Cryptographic Web Store
Switch branches/tags
Nothing to show
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Failed to load latest commit information.

Build Status CircleCI Coverity SonarQube Codacy CII Best Practices Software License

CWS - Cryptographic Web Store

CWS, Cryptographic Web Store, works like a "PGP for the Cloud". It is designed as a backend component with the vision that it should be possible to exchange data between multiple parties using encrypted storage, where both the parties involved and the data exchanged can be anything from simple files to complex data objects - CWS only cares about bytes.

Via the public API (REST or SOAP based WebServices), it is possible to access the internal logic, where keys are unlocked based on user credentials and used to encrypt and decrypt data, storing only encrypted keys and data. Using the same basic mechanism as PGP, combining Asymmetric & Symmetric keys, it is possible for multiple parties to exchange data safely and securely.

Since CWS only focused on bytes and does not have any care for more information, it can be used to store either files between users or data objects between apps or applications. This makes CWS the perfect companion for anyone who have Data Protection & Privacy concerns, such as GDPR.

CWS is written in Java 8 / Java EE 7, with no third-part depedencies, meaning that it can run on any Host or in any Cloud where a Java EE Container is available. The first version is using PostgreSQL as database, but thanks to the flexibility of Java EE, it is possible to use any database desired. Testing of CWS has been done using both WildFly and Payara.

Build, Install and Run

The final version 1.0 of CWS can be downloaded from JavaDog, version 1.1 is currently being developed. The aim is to constantly have a stable and usable system, so if needed - please download the sources and build CWS yourself. The build only requires Java JDK 8 (patch level 161 or greater), and Maven.

In the accessories/release folder, there is a number of files, which is used to install and run CWS. Please put the bin folder in your path, and then invoke either the or script, which will provide the options for configuring, deploying, starting & stopping CWS in either Payara or WildFly. The scripts can also create the database, but it does require that you have the correct permissions in PostgreSQL - see the README.txt file in the Accessories folder for details regarding this.

Developers only: If you want to build from source, run these steps to create the deployable WAR packages for either Payara or WildFly:

$ cd [ /path/to/cws/sources ]
$ mvn clean verify

Using the Payara or WildFly scripts to deploy the correct WAR file. Now copy the cws.war file in place.

$ export PATH=[ / path/to/cws/sources ]/accessories/release/bin:${PATH}
$ configure
$ deploy

Now, you should have a running version of CWS which can be reached from the following SOAP based URL's:


Who is this for

Anyone for whom data protection is important may find CWS useful. It is designed so everything is stored encrypted in a way, so only those who the data belongs to may access it. This is achieved by ensuring that the full control over all Keys is placed with the users.

Security Features

Besides, encrypting all data stored, the CWS also has a number of features to ensure that the security is as high as it can be, considering that it can be deployed in a "hostile" environment.

  • MasterKey - The MasterKey is used to encrypt and decrypt various information and it must be set at startup, since it is not persisted anywhere.
  • Removing sensitive data from memory - by overwriting it in memory, before it is being dereferenced. This should also include the keys, but due to a not implemented feature in Java, this is not the case.
  • Invalidate Accounts, this allows a member to force the keys to be replaced internally, so it is possible to log in and view Circles, but it will not be possible to extract data, as the keys are not the same as the ones, which was used in the Circles.
  • Data Corruption checks, to verify if there has been alterations to encrypted data, which may result in inability to properly extract information.

Release Plan

This is CWS 1.1 development branch - it will focus on the following features:

  • Copy Data from one Circle of Trust to a second, with a property flag to enable or disable the feature. By default, the feature is disabled.
  • Move Data from one Circle of Trust to a second, with a property flag to enable or disable the feature. By default, the feature is disabled. Further, the feature will require that the requesting Member is a Circle Administrator of the source Circle, and have write permissions in the target Circle.
  • Search Circles, Members & Data. Although, the CWS is storing very little information, it may still be necessary to search for somethnig using the simple names.
  • External control of the MasterKey via a URI, so it can be referenced from a central source and destroyed centrally, rather than the Administrator having to unlock it manually.
  • Re-key, i.e. force an update of the Keys used for a Circle or Member. This feature will have different ways to be triggered, either being forced with a request or it can be started if the key exceeds a certain age, the latter requires that the Circle is being used, as a re-key operation requires access to the existing key.

CWS 1.1 is not yet having a release date - but as the current feature list is rather short, it should not take long before it is being released.

Besides these features and others which may be requested, the plan is to make at first a simple command line tool to use the CWS with. This tool can be used as the basis for other Clients, including mobile apps and websites.

Wish to join

The overall quality of the software can only improve if more eyes look at it and help with implementing features and adding more tests. If you wish to join, please contact Kim Jensen (see below).

Code Quality

Code quality if very important, which means that we aim at 200% test coverage, which may sound ridiulous. However, it is meant in the way that we aim at having both standard tests (JUnit) and external testing (FitNesse), where both suites are covering as much as possible. Of course, external testing cannot and should not cover the same bases as the standard tests.

The tests written, have been written using JUnit only, i.e. no mocking. Mocking is unreliable in testing, as you simply test your mocks rather than your logic. For that reason, CWS is using faking for tests, meaning that the buildup of the expected result will demand a bit more work, but as the code is properly tested, it also has the added advantage of giving more reliable tests.

The code is also checked against as mane analysis tools as possible. The final code must have 0 issues of any kind - before it is considered ready for submitting into the main repository.


Docummentation of code is also important, having silly comments is meaningless, but often it helps to add inline comments to explain intentions and reasoning for choices made. But, commenting out code is banned, if it is commented out, it is meaningless and should be removed.

Style Guide

The style guide is simple, it is more or less the default from IntelliJ. Only important guideline is don't use tabs. mixing tabs and spaces means that the code looks unreadable, and the default indentation is made with spaces. All Classes have a default header, which must also be applied.

Software License

The CWS is released under Apache License 2 or APL2.


Kim.Jensen at