Scheme II, or any of the subsequent schemes, is it? Scheme II and all subsequent schemes make the key for any word a function of that word, so, to search for a word, you just need to upload the word and its related key. I don't see why that would be anything like as much data as is stored remotely.
Now, the idea of making the key used to encrypt a given word a function of that word kind of sounds insecure to me, but I don't have the cryptography
Re: (Score:2)
Re: (Score:2)
Yeah, I'm not sure I understand how meaningful searches can be done without decryption-- but then I don't pretend to be any kind of a genius about these things. It seems much more likely to me that there could be some kind of a system where unencrypted search indexes are kept locally while the files are encrypted and sent to an online storage service. Then you could search locally for the file you're looking for, fetch the encrypted information from the online storage, and then decrypt it locally.
That so
Re:It's not possible even in theory (Score:4, Insightful)
I'm curious - why would you post a comment claiming that this can't even be done in theory, when the submitter included links in the summary to a paper that shows that it can?
Re: (Score:2, Informative)
"why would you post a comment claiming that this can't even be done in theory, when the submitter included links in the summary to a paper that shows that it can?"
Because it can't. The one paper proposes (unless I'm missing something!) giving the server the word to search for AND the keys! The security is by frequently rotating the key, and if you KNOW you only wanted to search, say, chapter 1 of a longer document, only give the key for chapter 1. Not very secure!
Re: (Score:3, Interesting)
Because the paper doesn't propose any solution that is practical, or which even leads to a practical solution.
In theory I can cure all forms of cancer - all I have to do is go through each cell in the victim's body and pluck out the cancerous ones.
Re: (Score:2)
You could assign tags to the meta headers of the encrypted file, that can be grouped into sub categories, hence some file that says I am encrypted but I can vouch that I am an image, could prove useful
It is possible to a certain extent (Score:3, Interesting)
There are encryption algorithms that allow addition. That is, the sum of two encrypted messages is an encryption of the sum. I've forgotten how these work exactly, I think they are some many to one mapping, and the addition operation is not simply adding the encrytped numerical representations.
I came across these when looking at voting systems that allow N distributed people to vote in a way that sums the result before it is decrypted rather than decrypting to do the sum.
Anyhow what this means is that is
Re:It's not possible even in theory (Score:4, Insightful)
Can I have an anti-theft system for my car, so that nobody can steal it but anybody who wants to can take it for an anonymous test-drive?
Re: (Score:2)
Booyah, car analogy, thread over.
Re: (Score:2)
In theory, I can think of one way where this would actually work. I could be wrong though.
I don't speak, read, or understand Russian, at all. But if you gave me a sheet that had Cyrillic text, and gave me a request to retrieve a phrase or a portion of the text, I could probably do it given enough time by matching the characters exactly, but won't have any idea what I'm reading. I'm not translating anything, just retrieving a portion of the text based on a character map.
Of course, I'm not sure if this analog
Re: (Score:2, Insightful)
Re: (Score:2)
I figured what I described was too good to be true. :) In that context, I can see how this would differ with encryption. Thanks for the clarification.
Re: (Score:2)
what if you could group your keys and rather than returning matches for smith you returned matches for keys starting with S (for over simplicity) then when the encrypted data comes down you only need locally decrypt part of the db. or maybe have one encryption for the key and a separate encryption for the data associated with that key. the portions returned might never hit disk storage and anything decrypted lost as soon as the power was pulled.
actually you could perhaps arrange storage of files in a syste
You want to... (Score:4, Insightful)
Use an encrypted query to match against the encrypted text. The problem is, if the text is REALLY encrypted, then there shouldn't be enough information to do this - the encrypting of the original text should make it impossible to even match against it.
If it didn't, then an attacker who got hold of the encrypted text and some of your encrypted queries might well be able to mount an attack based on commonalities between the two.
Re:You want to... (Score:4, Funny)
NOT TRUE! I use a combination of XOR and rot-13 encryption and I'm able to do text searches just fine. The trick is to encrypt the search string, then it'll work perfectly. This is because the encryption doesn't depend on the position within the text, but that shouldn't hurt security too much.
Re: (Score:2, Informative)
Easy (Score:2)
This sounds pretty easy,
a) obtain database, indexing tools, search tool
b) install on the machine and encrypt the entire hard drive with any of the many available whole-disk encryption tools
c) ssh in and run queries.
Re: (Score:2)
Is that so difficult?!
Install GmailFS. Mount it somewhere. Install encfs. Use the gmailfs mounted folder as the encrypted folder for encfs and mount it on another folder. Install Trackerd and configure it to scan that folder and save the index data there.
Presto. Was that difficult?
Good luck with that.... (Score:2)
The best I think you can do is store and transfer the data in encrypted form and put the indexes and any search logic on the client. Maybe the index could be stored on the server as well and synced to the client, but creating the
Re: (Score:2)
That only works for very trivial encryption algorithms, where you can map the unencrypted string character-by-character to its enciphered value.
The reason for this is you don't know where the text resides within the document, so if your cipher is not position-independent, you're screwed. Hint: anything more robust than XOR or ROT13 will be position-dependent.
Example for the truly dense: Let's say you have two strings. One is "Harry" and the other is "Barry". They only differ by one character, so if your
Re: (Score:2)
That won't help either...
Assuming you encrypt this piece of text : "three wrongs don't make a right, but three lefts do !"
You'll get some binary blob A
Encrypting the word "three" will give you another binary blob B
The chances that you'll find B inside A is practically zero due to the way modern encryption works.
(It would work in the mighty ROT13 system though !)
Re: (Score:2)
But then your encryption is trivial. If "john smith" always goes to "wbua fzvgu" then your data can be scrutinized using frequency analysis, if "john smith" doesn't always go to the same thing then you need to upload what "john smith" would be at any given point in the data, at which point it makes it more efficient to download the data and then do a local search on unencrypted data.
It depends on the encryption (Score:3, Insightful)
If the data is encrypted in independent "chunks" from which search terms can be built then this is trivial: You pre-encrypt your search terms and search for them. Searching a word ROT13 [wikipedia.org]-encoded document works this way, as each character is encrypted individually and an encrypted search term is made up of encrypted characters.
Once you get past this, it's no longer easy. You basically have to either make the term you are searching for look like all possible values of the encrypted text and return all matches, or decrypt the document somewhere.
If the encryption is good and any particular chunk, extract, or other slicing-and-dicing of the encrypted data without the key looks random, you are pretty much stuck with decrypting it somewhere.
The alternative is to store an index, or at least a list of keywords, in clear text. For example, a document describing how to build a nuclear bomb could have a list of 10 or 20 non-classified keywords attached to it to aid searching. But that's not what you are asking for.
searching encrypted data (Score:2)
http://www.cs.berkeley.edu/~dawnsong/papers/se.pdf [berkeley.edu]
Re: (Score:2)
Doh! Just noticed you already are aware of that particular work. Anyway, congrats, you're already aware of the state of the art!
GNUnet (Score:2)
It's been done. GNUnet [gnunet.org].
A guy walks into a bar... (Score:5, Insightful)
Re: (Score:3, Interesting)
But... That's not a valid car analogy since you're not allowed to drink and drive.
Re:A guy walks into a bar... (Score:4, Funny)
Not good enough. The bartender could audit his liquor to see how much of each bottle was dispensed.
This is why when they do this sort of thing, the gentleman just serves the bartender a National Security Letter and takes more than what he wants without paying a dime.
Re: (Score:3, Interesting)
...if I tell you a story in French and you don't understand it, you will have no idea what I told you and will not be able to answer questions about my story. However, if you are able to memorize all I told you phonetically I can ask if I said a word or not just by the sound. Yet you don't know exactly what I asked for, nor the meaning of the answer but you are able to answer that question since it doesn't imply meaning.
So a possibility for the OP would be to store the information in a language unknown to a
not impossible; not easy (Score:3, Interesting)
Keep the files on the remote server, encrypted. Keep the search index in a database, encrypted in chunks. Rsync your search database between your local machine and the server. Actual searches of the databases would be done locally.
Result: terrible performance whenever you access your data from a new machine (must sync entire search database). Good performance the rest of the time. Remote server never sees anything but cyphertext.
Now there's an oxymoron if there was one (Score:2)
There's plenty meaning that can be derived from just filenames.
Does it really matter that Google or whoever can't see the exact text or images, but has enough information from filenames, tags and descriptions to accurately find out what kind of furry porn you like?
People who encrypt their data often don't want to disclose even what kind of content they have. Knowledge of what sort of porn is there, or that you're having an affair, or private internal company data are things that can be disclosed from just k
Re: (Score:2)
Well, and what are you going to search by, then? The way I see it, the way to do this is to encrypt the content, but provide unencrypted, searchable metadata.
What I'm saying is that the metadata often contains plenty private data. People want to hide the fact they have porn at all. Making it so that a porn collection is searchable but not viewable doesn't really help much. Mails with titles like "My wife will
I'm confused... (Score:2)
So you either want to:
- Decrypted
- Search
If so, then just mount an encrypted drive and put the Search Index on the drive its self... Basically any encryption filter driver will do the mounting for you (Windows and Linux ship with these) and any old Search Software will work for the searching, just move the index.
Or you want to:
- Search Encrypted Content
- For other encrypted content (or decrypted content)
In either case this isn't possible. At least assuming you're using a Crypto algorithm written in the last
I don't understand... (Score:3, Funny)
...isn't this easy?
Plaintext: "Attack at dawn"
Ciphertext: "lkaoiuast98u;aw"
Search query: "oiua"
Result: "lkaoiuast98u;aw"
What could be simpler?
(no, I'm not an idiot, this is a joke.)
querying encrypted data howto (Score:3, Interesting)
As long as your query looks something like this...
SELECT * FROM mydata WHERE stuff LIKE '%YToyOntzOjc6InBhY2thZ2UiO3M6MjM5OiKyKHPh9ZawDX6KyA62cMd6p+mjBybGwJyCaNfFb7S.........
Seriously though, if I understand your objective I think it would be feasible to develop something like that, but I don't think its something you could integrate into Google's search services unless they added something on their end.
You could pass a decryption key along with your query and the server would then decrypt records as it performed the search. It would be very resource intensive.
As an close example, I have a web based password storage application in which I did not want to keep the encryption keys on the same server as the password database. So I generate a key with which to encrypt the records and the user keeps their key and must supply it every time they want to decrypt a record. I don't go so far as to enable searching of the encrypted data, I have a description field specifically for that purpose. The web application is called Passbox [sourceforge.net] and is written in PHP.
What an oxymoron! (Score:3, Interesting)
Yeah, Id like my cake and eat it too!
The only way this could work is if you has tags in the meta header of the encrypted file
telling you that yes I am encrypted, but I have an image in me or my encrypted data is of the type accounting.
This might work for indexing searches where you want to be able to return all the files on the pc (encrypted or not) that are images or etc...
Easy (Score:2)
Randomly say that you found or did not find the search pattern. Since you're not decrypting it, nobody can tell if you're lying.
Ask the NSA. (Score:2)
(This is why I wrap all my data in tin foil.)
There is a way, kind of: PIR (Score:3, Informative)
There is a cryptography technique called Public Information Retrieval which allows you to do just that: Send an encrypted query to a server, let it perform some operations on your behalf, and send you an encrypted query result. The server neither knows the contents of the encrypted data, nor the content of the query, but you have your result nonetheless.
The intuition is that there exists a sort of "black-box" operation which some cryptographic techniques can use. For example, if I have two encrypted bits a and b (where I can't tell what a and b actually are), I can still perform the operation a xor b. The result is encrypted, and I don't know the actual operands or the result, but I know that what came out is indeed the encryption of the xor of the encrypted bits. Such cryptosystems are forms of "Homomorphic Encryption".
Using this, we can then give the server a search term thus encrypted and, using the black-box opertaion, have it do some set of operations which will reveal the result. The server will execute the exact same set of operations independent of the search term, so it knows nothing (and needs to know nothing) of the search term contents. Of course, this implies that the server has to operate on every element of the encrypted data to do its job, but that's the fundamental tradeoff. If you're willing to accept that, and the additional computational overhead, you can design such a system.
Re: (Score:2)
Of course, this implies that the server has to operate on every element of the encrypted data to do its job...If you're willing to accept...the additional computational overhead, you can design such a system.
Where's Bruce? He has the right combination of math and cs theory to spout off some usefulness on this thread :-)
Anyhow, let's think about this plan:
Let's say we store n chunks of encrypted data on the server d_1, d_2, ..., d_n. If they were PDFs, we could just store a corresponding text file for full text search on our local machine t_1, ..., t_n, which could be much smaller. If space were at a premium, we could even store each t_i (encrypted) on the server as well, but in order to get to the text, we'd ha
Privacy enhanced databases (Score:2)
This is a great challenge and an active area of research for some time. Many researchers would like to build databases that protect the users without creating some huge pile of aggregated personal information.
Encrypting the data at the client is a good solution. I've posted several good case studies from my book, Translucent Databases .
Here's what I wrote for a library [wayner.org] and here's a case study of helping an online store. [wayner.org]
Let me know if you have questions or suggestions.
You need a private VM or a hosted machine (Score:2)
As pointed out above, if the data is encrypted, the service can't search on it.
So:
- you get a VM or a hosted machine that you have complete control over.
- You set up all your encryption as necessary, eg encrypting the file system. SSL to the machine, etc
- You set up a search system, eg lucene, or maybe database as SQL queries are needed or whatever.
- Profit(?)
Of course, you could do all the same in-house as well, without the need for encryption etc.
ws
I put something similiar to this together myself.. (Score:4, Interesting)
1 - Mask the filename
2 - Encrypt the contents
3 - Add recovery data in case the file got damaged
4 - Ability to view unmasked filename from web
I put together a batch file I could drag/drop multiple files onto that used WinRAR to compress the files (individually), with encrypted filenames, a password (of course), and included archive recovery data. It then used ReNamer to encrypt the
I had a webpage that would accept a password, and unencrypt the filenames so they were viewable in readable form on the page. Each one was a hyperlink. There was an extra step required if you wanted the downloaded filename to be unencrypted as well.
After uploading 115G or so, my host alerted me to the fact that they didn't allow me to keep offsite backups there.
My solution didn't allow me to search within the files, but it did allow me to store files on the server that they had no way of viewing the contents of, or guessing the contents of based on filename.
Not really feasible (Score:2)
There are some solutions for this. I think the first appraches were called "Iraiksan". However there is a massive performance penalty so you are unlikely to find this offered anywhere. Better keep metadata on your local machine and search that.
I don't think you can have it both ways (Score:2)
Either you send your storage provider clear data, in which case he can understand and work with it (including search through it), or you can send him (and ask him to store) encrypted data.
One of the principal characteristics of (well-)encrypted data is that it is essentially random gibberish. Encrypting your search query won't somehow help him understand your encrypted data. The purpose of encrypting it is to keep (all) others out of it.
Sorry.
Why does the server need to perform the search? (Score:2)
The server just stores a bunch of indexes into your data and searches them when you supply the keywords. It sounds like what you really need is an efficient index (it requires few reads to determine whether what you are searching for is there, or that it isn't anywhere). Then you can build and encrypt the index and store it online in chunks, and download the pieces of it that you need to search for your keywords, and then retrieve the encrypted data that the index entries points to.
For instance, if you wa
Look at JLAN (Score:2)
Instead i installed JLAN which is a user mode java application that stores your data either in a file, a set of files or in a database. I store the data in a database (my provider gives unlimited database access with the virtual private server subscription).
JLAN outputs the data as either an FTP, NFS or SMB share/filesytem. So it doesn't create a filesystem like FUSE does but it is still t
Re: (Score:2)
Tutorial with help on SMB -> SSH tunneling
http://kign.blogspot.com/2008/07/accessing-smb-shares-under-firewall.html [blogspot.com]
Yes! (Score:2)
Re:Am I missing something? (Score:5, Insightful)
You're missing something. SSL is for data that is in transit. The poster wants the data to be encrypted on the server. That's easy - any encryption program can do it. But then s/he also wants to search it. That is harder.
Re: (Score:2)
But then s/he also wants to search it. That is harder.
That is not harder - that is impossible.
The reason is that in order to search the data, you first have to decrypt the data. If you decrypt the data on the server side, you just compromised your security. End of game.
Re:Am I missing something? (Score:5, Informative)
Search works by tokenizing a document, and creating an inverse index from tokens to documents. The tokens does not need to mean anything to the search engine. If you generate the tokens on the client, and don't transmit the dictionary that maps from word to token id, you can have "encrypted search".
The problem with doing that directly is that if you want to do proximity based search you need information on the token order, and they could do frequency analysis to come up with plain text guesses if they guess the language right. You can counteract that by mapping the same word to multiple tokens to even out the frequency of each token id, but it means you would need to search for multiple tokens to find all occurrences of a word.
If you don't are about word proximity it's much safer, as the index would only contain each token once per document at most.
Re: (Score:3, Insightful)
Re:Am I missing something? (Score:5, Insightful)
No, this is not what SSL is for at all. SSL you have a party you wish to communicate with, but an insecure channel.
Here, you don't want to communicate anything useful to anyone. This is more a privacy preserving data mining problem. It goes something like this:
I have a long list of secret numbers 1...n. I do something to these numbers, so that Google doesn't know what they are, and then I send them to Google. Next, I want to know how many numbers are larger than, say k. So, I ask Google, but in a clever way, so that Google doesn't know what I'm asking.
Google then tells me how many of my original numbers were larger than k. However, Google doesn't know my original numbers, and they don't know what question I asked. There needs to be some theoretical mapping that preserves this privacy, but still allows the data mining to occur.
Re: (Score:3, Interesting)
Re: (Score:2)
Re:Am I missing something? (Score:4, Funny)
It can't, that's why I use Live Search. It doesn't understand the query, the data, or the result. Unfortunately, for the OP, it doesn't support encryption.
Re: (Score:3, Insightful)
Do you know which word "2" represents, or what is in documents 103 and 178?
That's how you do it. You need to ensure there's no way of doing statistical analysis on the token list to recover plaintext info, and you need to not give them the dictionary mapping from plaintext to tokens.
Re: (Score:3, Insightful)
Yes you are =)
SSL only encrypts the transport.
It seems that the poster wants to have his data _stored_ in an encrypted way that is only decipherable by him, not by any of the machines/users at the storage facility. Yet, when he wants to do some search, he somehow expects the server to be able to do so... AFAIK that's not feasible.
(you could store whatever encrypted stuff remotely, but querying will require fetching, reading and decrypting the (relevant portions of) data locally...)
CONFIRMED: You are missing something. (Score:2, Insightful)
You say 'SSL only encrypts the transport' as if that means something. What is a file if it's not a way to transport information from the file writer to the file reader?
I use SSL daily to encrypt files with keys to be stored for later retrieval by the intended recipient. I think you are confusing SSL (the ability to assymetrically encrypt data) with HTTPS (a use of SSL to encrypt HTTP data transfers)?
Re: (Score:3, Interesting)
Sure the *NAME* is "Secure Sockets Layer", and perhaps that was what it was originally developed for, but it's just wrong to say that it can't be used otherwise, and/or that it only encrypts data "in transit", not on a server. Take a look at this:
http://us2.php.net/manual/en/function.openssl-public-encrypt.php [php.net]
Here's the use of SSL functionality without (ahem) a socket. Right from the docs:
This function can be used e.g. to encrypt message which can be then read only by owner of the private key. It can be als
Re: (Score:2)
ah, i was commenting more about equating SSL with PKC than the overall meaning of your comment.
Re:huh? (Score:5, Funny)
if the server cannot decipher the query it cannot execute it on a binary blob of encrypted data. FAIL.
Gung jbhyq qrcraq ba ubj gevivny lbhe rapelcgvba zrgubq vf.
Re:huh? (Score:4, Informative)
Re: (Score:2)
Could also just use VI with the g?? command...
ohg gura gung zvtug or gbb zhpu jbex sbe fbzr.
Re: (Score:3, Funny)
I tried the vi command, but I get this weird error:
'vi' is not recognized as an internal or external command,
operable program or batch file.
Does this mean ROT13 is not compatible with Windows?
Re: (Score:3, Funny)
I think so... perhaps you should try another operating system [gnu.org]?
Be aware though, it's got a weird text editor...
ROT26 (Score:2, Funny)
I prefer ROT26. It's got built-in steganography to boot.
Re:huh? (Score:5, Insightful)
Well that depends whether the OP wants to perform something like a fulltext search (i.e. the ability to look for keywords within the content of each document) or a metadata search.
There's nothing to prevent you setting up a CMS where each piece of content is encrypted, but the metadata describing that content is out in the clear and searchable. Security in such a scenario would be less than optimal (e.g. people could guess certain things about your content based on the statistical pattern of length for each of the millions of encrypted content items), and of course you'd have to be very careful about the metadata fields and how you are populating them.
Re: (Score:2)
I'd assume that's exactly not what the OP means, on the grounds that it's so trivially obvious that nobody would need to ask it.
Do this maybe? (Score:2, Insightful)
1 Encrypt the file (or record for databases)
1.5 (for a database) Encrypt the key fields each separately
2 Encrypt the file name separately
3 store on server
To search for a file:
1 Encrypt the search criteria (file name or key value)
2 search for encrypted thing on server
3 Retrieve matches.
Re: (Score:2)
It creates a filesystem that can be stored on a database and can be encrypted. That database can be remote or local. So all you need to do is pay a monthly fee for access to an online database and run JLAN.
Re: (Score:2)
Isn't that just another way of giving the co-location facility the method to decrypt your data and search terms? They have physical access to your hardware, even if you do encase it in Gloopstik®.
Re: (Score:2)
Re:this is just DRM, correct? (Score:2)
exactly what DRM is, IE if I want to give out encryted data, to a computer/user that I don't trust, yet I want them/that to do useful stuff with my encrypted data, but never give full read access to my encrypted data.
So a VM could be deployed on the remote server that would only allow your signed app to perform only the acts you allow on the data, and only allow your client to connect securely. This would provide the desired functionality. Same as DRM, the security is through obscurity at some point, sinc