(Matthew, I think I can help "translate" what you said into terms of what Terry asked -- at least, let's see if I can.)
Terry, let me rephrase/simplify your question a little bit first -- ignoring pervasive encryption, can your edge server directly access the z Series disk array and directly read the (unencrypted) data stored on it? If it can -- then you probably can not use pervasive encryption on that dataset or HFS or other file structure, because if it were encrypted, only the mainframe would have access to the keys to decrypt that data in order to process it. (This is not to say that the data array can't use internal hardware encryption to protect the media, and that would decrypt data -- but pervasive encryption causes only Encrypted data to be stored on the array, which would be doubly encrypted by the array hardware as well.)
So what Matthew described is what I believe you consider to be "downloading the data" -- you either need to use a file transfer of some kind (like FTPS or SFTP or NDM or whatever) to copy the data to your edge server (and the pervasive encryption would decrypt the data before the transfer happens); or you need to access the data needed via some sort of API or Web Service or DB2 service that would select the data requested (decrypting it along the way) and handing it to the requester. And, as he said, it is fast enough to provide the decrypted data to your edge server for it to provide transactional processing.
So the short answer is, once pervasively encrypted, you must use some sort of z series access service to "download" the data to your edge server to access the data, and it should be able to do that fast enough for you. You won't be able to directly access the data array and get the data while encrypted. (Your mileage may vary...)
------------------------------
Scott Tietjen CISSP
------------------------------
Original Message:
Sent: Thu January 02, 2020 09:41 AM
From: Matthew Cousens
Subject: Encryption & Virtual Data
Hi Terry. I'm not sure I completely understand your question but let me take a stab at it to at least start the conversation.
Data that is encrypted on Z can be "shared" just like data that is unencrypted. The operating system on Z (ex: z/OS) will decrypt the file when it accesses it, before it hands the data off to whatever process is accessing it.
Data needs to be decrypted for processing. Let's look at a sample use case for clarification. Let's say data is stored in a Db2 database on z/OS and we do some processing with that data on a cell phone. The data is encrypted by z/OS when Db2 writes it to disk. When the user accesses it via mobile device, Db2 asks z/OS to read the data and z/OS decrypts it for Db2 which then sends it to the mobile device. Of course it could be re-encypted during transport by something like AT-TLS.
Can Z can keep up with the demands of timely transactions given this encryption? Yes, in fact Z is built for this sort of thing -- some call it a crypto beast. This is accomplished by on-CPU crypto coprocessors and I/O (Crypto Express) cards.
Does this help?
------------------------------
Matthew Cousens
Original Message:
Sent: Tue December 31, 2019 08:19 AM
From: Terry Critchley
Subject: Encryption & Virtual Data
Can a pervasively encrypted z series share virtual data with a subsidiary (e.g, edge) server without having to download the data? If it could (or resorted to download) for use on the subsidiary, could it be decrypted fast enough on it to be of use in transaction work?
Terry
------------------------------------------------------------------------------
regards,
Dr Terry Critchley (ex-IBM) +44 7902269856
"You never change things by fighting the existing reality. To change something, build a new model that makes the existing model obsolete." - Buckminster Fuller