You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
One approach to privacy would be to store data so that only the client knows who has the data. But a better way is to encrypt the data using keys maintained by each client so that the data is publicly available but only the client can decipher it.
It's possible that the index (mapping filenames to blocks), and the block catalog (mapping blocks to filenames), should be maintained by each client since, indeed, each client may have their own filenames for the same data. Of course, the data being encrypted means that even if two clients store the same file on the network, these would be treated as distinct by the filesystem since the actual stored data would be different.
For a file F, the cycle with encryption would look like:
F - encrypt -> F' - encode -> F'' - decode -> F' - decrypt -> F
For the same reasons as #5, encoding for error recovery should be the last step, done after encryption.
Including compression, the full cycle would look like:
F - compress -> F' - encrypt -> F'' - encode -> F''' - decode -> F'' - decrypt -> F' - decompress -> F
It's important to compress before encrypting because encryption yields data that is uniformly distributed and contains minimum redundancy, making it effectively incompressible.
The text was updated successfully, but these errors were encountered:
One approach to privacy would be to store data so that only the client knows who has the data. But a better way is to encrypt the data using keys maintained by each client so that the data is publicly available but only the client can decipher it.
It's possible that the index (mapping filenames to blocks), and the block catalog (mapping blocks to filenames), should be maintained by each client since, indeed, each client may have their own filenames for the same data. Of course, the data being encrypted means that even if two clients store the same file on the network, these would be treated as distinct by the filesystem since the actual stored data would be different.
For a file F, the cycle with encryption would look like:
F - encrypt -> F' - encode -> F'' - decode -> F' - decrypt -> F
For the same reasons as #5, encoding for error recovery should be the last step, done after encryption.
Including compression, the full cycle would look like:
F - compress -> F' - encrypt -> F'' - encode -> F''' - decode -> F'' - decrypt -> F' - decompress -> F
It's important to compress before encrypting because encryption yields data that is uniformly distributed and contains minimum redundancy, making it effectively incompressible.
The text was updated successfully, but these errors were encountered: