US20170163413A1 - System and Method for Content Encryption in a Key/Value Store - Google Patents
System and Method for Content Encryption in a Key/Value Store Download PDFInfo
- Publication number
- US20170163413A1 US20170163413A1 US15/432,707 US201715432707A US2017163413A1 US 20170163413 A1 US20170163413 A1 US 20170163413A1 US 201715432707 A US201715432707 A US 201715432707A US 2017163413 A1 US2017163413 A1 US 2017163413A1
- Authority
- US
- United States
- Prior art keywords
- key
- value
- cypher text
- encrypting
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims abstract description 27
- 238000004590 computer program Methods 0.000 claims 6
- 238000013507 mapping Methods 0.000 abstract description 8
- 238000012545 processing Methods 0.000 description 14
- 230000015654 memory Effects 0.000 description 9
- 238000004891 communication Methods 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 239000007787 solid Substances 0.000 description 2
- 238000010586 diagram Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/062—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0637—Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
Definitions
- the present invention relates to storage technology, and, in particular embodiments, to a system and method for content encryption in a key/value store.
- data is stored in the form of data objects or blocks, where each object includes a key and value.
- the key is used to identify the data object, and the value represents the data content.
- a data object may correspond to a single data structure or a set of data (e.g., a file or a set of files).
- the data object may correspond to a block or chunk of data, such as a portion of a file or a file from a set of files.
- the stored data objects can also be encrypted to provide protection against unauthorized users or access.
- the value is encrypted without the key since the key is used to identify the data object or value and is needed to successfully get or fetch the stored data objects in the storage system. An improved system is needed that provides better protection by encrypting both the value and the key.
- a method for content encryption in a key-value store includes obtaining a key from a data block comprising the key and a value, encrypting the key using a deterministic encryption algorithm with an encryption key to map the key to a cypher text in a one-to-one mapping, and storing the cypher text for the key in the key-value store
- a method for content encryption in a key-value store includes obtaining a data block comprising a key and a value, encrypting the key using a deterministic encryption algorithm with an encryption key to map the key to a cypher text in a one-to-one mapping, encrypting the value using a second encryption algorithm to randomly map the value to a second cypher text, and storing the cypher text of the key and the second cypher text for the value in the key-value store.
- an apparatus for content encryption in a key-value store includes one or more storage nodes configured for storing one or more data blocks including key and value pairs, a processor, and a computer readable storage medium storing programming for execution by the processor.
- the programming includes instructions to obtain a data block comprising a key and a value, encrypt the key using a deterministic encryption algorithm with an encryption key to map the key to a cypher text in a one-to-one mapping, encrypt the value using a second encryption algorithm to randomly map the value to a second cypher text, and store the cypher text of the key and the second cypher text for the value in the key-value store.
- FIG. 1 illustrates an embodiment of a protection scheme for a key/value store system
- FIG. 2 is an embodiment of a key/value pair encryption method for a key/value store system
- FIG. 3 is a processing system that can be used to implement various embodiments.
- System and method embodiments are provided for content encryption in a key/value store.
- the embodiments can also be implemented for any storage system that stores data objects or blocks comprising key and value pairs, such as DHT and noSQL database systems.
- the embodiments include encrypting both the key and value of client data blocks for storage so that the data can be retrieved reliability without compromising the key. Encrypting both the key and the value provides more protection to the client data, e.g., instead of encrypting only the value and leaving the key vulnerable without encryption. As such, the encrypted key can also be protected from unauthorized access and from the owner of the database or the storage system. Using two different encryption algorithms to encrypt the key and value further improves security and protection of stored data.
- a deterministic encryption algorithm such as Advanced Encryption Standard (AES) EME 2 , is used to encrypt the key.
- the original key is encrypted using the deterministic encryption algorithm with a secret value to guarantee the same encryption or cypher text for the key each time.
- the secret value also referred to herein as an encryption key or a secret key, is used with the algorithm to perform encryption on the original key and map the key to a cypher text (an encrypted key) in a one-to-one mapping.
- the encryption key can be used to decrypt the encryption or cypher text to obtain the original key (the key before encryption).
- the secret or encryption key may be provided by the system, e.g., a server or a key management system, instead of the client.
- the system can store securely the encryption key without sharing the encryption key with the client.
- the value can be encrypted using any suitable encryption algorithm, such as a Galois/Counter Mode (GCM), e.g., with the same encryption key used for encrypting the key or a different encryption key.
- GCM Galois/Counter Mode
- a suitable encryption algorithm for the value may use a random operation (e.g., based on randomly generated values or vector) to generate an encryption or cypher text for the value. This makes it more difficult to guess the value encryption and therefore improves the security of the value encryption.
- such an encryption algorithm may not be suitable for encrypting the key, since the random operation provides less guarantee than a deterministic algorithm to reproduce the original key.
- FIG. 1 shows an embodiment of a protection scheme 100 for a key/value store system.
- the key/value store system includes a server no and a plurality of storage nodes 130 coupled to the server no, for instance via one or more networks 120 (e.g., the Internet).
- the server no is configured to encrypt data blocks 106 that include key 102 and value 104 pairs.
- the storage nodes 130 are configured to store the data blocks 106 including an encrypted key and value. Examples of a storage node 130 include as a hard disk, a flash memory card, a random access memory (RAM) device, a universal serial bus (USB) flash drive, or any other suitable storage device.
- RAM random access memory
- USB universal serial bus
- the storage nodes 130 may be part of a sea of disk (SoD) architecture 140 , which is suitable for providing data storage for cloud computing purposes.
- the SoD architecture 140 may comprise a case that includes a plurality of disks, each corresponding to a storage node 130 .
- the disks may comprise a plurality of ATOM, ARM, and/or other processor type based computers.
- Each of the computers may also comprise other components, such as a Central Processing Unit (CPU), a random access memory (RAM), a Flash/Solid State Drive (SSD), a HDD, a one Gigabit per second (1G) Ethernet card, or combinations thereof.
- the key/value store system may be a localized or centralized storage system (e.g., in a data center), or alternatively a remote or distributed system across the Internet, other network, and/or multiple data centers.
- the server 106 can encrypt the value 104 using any suitable encryption algorithm.
- the encryption algorithm for the value 104 may use a randomly generated vector that increases the likelihood of achieving different encrypted text or value for different values 104 .
- the key 102 is encrypted using a second encryption algorithm that is deterministic in nature and that guarantees reproducing (in the decryption process) the same original key 102 using the same secret or encryption key 108 .
- Each different key 102 associated with a different value 104 and data block 106 is encrypted using the deterministic encryption algorithm with a selected encryption key 108 .
- the deterministic encryption and decryption scheme ensures retrieving the same original key 102 and hence retrieving the correct value 104 associated with that key 102 .
- the key 102 is encrypted using the AES EME 2 algorithm, which is a deterministic algorithm with the characteristics described above.
- a corresponding decryption algorithm can then be used to reproduce the key 102 .
- the value 106 can be encrypted using the GCM algorithm that provides security and data block integrity.
- the secret or encryption key 108 may be generated by the server no or a key management system.
- a different encryption key may be generated for each client.
- the different encryption keys for the different clients may be used with the deterministic encryption algorithm to encrypt the same key of the same data block to obtain different corresponding encryptions of cypher texts of the same key.
- the different cypher texts can then be decrypted using a deterministic decryption algorithm (corresponding to the deterministic encryption algorithm) with the corresponding encryption keys to retrieve the same original key of the data block.
- the system may store the generated encryption keys 108 , for example in a mapping table that maps the encryption keys 108 to clients.
- the encryption keys 108 may be kept from the clients by the system and used to decrypt the stored and encrypted key/value pair (stored data block) when the client requests the data block.
- the encryption and decryption process and the use of the secret or encryption keys 108 may be handled by the system and, from a processing perspective, transparent to the client end.
- the key 102 and the value 104 may be encrypted (and decrypted) using different algorithms, as described above, but with the same encryption key 108 .
- different algorithms and encryption keys 108 are used to encrypt/decrypt the key 102 and value 104 .
- the same secret or encryption o key 108 can be used to encrypt different values 104 and/or different keys 102 for different data blocks 106 .
- the system may have a mapping table that maps the encryption keys 108 to clients.
- FIG. 2 shows an embodiment of a key/value pair encryption method 200 for a key/value store system.
- the key/value pair encryption method 200 can be implemented in the same key/value store system above (in FIG. 1 ), e.g., during or after the process of storing data blocks.
- the key and value pair can be encrypted during the storing process of the data block or alternatively after the data block has been stored (in a background process).
- the encryption method 200 guarantees data integrity and security and further guarantees no duplicate keys upon the decryption of different data blocks, which ensures retrieving the correct value and data block.
- a data block including a key and value pair is obtained.
- the data block may be sent for storage or may be already stored in the system.
- the key of the data block is encrypted using a deterministic encryption algorithm that maps, with a secret value, the key to a cypher text (an encrypted key) in a one-to-one mapping.
- the value of the data block is encrypted using a second encryption algorithm that ensures security and integrity of the data.
- the encrypted key and value are stored in the storage system.
- the secret for encrypting the key is also stored in an encryption key table or database.
- FIG. 4 is a block diagram of a processing system 400 that can be used to implement various embodiments. Specific devices may utilize all of the components shown, or only a subset of the components, and levels of integration may vary from device to device. Furthermore, a device may contain multiple instances of a component, such as multiple processing units, processors, memories, transmitters, receivers, etc.
- the processing system 400 may comprise a processing unit 401 equipped with one or more input/output devices, such as a network interfaces, storage interfaces, and the like.
- the processing unit 401 may include a central processing unit (CPU) 410 , a memory 420 , a mass storage device 430 , and an I/O interface 460 connected to a bus.
- the bus may be one or more of any type of several bus architectures including a memory bus or memory controller, a peripheral busor the like.
- the CPU 410 may comprise any type of electronic data processor.
- the memory 420 may comprise any type of system memory such as static random access memory (SRAM), dynamic random access memory (DRAM), synchronous DRAM (SDRAM), read-only memory (ROM), a combination thereof, or the like.
- the memory 420 may include ROM for use at boot-up, and DRAM for program and data storage for use while executing programs.
- the memory 420 is non-transitory.
- the mass storage device 430 may comprise any type of storage device configured to store data, programs, and other information and to make the data, programs, and other information accessible via the bus.
- the mass storage device 430 may comprise, for example, one or more of a solid state drive, hard disk drive, a magnetic disk drive, an optical disk drive, or the like.
- the processing unit 401 also includes one or more network interfaces 450 , which may comprise wired links, such as an Ethernet cable or the like, and/or wireless links to access nodes or one or more networks 480 .
- the network interface 450 allows the processing unit 401 to communicate with remote units via the networks 480 .
- the network interface 450 may provide wireless communication via one or more transmitters/transmit antennas and one or more receivers/receive antennas.
- the processing unit 401 is coupled to a local-area network or a wide-area network for data processing and communications with remote devices, such as other processing units, the Internet, remote storage facilities, or the like.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
System and Method for Content Encryption in a Key/Value Store System and method embodiments are provided for content encryption in a key/value store. The embodiments include encrypting both the key and value of client data blocks for storage so that the data can be retrieved reliability without compromising the key. An embodiment method includes obtaining a key from a data block comprising the key and a value, encrypting the key using a deterministic encryption algorithm with an encryption key to map the key to a cypher text in a one-to-one mapping, and encrypting the value using a second encryption algorithm to randomly map the value to a second cypher text. Encrypting both the key and the value provides more protection to the client data instead of encrypting only the value and leaving the key vulnerable without encryption. The encrypted key can also be protected from unauthorized access and from the owner of the database or the storage system.
Description
- This application is a Continuation of U.S. Provisional Application No. 13/798,746 filed on Mar. 13, 2013 and entitled “System and Method for Content Encryption in a Key/Value Store,” which application is incorporated herein by reference as if reproduced in its entirety.
- The present invention relates to storage technology, and, in particular embodiments, to a system and method for content encryption in a key/value store.
- In some storage systems, such as distributed hash table (DHT), key/value store, and noSQL database systems, data is stored in the form of data objects or blocks, where each object includes a key and value. The key is used to identify the data object, and the value represents the data content. A data object may correspond to a single data structure or a set of data (e.g., a file or a set of files). Alternatively, the data object may correspond to a block or chunk of data, such as a portion of a file or a file from a set of files. The stored data objects can also be encrypted to provide protection against unauthorized users or access. Typically, the value is encrypted without the key since the key is used to identify the data object or value and is needed to successfully get or fetch the stored data objects in the storage system. An improved system is needed that provides better protection by encrypting both the value and the key.
- In accordance with an embodiment, a method for content encryption in a key-value store includes obtaining a key from a data block comprising the key and a value, encrypting the key using a deterministic encryption algorithm with an encryption key to map the key to a cypher text in a one-to-one mapping, and storing the cypher text for the key in the key-value store
- In accordance with another embodiment, a method for content encryption in a key-value store includes obtaining a data block comprising a key and a value, encrypting the key using a deterministic encryption algorithm with an encryption key to map the key to a cypher text in a one-to-one mapping, encrypting the value using a second encryption algorithm to randomly map the value to a second cypher text, and storing the cypher text of the key and the second cypher text for the value in the key-value store.
- In accordance with yet another embodiment, an apparatus for content encryption in a key-value store includes one or more storage nodes configured for storing one or more data blocks including key and value pairs, a processor, and a computer readable storage medium storing programming for execution by the processor. The programming includes instructions to obtain a data block comprising a key and a value, encrypt the key using a deterministic encryption algorithm with an encryption key to map the key to a cypher text in a one-to-one mapping, encrypt the value using a second encryption algorithm to randomly map the value to a second cypher text, and store the cypher text of the key and the second cypher text for the value in the key-value store.
- For a more complete understanding of the present invention, and the advantages thereof, reference is now made to the following descriptions taken in conjunction with the accompanying drawing, in which:
-
FIG. 1 illustrates an embodiment of a protection scheme for a key/value store system; -
FIG. 2 is an embodiment of a key/value pair encryption method for a key/value store system; -
FIG. 3 is a processing system that can be used to implement various embodiments. - The making and using of the presently preferred embodiments are discussed in detail below. It should be appreciated, however, that the present invention provides many applicable inventive concepts that can be embodied in a wide variety of specific contexts. The specific embodiments discussed are merely illustrative of specific ways to make and use the invention, and do not limit the scope of the invention.
- System and method embodiments are provided for content encryption in a key/value store. The embodiments can also be implemented for any storage system that stores data objects or blocks comprising key and value pairs, such as DHT and noSQL database systems. The embodiments include encrypting both the key and value of client data blocks for storage so that the data can be retrieved reliability without compromising the key. Encrypting both the key and the value provides more protection to the client data, e.g., instead of encrypting only the value and leaving the key vulnerable without encryption. As such, the encrypted key can also be protected from unauthorized access and from the owner of the database or the storage system. Using two different encryption algorithms to encrypt the key and value further improves security and protection of stored data.
- To guarantee successfully reproducing the key after encryption (retrieving the original key value by decrypting the encrypted key), a deterministic encryption algorithm, such as Advanced Encryption Standard (AES) EME2, is used to encrypt the key. The original key is encrypted using the deterministic encryption algorithm with a secret value to guarantee the same encryption or cypher text for the key each time. The secret value also referred to herein as an encryption key or a secret key, is used with the algorithm to perform encryption on the original key and map the key to a cypher text (an encrypted key) in a one-to-one mapping. As such, the encryption key can be used to decrypt the encryption or cypher text to obtain the original key (the key before encryption). Obtaining the same encryption or cypher text each time when encrypting the original key guarantees that the reverse decryption process successfully reproduces the original key. Successfully reproducing the same original key ensures successfully returning the requested value associated with that key to the client and avoids returning a wrong value associated with an incorrectly reproduced key. The secret or encryption key may be provided by the system, e.g., a server or a key management system, instead of the client. The system can store securely the encryption key without sharing the encryption key with the client.
- Further, the value can be encrypted using any suitable encryption algorithm, such as a Galois/Counter Mode (GCM), e.g., with the same encryption key used for encrypting the key or a different encryption key. A suitable encryption algorithm for the value may use a random operation (e.g., based on randomly generated values or vector) to generate an encryption or cypher text for the value. This makes it more difficult to guess the value encryption and therefore improves the security of the value encryption. However, such an encryption algorithm may not be suitable for encrypting the key, since the random operation provides less guarantee than a deterministic algorithm to reproduce the original key.
-
FIG. 1 shows an embodiment of aprotection scheme 100 for a key/value store system. The key/value store system includes a server no and a plurality ofstorage nodes 130 coupled to the server no, for instance via one or more networks 120 (e.g., the Internet). The server no is configured to encryptdata blocks 106 that include key 102 andvalue 104 pairs. Thestorage nodes 130 are configured to store thedata blocks 106 including an encrypted key and value. Examples of astorage node 130 include as a hard disk, a flash memory card, a random access memory (RAM) device, a universal serial bus (USB) flash drive, or any other suitable storage device. Thestorage nodes 130 may be part of a sea of disk (SoD)architecture 140, which is suitable for providing data storage for cloud computing purposes. TheSoD architecture 140 may comprise a case that includes a plurality of disks, each corresponding to astorage node 130. The disks may comprise a plurality of ATOM, ARM, and/or other processor type based computers. Each of the computers may also comprise other components, such as a Central Processing Unit (CPU), a random access memory (RAM), a Flash/Solid State Drive (SSD), a HDD, a one Gigabit per second (1G) Ethernet card, or combinations thereof. The key/value store system may be a localized or centralized storage system (e.g., in a data center), or alternatively a remote or distributed system across the Internet, other network, and/or multiple data centers. - The
server 106 can encrypt thevalue 104 using any suitable encryption algorithm. The encryption algorithm for thevalue 104 may use a randomly generated vector that increases the likelihood of achieving different encrypted text or value fordifferent values 104. Thekey 102 is encrypted using a second encryption algorithm that is deterministic in nature and that guarantees reproducing (in the decryption process) the sameoriginal key 102 using the same secret orencryption key 108. Eachdifferent key 102 associated with adifferent value 104 anddata block 106 is encrypted using the deterministic encryption algorithm with aselected encryption key 108. The deterministic encryption and decryption scheme ensures retrieving the sameoriginal key 102 and hence retrieving thecorrect value 104 associated with thatkey 102. - In an embodiment, the
key 102 is encrypted using the AES EME2 algorithm, which is a deterministic algorithm with the characteristics described above. A corresponding decryption algorithm can then be used to reproduce thekey 102. Thevalue 106 can be encrypted using the GCM algorithm that provides security and data block integrity. - The secret or
encryption key 108 may be generated by the server no or a key management system. A different encryption key may be generated for each client. The different encryption keys for the different clients may be used with the deterministic encryption algorithm to encrypt the same key of the same data block to obtain different corresponding encryptions of cypher texts of the same key. The different cypher texts can then be decrypted using a deterministic decryption algorithm (corresponding to the deterministic encryption algorithm) with the corresponding encryption keys to retrieve the same original key of the data block. The system may store the generatedencryption keys 108, for example in a mapping table that maps theencryption keys 108 to clients. Theencryption keys 108 may be kept from the clients by the system and used to decrypt the stored and encrypted key/value pair (stored data block) when the client requests the data block. Thus, the encryption and decryption process and the use of the secret orencryption keys 108 may be handled by the system and, from a processing perspective, transparent to the client end. - The key 102 and the
value 104 may be encrypted (and decrypted) using different algorithms, as described above, but with thesame encryption key 108. Alternatively, different algorithms andencryption keys 108 are used to encrypt/decrypt the key 102 andvalue 104. Further, the same secret orencryption o key 108 can be used to encryptdifferent values 104 and/ordifferent keys 102 for different data blocks 106. The system may have a mapping table that maps theencryption keys 108 to clients. -
FIG. 2 shows an embodiment of a key/valuepair encryption method 200 for a key/value store system. The key/valuepair encryption method 200 can be implemented in the same key/value store system above (inFIG. 1 ), e.g., during or after the process of storing data blocks. For instance, the key and value pair can be encrypted during the storing process of the data block or alternatively after the data block has been stored (in a background process). Theencryption method 200 guarantees data integrity and security and further guarantees no duplicate keys upon the decryption of different data blocks, which ensures retrieving the correct value and data block. - At
step 210, a data block including a key and value pair is obtained. The data block may be sent for storage or may be already stored in the system. Atstep 220, the key of the data block is encrypted using a deterministic encryption algorithm that maps, with a secret value, the key to a cypher text (an encrypted key) in a one-to-one mapping. Atstep 230, the value of the data block is encrypted using a second encryption algorithm that ensures security and integrity of the data. At step 340, the encrypted key and value are stored in the storage system. Atstep 350, the secret for encrypting the key is also stored in an encryption key table or database. -
FIG. 4 is a block diagram of a processing system 400 that can be used to implement various embodiments. Specific devices may utilize all of the components shown, or only a subset of the components, and levels of integration may vary from device to device. Furthermore, a device may contain multiple instances of a component, such as multiple processing units, processors, memories, transmitters, receivers, etc. The processing system 400 may comprise a processing unit 401 equipped with one or more input/output devices, such as a network interfaces, storage interfaces, and the like. The processing unit 401 may include a central processing unit (CPU) 410, a memory 420, a mass storage device 430, and an I/O interface 460 connected to a bus. The bus may be one or more of any type of several bus architectures including a memory bus or memory controller, a peripheral busor the like. - The CPU 410 may comprise any type of electronic data processor. The memory 420 may comprise any type of system memory such as static random access memory (SRAM), dynamic random access memory (DRAM), synchronous DRAM (SDRAM), read-only memory (ROM), a combination thereof, or the like. In an embodiment, the memory 420 may include ROM for use at boot-up, and DRAM for program and data storage for use while executing programs. In embodiments, the memory 420 is non-transitory. The mass storage device 430 may comprise any type of storage device configured to store data, programs, and other information and to make the data, programs, and other information accessible via the bus. The mass storage device 430 may comprise, for example, one or more of a solid state drive, hard disk drive, a magnetic disk drive, an optical disk drive, or the like.
- The processing unit 401 also includes one or more network interfaces 450, which may comprise wired links, such as an Ethernet cable or the like, and/or wireless links to access nodes or one or more networks 480. The network interface 450 allows the processing unit 401 to communicate with remote units via the networks 480. For example, the network interface 450 may provide wireless communication via one or more transmitters/transmit antennas and one or more receivers/receive antennas. In an embodiment, the processing unit 401 is coupled to a local-area network or a wide-area network for data processing and communications with remote devices, such as other processing units, the Internet, remote storage facilities, or the like.
- While this invention has been described with reference to illustrative embodiments, this description is not intended to be construed in a limiting sense. Various modifications and combinations of the illustrative embodiments, as well as other embodiments of the invention, will be apparent to persons skilled in the art upon reference to the description. It is therefore intended that the appended claims encompass any such modifications or embodiments.
Claims (20)
1. A method for content encryption in a key-value store, the method comprising:
deterministically encrypting a key in a key-value pair to map the key to a first cypher text, wherein deterministically encrypting the key provides a guarantee that the key is reproducible from the first cipher text;
randomly encrypting a value in the key-value pair to map the value to a second cypher text, wherein randomly encrypting the value does not provide a guarantee that the value is reproducible from the second cypher text; and
storing the second cypher text of the value with the first cypher text of the key in the key-value store.
2. The method of claim 1 , wherein deterministically encrypting the key in the key-value pair maps the key to the same cypher text each time the key is deterministically encrypted using a first encryption key.
3. The method of claim 2 , wherein randomly encrypting the value in the key-value pair maps the value to a different cypher text each time the value is randomly encrypted using a second encryption key.
4. The method of claim 1 , further comprising:
retrieving the first cypher text of the key from the key-value store; and
deterministically decrypting the first cypher text to map the first cypher text to the key.
5. The method of claim 1 , wherein deterministically encrypting the key in the key-value pair comprises encrypting the key using an Advanced Encryption Standard (AES) EME2 algorithm.
6. The method of claim 1 , wherein randomly encrypting the value in the key-value pair comprises encrypting the value using a Galois/Counter Mode (GCM) algorithm.
7. The method of claim 1 , wherein the key provides an index for retrieving data associated with the value from the key-value store.
8. An apparatus for content encryption in a key-value store, the apparatus comprising:
a processor; and
a computer readable storage medium storing programming for execution by the processor, the programming including instructions to:
deterministically encrypt a key in a key-value pair to map the key to a first cypher text, wherein deterministically encrypting the key provides a guarantee that the key is reproducible from the first cipher text;
randomly encrypt a value in the key-value pair to map the value to a second cypher text, wherein randomly encrypting the value does not provide a guarantee that the value is reproducible from the second cypher text; and
store the second cypher text of the value with the first cypher text of the key in a key-value store.
9. The apparatus of claim 8 , wherein deterministically encrypting the key in the key-value pair maps the key to the same cypher text each time the key is deterministically encrypted using a first encryption key.
10. The apparatus of claim 9 , wherein randomly encrypting the value in the key-value pair maps the value to a different cypher text each time the value is randomly encrypted using a second encryption key.
11. The apparatus of claim 8 , wherein the programming further includes instructions to:
retrieve the first cypher text of the key from the key-value store; and
deterministically decrypt the first cypher text to map the first cypher text to the key.
12. The apparatus of claim 8 , wherein the instructions to deterministically encrypt the key in the key-value pair includes instruction to encrypt the key using an Advanced Encryption Standard (AES) EME2 algorithm.
13. The apparatus of claim 8 , wherein the instructions to randomly encrypt the value in the key-value pair includes instructions to encrypt the value using a Galois/Counter Mode (GCM) algorithm.
14. The apparatus of claim 8 , wherein the key provides an index for retrieving data associated with the value from the key-value store.
15. A computer program product comprising a non-transitory computer readable storage medium storing programming, the programming including instructions to:
deterministically encrypt a key in a key-value pair to map the key to a first cypher text, wherein deterministically encrypting the key provides a guarantee that the key is reproducible from the first cipher text;
randomly encrypt a value in the key-value pair to map the value to a second cypher text, wherein randomly encrypting the value does not provide a guarantee that the value is reproducible from the second cypher text; and
store the second cypher text of the value with the first cypher text of the key in a key-value store.
16. The computer program product of claim 15 , wherein deterministically encrypting the key in the key-value pair maps the key to the same cypher text each time the key is deterministically encrypted using a first encryption key.
17. The computer program product of claim 16 , wherein randomly encrypting the value in the key-value pair maps the value to a different cypher text each time the value is randomly encrypted using a second encryption key.
18. The computer program product of claim 16 , wherein the programming further includes instructions to:
retrieve the first cypher text of the key from the key-value store; and
deterministically decrypt the first cypher text to map the first cypher text to the key.
19. The computer program product of claim 16 , wherein the instructions to deterministically encrypt the key in the key-value pair includes instruction to encrypt the key using an Advanced Encryption Standard (AES) EME2 algorithm.
20. The computer program product of claim 16 , wherein the instructions to randomly encrypt the value in the key-value pair includes instructions to encrypt the value using a Galois/Counter Mode (GCM) algorithm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/432,707 US20170163413A1 (en) | 2013-03-13 | 2017-02-14 | System and Method for Content Encryption in a Key/Value Store |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/798,746 US9602280B2 (en) | 2013-03-13 | 2013-03-13 | System and method for content encryption in a key/value store |
US15/432,707 US20170163413A1 (en) | 2013-03-13 | 2017-02-14 | System and Method for Content Encryption in a Key/Value Store |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/798,746 Continuation US9602280B2 (en) | 2013-03-13 | 2013-03-13 | System and method for content encryption in a key/value store |
Publications (1)
Publication Number | Publication Date |
---|---|
US20170163413A1 true US20170163413A1 (en) | 2017-06-08 |
Family
ID=51527086
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/798,746 Expired - Fee Related US9602280B2 (en) | 2013-03-13 | 2013-03-13 | System and method for content encryption in a key/value store |
US15/432,707 Abandoned US20170163413A1 (en) | 2013-03-13 | 2017-02-14 | System and Method for Content Encryption in a Key/Value Store |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/798,746 Expired - Fee Related US9602280B2 (en) | 2013-03-13 | 2013-03-13 | System and method for content encryption in a key/value store |
Country Status (1)
Country | Link |
---|---|
US (2) | US9602280B2 (en) |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10362006B2 (en) * | 2013-03-15 | 2019-07-23 | Mastercard International Incorporated | Systems and methods for cryptographic security as a service |
CN105373561B (en) * | 2014-08-28 | 2019-02-15 | 国际商业机器公司 | Method and apparatus for identifying record schemas in non-relational databases |
US10469257B2 (en) * | 2015-01-15 | 2019-11-05 | Nippon Telegraph And Telephone Corporation | Matrix and key generation device, matrix and key generation system, matrix coupling device, matrix and key generation method, and program |
CN106506140A (en) * | 2015-09-06 | 2017-03-15 | 深圳市中兴微电子技术有限公司 | A kind of AES encryption and decryption method and device |
US9838201B2 (en) * | 2015-10-13 | 2017-12-05 | Sony Interactive Entertainment America Llc | Secure key store derivation and management from a single secure root key |
US10437799B2 (en) * | 2016-12-02 | 2019-10-08 | International Business Machines Corporation | Data migration using a migration data placement tool between storage systems based on data access |
US10437800B2 (en) * | 2016-12-02 | 2019-10-08 | International Business Machines Corporation | Data migration using a migration data placement tool between storage systems based on data access |
DE102017109415A1 (en) * | 2017-05-03 | 2018-11-08 | Krohne Messtechnik Gmbh | Electrical device and storage system with an electrical device |
CN107612683B (en) * | 2017-09-30 | 2020-10-27 | 上海众人网络安全技术有限公司 | An encryption and decryption method, apparatus, system, device and storage medium |
CN110020533B (en) * | 2018-01-08 | 2021-02-09 | 福建天泉教育科技有限公司 | A security protection method and terminal for VR resources |
CN110502602B (en) * | 2019-08-14 | 2023-10-17 | 平安科技(深圳)有限公司 | Data storage method, device, equipment and computer storage medium |
US11381393B2 (en) | 2019-09-24 | 2022-07-05 | Akamai Technologies Inc. | Key rotation for sensitive data tokenization |
CN111814166B (en) * | 2020-07-10 | 2023-09-12 | 上海淇毓信息科技有限公司 | Data encryption method and device and electronic equipment |
CN113824728B (en) * | 2021-09-27 | 2023-07-04 | 南京华远时代科技有限公司 | Network communication method and system based on data encryption |
CN113961784A (en) * | 2021-10-15 | 2022-01-21 | 北京同城必应科技有限公司 | A buried point encryption method for preventing crawler from crawling and tampering with data |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040044727A1 (en) * | 2002-08-30 | 2004-03-04 | Abdelaziz Mohamed M. | Decentralized peer-to-peer advertisement |
US20060190715A1 (en) * | 2005-02-22 | 2006-08-24 | Microsoft Corporation | Peer-to-peer network information retrieval |
US20070106896A1 (en) * | 2005-11-08 | 2007-05-10 | Sandberg Melanie J | Method and system for generating ciphertext and message authentication codes utilizing shared hardware |
US20080063209A1 (en) * | 2006-09-07 | 2008-03-13 | International Business Machines Corporation | Distributed key store |
US20090282048A1 (en) * | 2008-05-12 | 2009-11-12 | Microsoft Corporation | Application-configurable distributed hash table framework |
US20130173747A1 (en) * | 2011-11-21 | 2013-07-04 | Young Jin Kim | System, method and apparatus providing address invisibility to content provider/subscriber |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8165305B2 (en) * | 2008-12-08 | 2012-04-24 | Harrison Corporation | Enhanced relational database security through encryption of table indices |
-
2013
- 2013-03-13 US US13/798,746 patent/US9602280B2/en not_active Expired - Fee Related
-
2017
- 2017-02-14 US US15/432,707 patent/US20170163413A1/en not_active Abandoned
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040044727A1 (en) * | 2002-08-30 | 2004-03-04 | Abdelaziz Mohamed M. | Decentralized peer-to-peer advertisement |
US20060190715A1 (en) * | 2005-02-22 | 2006-08-24 | Microsoft Corporation | Peer-to-peer network information retrieval |
US20070106896A1 (en) * | 2005-11-08 | 2007-05-10 | Sandberg Melanie J | Method and system for generating ciphertext and message authentication codes utilizing shared hardware |
US20080063209A1 (en) * | 2006-09-07 | 2008-03-13 | International Business Machines Corporation | Distributed key store |
US20090282048A1 (en) * | 2008-05-12 | 2009-11-12 | Microsoft Corporation | Application-configurable distributed hash table framework |
US20130173747A1 (en) * | 2011-11-21 | 2013-07-04 | Young Jin Kim | System, method and apparatus providing address invisibility to content provider/subscriber |
Also Published As
Publication number | Publication date |
---|---|
US9602280B2 (en) | 2017-03-21 |
US20140270153A1 (en) | 2014-09-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9602280B2 (en) | System and method for content encryption in a key/value store | |
US10586057B2 (en) | Processing data queries in a logically sharded data store | |
US10873450B2 (en) | Cryptographic key generation for logically sharded data stores | |
JP6389895B2 (en) | Data security using keys supplied by request | |
CN105210079B (en) | Community-based deduplication for encrypted data | |
US9942032B1 (en) | Systems and methods for securely detecting data similarities | |
US11621834B2 (en) | Systems and methods for preserving data integrity when integrating secure multiparty computation and blockchain technology | |
US10608813B1 (en) | Layered encryption for long-lived data | |
US9020149B1 (en) | Protected storage for cryptographic materials | |
US11489660B2 (en) | Re-encrypting data on a hash chain | |
US20170019385A1 (en) | Method and apparatus for managing encryption keys for cloud service | |
WO2018122287A1 (en) | Method and system for search pattern oblivious dynamic symmetric searchable encryption | |
WO2015114947A1 (en) | Secret calculation method, secret calculation system, secret calculation server, registrant terminal, user terminal and program | |
US10587406B1 (en) | File system encryption with key rotation | |
US20220209945A1 (en) | Method and device for storing encrypted data | |
US10476663B1 (en) | Layered encryption of short-lived data | |
US9363247B2 (en) | Method of securing files under the semi-trusted user threat model using symmetric keys and per-block key encryption | |
US11381381B2 (en) | Privacy preserving oracle | |
US20170262546A1 (en) | Key search token for encrypted data | |
US8667281B1 (en) | Systems and methods for transferring authentication credentials | |
CN115225409B (en) | Cloud data safety duplicate removal method based on multi-backup joint verification | |
US9641328B1 (en) | Generation of public-private key pairs | |
CN106919348A (en) | Distributed memory system and storage method that anti-violence is cracked | |
WO2016202089A1 (en) | Method, apparatus, and system for encrypting data of remote storage device | |
Riad et al. | Secure storage and retrieval of IoT data based on private information retrieval |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |