Abstract: Embodiments of a secure file transaction system employ a host to receive a file manipulation request for a secure file from a requester, determine whether the requester is authorized for the file manipulation request, issue an authentication challenge to the requester, issue an approval request to the file owner and process the file manipulation request based upon obtained authentication and approval.