Skip to content

file self encryptor

License

Unknown, GPL-3.0 licenses found

Licenses found

Unknown
LICENSE
GPL-3.0
COPYING
Notifications You must be signed in to change notification settings

maveric/self_encryption

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

self_encryption

Self encrypting files (convergent encryption plus obfuscation)

Crate Travis Appveyor Coverage
Build Status Build status Coverage Status

| API Documentation | MaidSafe System Documention | MaidSafe web site | Safe Community site |

#Overview

A version of convergent encryption with an additional obfuscation step. This pattern allows secured data that can also be de-duplicated. This library presents an API that can be utilised in any application that provides a POSIX like filesystem interface, dealing very effectively with the content part of any data (in tests the parallelised approach can actually be faster than reading/writing data as a single stream). It is important to realise two important aspects of this library:

  1. This library deals with file content only
  2. This library provides very secure data, but does return a data structure (DataMap) that in turn requires to be secured.

![image of self encryption] (https://github.com/maidsafe/self_encryption/blob/master/img/self-encryption.png?raw=true)

ToDo list

  • Initial structure
  • Test set-up
  • Travis integration
  • Docs creation
  • Docs hosting (github.io)
  • Windows CI set-up (ci.AppVeyor.com)
  • Read/Write file in memory based buffer
  • API version 0.0.8
  • Implement disk based interface as example
  • Full unit tests in lib.rs
  • Integrations tests in tests module
  • Benchmark tests for varying file sizes from 1 byte to 10 M/b
  • API stable version 0.1.0
  • Add compression pre encrypt and post encrypt in encrypt and decrypt methods
  • Add task passing to allow cores to be lit up when handling chunks
  • Allow any size file
    • Replace sequencer with new struct and use BufferedStream to offload to disk (MemoryMapped file)
    • Clean up any cache chunks when disk space is low (start + now < 90%)
    • Store intermediate chunks when disk space is low (start + now < 90%)
  • Add another functor to constructor to allow storage query for chunks (not get)
  • Check for first last middle chunks on net and presume file stored
  • Coverage analysis (coveralls ?)
  • Uncomment benchmark tests read methods (require bench in beta channel or stabilised first)

#Video of the process [self_encryption process and use case video] (https://www.youtube.com/watch?v=Jnvwv4z17b4)

Examples

Using self_encryptor

This library splits a file into encrypted chunks and also produces a data map for the same. This data map with encrypted chunks enables the file to be reconstituted. Instructions to use the 'basic_encryptor' example are as follows:

  1. Install RUST(Nightly build).
  1. Install gcc.
  • Linux: sudo apt-get install gcc
  • Windows: Any compatible gcc such as TDM-GCC
  1. Clone this repo / Download as zip and extract archive.
  • To clone via Git: git clone http://github.com/maidsafe/self_encryption.git
  1. Browse to repo locally in terminal / command prompt.
  • cd self_encryption
  1. Encrypt a file:
  • cargo run --example basic_encryptor -- -e <full_path_to_any_file>

You should now have the example binary in ../self_encryption/target/debug/examples/. The data_map for the given file and it's encrypted chunks will be written to the current directory.

  1. Decrypt a file:
  • cargo run --example basic_encryptor -- -d <full_path_to_data_map> <full_destination_path_including_filename>

This will restore the original file to the given destination path.

About

file self encryptor

Resources

License

Unknown, GPL-3.0 licenses found

Licenses found

Unknown
LICENSE
GPL-3.0
COPYING

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Rust 100.0%