... | ... | @@ -10,9 +10,9 @@ Finally, the encrypted archive and the hash are uploaded using SFTP protocol whi |
|
|
On the server side, once the archive is properly uploaded, the server will decrypt the encrypted archive using its own private key. Then, it will compare the uploaded hash to the hash generated by the server from the decrypted archive to ensure that the content was never changed during the transfer. Finally, if everything goes well, the metadata file is parsed and loaded inside the database. As the server cannot guess for which project of the laboratory the uploaded sequences belong to, an assignment task will be generated.
|
|
|
|
|
|
Advantages of the Transfer Tool and SFTP services:
|
|
|
**It keeps the data safe from hackers.** Asymetric/public key encryption means only the laboratory sender and the SPSP server have access to the unencrypted data. While in transit, the data remains completely encrypted.
|
|
|
**It uses a secured tunnel.** SFTP protocol protects the integrity of the data using encryption and cryptographic hash functions, and authenticates both the server and the laboratory.
|
|
|
**It checks that the data is left untouched.** By generating a hash, the TT makes sure that the data was never modified during the whole process.
|
|
|
- **It keeps the data safe from hackers.** Asymetric/public key encryption means only the laboratory sender and the SPSP server have access to the unencrypted data. While in transit, the data remains completely encrypted.
|
|
|
- **It uses a secured tunnel.** SFTP protocol protects the integrity of the data using encryption and cryptographic hash functions, and authenticates both the server and the laboratory.
|
|
|
- **It checks that the data is left untouched.** By generating a hash, the TT makes sure that the data was never modified during the whole process.
|
|
|
|
|
|
![Transfer Tool diagram](uploads/43af38e6b29925525e974b021ae6df82/diagram.png)
|
|
|
|
... | ... | |