Custom Tag-based field encryption/decryption blog series
This is the first blog of a two-blog series.
From the Health Insurance Portability and Affordability Act (HIPAA) of the United States to the latest General Data Protection Regulation (GDPR) of the European Union, various compliance regulations have requirements for data encryption to ensure data privacy and security. It is inevitable to encrypt data at rest to comply with the various compliance standard rules.
Fig 1: Data encryption isometric flowchart.
Encryption has its own set of challenges and efforts involved and might be time-consuming based on the complexity and number of fields, and the functional impact it influences on the system. To tackle this, an in-home framework for encryption/decryption which requires minimum changes from a developer has been developed. This framework is reliable, robust, and adapts itself well for any key rotations.
Advanced Encryption Standard (AES-256) has been used for the above framework.
AES encryption is a symmetric method established by the U.S. National Institute of Standards and Technology. Through a series of robust security steps and a complex 256-bit decryption key, this standard is nearly impossible to break with brute-force methods and has been approved for the handling of confidential data by the U.S. Government.
Possible ways of encrypting and decrypting the data are:
- At the database layer.
- At the code layer using standard package.
- At the code layer, using third-party libraries.
However, some of the drawbacks that come along while implementing the above steps are:
- There is a manual task involved to encrypt the data before inserting it into DB and then decrypting back to show the API response.
- Increases Broilerplate code
- Dependency on third-party libraries
- Requires more development efforts (Typically 1- 2 days based on complexity)
A custom tag-based field encryption-decryption framework has been developed for a project using Golang as a back-end programming language. The framework is currently developed in a private setup.
Some benefits of the framework are:
- Easy to plug in.
- Can be reused by any number of projects
- Less / No Broilerplate code
- Considerable effort and time savings.
Steps to encrypt and decrypt using the newly developed framework.
- Add a tag named `transcode:”” ` across the fields that need to be encrypted
- Invoke the encode and decode methods of the framework to encrypt and decrypt the data, respectively.
Under the hood of the framework
- The 32 bytes key is maintained in the secret manager and read via the environment file.
- The Block Cipher is formed only once during server startup using the above key.
- The framework uses the reflection technique to read the tags from the struct.
- It encodes/decodes the field accordingly based on the type of the field.
Let’s dive into the implementation using the custom tag-based field encryption framework
Fig 2: The above snippet shows the tags across the fields that need to be encrypted-decrypted.
Fig 3: The above example helps to encrypt the customer’s first name, last name, and email ID.
Fig 4: The above example helps to decrypt the customer’s first name, last name, and email ID.
How is the framework unique and efficient?
- The framework is scalable and works seamlessly with all projects running on Golang.
- There is not much of an impact on the performance, as the blob cipher is formed using the 32 bytes key on the server start-up.
- Third-party packages in the market provide encrypting features, but they do not support encryption and decryption together.
In the above example, tag-based encryption and decryption are achieved with a minimal amount of coding effort. However, there is a scope for optimization in the area where the Encode and Decode methods are invoked. Instead of calling these methods every time encryption or decryption is required, what if the fields got encrypted just by adding only tags and a few gorm hooks?
Stay tuned for the second part of this blog to know more about this….
Authored by –
5 Factors to Consider when Choosing The eLearning Technology Partner for Your Organization
Strategic outsourcing of specialized learning solutions and services such as cognitive learning and courseware development technologies are common across various business verticals. When...
How to Increase Efficiency in Publishing Workflows Using AI Services Powered by Impelsys SSAM.ai
The modern publishing industry is gradually adopting automation tools powered by Artificial Intelligence (AI) and NLP-based algorithms to cost-effectively solve the challenges they...
Importance of Bridging Human Expertise with Artificial Intelligence to Drive Accurate Metadata Tagging for Publishers
Technology innovations like digitization have led to monumental shifts in the functioning and growth of traditional industries. The publishing industry has realized this...