Local data encryption for cloud storage

Old Companions

In addition to the programs designed for encrypting data in the cloud, Linux offers other cryptotools, including GnuPG [14] and the obsolete TrueCrypt [15], although it is now available as a fork named VeraCrypt [16].

GnuPG is typically used to encrypt email (e.g., for use with Enigmail [17]). Thanks to the tool, any Linux user can encrypt files locally and drop them into a cloud folder to synchronize the data. However, this solution requires some manual work. For example, you need to make sure not to send unencrypted content to the cloud folder or decrypt files in the wrong folder and then accidentally sync them to the cloud. If you still want to use GnuPG, you should think about using scripts that handle the important work steps, thus preventing errors.

Using TrueCrypt or its successor VeraCrypt (Figure 5), you can create encrypted containers that a folder intended for the cloud can then synchronize. Only users who know the password and have the container mounted will see the content. The disadvantages are that small changes to the files in the container affect the entire container, which means that unless the provider supports block-level synchronization, the service syncs the complete container, even if just one character changes in a file.

Figure 5: After the developers gave up on TrueCrypt, VeraCrypt took over.

eCryptfs [18], which Ubuntu uses [19], is also worthy of mention. The kernel-based encrypted filesystem is mounted on an existing filesystem (e.g., ext4). eCryptfs then creates two directories (~/Private and ~/.Private) by default and writes the encryption information to the headers of the files to be encrypted. eCryptfs automatically stores files that the user saves to ~/Private as encrypted files in ~/.Private. From there, you can upload to the cloud. However, you can customize the software to suit your own needs and locate the encrypted folder in Dropbox. eCryptfs is not foolproof, however, because an attacker that gets hold of the password can read the encrypted user directories.

Conclusions

Programs that have been designed especially for encrypting cloud data seem to offer the better approach all told. Cryptomator is currently only available as a beta version; nonetheless, it still demonstrated the strongest performance in the lab. It also appears to be the easiest to use of the tested programs.

PanBox offers more features and therefore also requires more time for training. Assuming that the bugs encountered during testing are resolved in the future, PanBox also seems to be a strong candidate for handling data for the cloud.

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

comments powered by Disqus
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News