Replies: 2 comments 10 replies
-
I will have a proper think about this when I can, but just to quickly note that on Azure and it’s not obvious whether the token permission can set to a specific sub-folder like |
Beta Was this translation helpful? Give feedback.
-
The SAS token permissions are listed here. The documentation suggests using 'list' and 'write' (not 'read'). So, the uploader would then be able to see the names of existing blobs, but not their contents, and to write new blobs. If we want to hide the names themselves we could remove the 'list' permission. You would need to be a bit careful to make sure that no one overwrites existing data. E.g. two providers upload a directory with the same name. @DDelbarre Thanks for thinking about this. If you make this clear when making an ingress request I believe it should be possible. @craddm @edwardchalstrey1 If either of you have a sandbox running, could you check exactly what you can see with and without the list permission? I.e. can you see all filenames, just the top-level directories or something else. We should be confident how this works before making an recommendations. This would be a great addition to the documentation. |
Beta Was this translation helpful? Give feedback.
-
When ingressing data via Azure Storage Explorer, it is possible for whovever is uploading the data to see (but not read) the other directories and files in the
/data
volume of the SRE.For projects like EDoN, where there are a number of separate data providers who will ingress data into an SRE, this could be quite problematic. This is because data providers will be able to see the files and directories uploaded by the other providers. In cases where there are files like medical images (e.g. MRI scans) these typically have patient IDs in the file names, which we would not want other providers to see.
I was wondering if it was possible to restrict what data providers can see when ingressing data? I had an idea as to how this could be implemented, but there are probably other approaches too!
We currently use the following directory structure for EDoN in
/data
:If we changed to something like the following, the data providers could be given an upload token to their specific directory. That way they could still see the data that they have uploaded previously (which could be useful for them to ensure they are not re-uploading duplicated data) but they would not be able to see anything else.
In the forms that are used for recording the details of the data ingress prior to it taking place, there could also be a section where the storage location could be specified to ensure that access is being given to the appropriate location.
Beta Was this translation helpful? Give feedback.
All reactions