Zombse

The Zombie Stack Exchanges That Just Won't Die

View the Project on GitHub anjackson/zombse

What are the pros and cons to encrypting digital files a Library or Archive is preserving?

Encrypting content could help ease fears about unauthorized access (say to copyrighted materials or sensitive information) but it results in a dependency on encryption keys. I would be curious to know what people see as the pros and cons of encrypting content a stewardship organization is preserving. With the pros and cons in mind, when (if ever) do you think a responsible organization should be encrypting files they are preserving and when do you think they shouldn't?

Trevor Owens

Comments

Answer by Nick Krabbenhoeft

Pros:

Cons:

Personally, encryption for restricted files is not appealing. It increases the repository's exposure to catastrophic losses and the demands on the repository's internal and external monitoring processes. I would prefer to restrict access with locked-down terminals in controlled locations, strong user authentication requirements for remote access, or other solutions.

An intermediary solution might be the iTunes solution. Songs on its central server are encrypted, but the key is stored in the file. When you buy a song, this key is encrypted with a random key unique to your account.

Only in cases where information must remain protected (e.g. NSA servers) does a repository of encrypted data warrant the preservation risks.

Comments

Answer by Cory Snavely

Pros:

Cons:

Not-cons: :)

As with almost every other design aspect of digital preservation repositories, the use of encryption presents both utility and risk that should be carefully considered.

Comments

Answer by Henk Koning

I recently have been doing some experimentation with encryption. I think at this moment that encryption is a useful and easy way to add one extra layer of protection, in the (rare) cases where this is felt necessary above the established level of security.

All security measures can lose their effectiveness over time, so all measures must be actively managed.

There is indeed a 'problem' of the management of the decryption keys. This problem should not be exaggerated. I have been looking for best practices for managing decryption keys, but up until now found no good reference for this. Any references welcome!

I can offer these points for consideration: - the decryption keys should be stored in way that is technically and logically sufficiently separated from the storage of the corresponding files, so that an intruder who achieves access to the encrypted files is not likely to have access to the decryption keys. This is a very important point and should be considered carefully and repeatedly (external security audit?). - the decryption keys should never be transported together with the related encrypted files - storage of the decryption keys does not / should not have a higher level of security as the storage of the encrypted files. The reason for this is that the organization is probably not familiar with higher levels of security, and higher levels of security introduce risks (too few people informed; unfamiliar technical solutions; no security audits because it is so little data) - don't use generic decryption keys which apply to a lot of files

Whether these suggestion really apply depends very much on the scenario you have in mind. At this moment I am thinking of a small number of selected files in our archive which are encrypted.

A completely different scenario would be an extra copy of all the files in our archive stored somewhere in the cloud, with all the files having the same decryption key. In this scenario it is not the problem of the management of decryption keys, but the management of this single one decryption key. Probably known only within a small circle of technical supporters. A loss of the key is no problem, as long as it is discovered soon. In that case the level of added data security because of the extra copy of all the files is lowered until a new copy is produced. The same goes for the account information and the passwords you need to access the extra copy. A seed based on the file name and path can help here. If you don't trust the cloud environment all encrypting and decrypting should take place in the original data environment.

Comments