Streaming Endpoints in ANKA Secure
ANKA Secure provides streaming-based cryptographic endpoints via the CryptoStreamingApiController
. Unlike classic JSON endpoints that accept Base64-encoded data, these endpoints allow raw data to flow in and out without being fully loaded into memory or stored in temporary files. This design supports large-scale file encryption/decryption, signing, or re-encryption with minimal overhead.
1. Motivation & Overview
- Memory Efficiency: Instead of buffering entire files (which can be very large), data is streamed from the request input stream directly into cryptographic operations, then streamed back to the response.
- Performance: This approach is more network- and memory-efficient—the data is processed as it arrives, and the output is sent as it is produced.
- Security: Avoiding temporary files lowers security risks (no leftover artifacts on disk).
- Multipart: By using
multipart/form-data
, we can pass small JSON “metadata” (e.g., key alias, algorithm) alongside a “file” part containing raw data.
2. Endpoints Overview
All streaming endpoints live under @RequestMapping("/api/crypto/stream")
. The major operations include:
-
Symmetric
- Encrypt:
POST /api/crypto/stream/symmetric/encrypt
(metadata
=SymmetricEncryptionMetadata
,file
= raw plaintext) - Decrypt:
POST /api/crypto/stream/symmetric/decrypt
(metadata
=SymmetricDecryptionMetadata
,file
= raw ciphertext)
- Encrypt:
-
Asymmetric
- Encrypt:
POST /api/crypto/stream/asymmetric/encrypt
(metadata
=AsymmetricEncryptionMetadata
,file
= plaintext) - Decrypt:
POST /api/crypto/stream/asymmetric/decrypt
(metadata
=AsymmetricDecryptionMetadata
,file
= ciphertext)
- Encrypt:
-
Signing/Verification
- Sign:
POST /api/crypto/stream/sign
(metadata
=AsymmetricSignMetadata
,file
= raw data)
Returns the signature bytes inapplication/octet-stream
. - Verify:
POST /api/crypto/stream/verify
(metadata
=VerifySignatureMetadata
,file
= raw data)
Returns a JSON response{ "isValid": true/false }
.
- Sign:
-
Re-encrypt
- Re-encrypt:
POST /api/crypto/stream/reencrypt
(metadata
=ReencryptDataMetadata
witholdAlias
+newAlias
,file
= old ciphertext)
Decrypt witholdAlias
→ re-encrypt withnewAlias
, all streamed, returning new ciphertext.
- Re-encrypt:
-
Re-sign
- Resign:
POST /api/crypto/stream/resign
(metadata
=ResignDataMetadata
witholdAlias
,newAlias
, andoldSignatureBase64
,file
= data)
1) Verifies old signature witholdAlias
(public key).
2) If valid, signs data withnewAlias
(private key).
3) Streams back the new signature in raw bytes.
- Resign:
-
Utility (No KeyStore usage)
- Public Key Encryption:
POST /api/crypto/stream/asymmetric/publickey-encrypt
(metadata
=AsymmetricPublicKeyUtilityEncryptionMetadata
,file
= plaintext)
The public key is supplied in Base64, and no alias is used. - Public Key Verification:
POST /api/crypto/stream/asymmetric/publickey-verify
(metadata
=AsymmetricPublicKeyUtilityVerificationMetadata
,file
= raw data)
Checks signature with the provided public key (Base64), returns JSON with{ "valid": true/false }
.
- Public Key Encryption:
3. Example Flow: Re-Encryption Endpoint
The re-encrypt endpoint (POST /api/crypto/stream/reencrypt
) demonstrates how streaming avoids memory overhead:
-
Client sends
multipart/form-data
:metadata
(JSON) with"oldAlias"
(private key) +"newAlias"
(public key).file
: old ciphertext.
-
Controller (
reencryptDataStream
) checks both aliases. - Builds a
StreamingResponseBody
to handle output streaming. -
Inside a try/finally block:
- Decrypt the data using
oldAlias
. - Immediately encrypt that plaintext using
newAlias
. - Writes the new ciphertext to the response output stream in real-time.
- Decrypt the data using
-
No large buffers in memory or temporary files are used:
- The input stream is read in chunks.
- The output stream is also written in chunks.
-
The response returns
HTTP 200 OK
withapplication/octet-stream
.
4. Example Flow: Re-Signing Endpoint
Re-sign (POST /api/crypto/stream/resign
) flows similarly, but for signatures:
-
Client sends
multipart/form-data
:metadata
(JSON) witholdAlias
,newAlias
, andoldSignatureBase64
.file
: the raw data that was previously signed.
-
Controller verifies the old signature with
oldAlias
(public key):- If invalid, returns an error (e.g., 400 or 404).
- If valid, signs the same data with
newAlias
(private key).
- Streams the new signature (raw bytes) to the client in
application/octet-stream
. - Avoids loading the entire file or signature in memory. Instead, the data is streamed, and verification plus signing are performed in a chunk-wise manner.
5. Threading & Context Management
Because streaming often involves a separate thread or asynchronous I/O, we must ensure:
- Geolocation & Usage:
executeWithGeolocationAndUsageVoid
- Captures IP, location, user info, request method, and response status in a try/finally.
-
Logs usage after streaming finishes.
-
Audit Context:
executeWithAuditContextVoid
-
Similarly captures an AuditEvent (start time, end time, success/failure).
-
Usage Context:
executeWithUsageContextVoid
- Preserves a thread-local
UsageContextHolder
(including a transaction ID in MDC). - Each nested call is in a try/finally, guaranteeing we cleanup even if an exception is thrown.
These nested method calls ensure that usage logging, geolocation, and auditing proceed consistently, even if streaming is done on a separate thread from the main request.
6. No Temporary Files, Minimal Memory
A key design choice:
- Multipart is handled without standard Spring's auto-file upload (or with minimal auto-handling), meaning we do not store entire uploads in memory.
- We rely on streaming via
MultipartFile.getInputStream()
, or disablingspring.servlet.multipart.enabled=false
if you parse manually. - The output is a
StreamingResponseBody
, which writes directly to the responseOutputStream
.
Advantages:
- Large files (e.g., multi-GB) can be encrypted or re-encrypted without spiking memory usage.
- Minimizes disk usage and security exposure by avoiding temp files.
- The user experiences a streaming data flow from client → server → server → client.
7. Additional Operations
In CryptoStreamingApiController
you also have:
-
Symmetric Encryption/Decryption
- Accepts a
SymmetricEncryptionMetadata
orSymmetricDecryptionMetadata
(JSON) + file part. - Streams the result back.
- Accepts a
-
Signing
- Returns raw signature bytes in
application/octet-stream
.
- Returns raw signature bytes in
-
Signature Verification
- Returns a short JSON message, e.g.,
{"isValid": true}
, after verifying the streamed data plus a Base64 signature.
- Returns a short JSON message, e.g.,
-
Public Key Utility Endpoints (
publickey-encrypt
,publickey-verify
)- For ephemeral public keys not in the KeyStore.
- Decodes them from Base64, then streams encryption or verification.
8. Summary
- Streaming Endpoints:
POST /api/crypto/stream/...
- All use multipart/form-data with a metadata JSON part and a file binary part.
- Memory Efficiency:
- Data is processed in chunks without loading entire files in memory.
- No temp files are used, avoiding disk I/O overhead.
- Threading & Context:
- The code uses nested calls to
executeWithGeolocationAndUsageVoid
,executeWithAuditContextVoid
, andexecuteWithUsageContextVoid
. - Each layer ensures logs, usage, and audit data is captured, even in a separate streaming thread.
- The code uses nested calls to
- Re-Encryption:
- Demonstrates reading old ciphertext from
oldAlias
(private key) → decrypt → newAlias (public key) → encrypt → stream to response.
- Demonstrates reading old ciphertext from
- License Usage:
- Each operation can enqueue usage data to the License Server via usage context, ensuring pay-per-use billing is accurate.
With this design, ANKA Secure handles large-file encryption, signing, verification, and re-encryption in a secure, scalable, and streaming manner.