In one embodiment, a method is provided that may include one or more
operations. One of these operations may include, in response, at least in
part, to a request to store input data in storage, encrypting, based
least in part upon one or more keys, the input data to generate output
data to store in the storage. The one or more keys may be authorized by a
remote authority. Alternatively or additionally, another of these
operations may include, in response, at least in part, to a request to
retrieve the input data from the storage, decrypting, based at least in
part upon the at least one key, the output data. Many modifications,
variations, and alternatives are possible without departing from this
embodiment.