检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn

不再显示此消息

  • Intl-English
    International
    • English
    • Bahasa Indonesia
    • Español
    • Português
    • Türkçe
    • عربي
    • ไทย
    • 简体中文
    • 日本語
    中国站
    • 简体中文
    Europe
    • English
    • Deutsch
    • Español
    • Français
    • Nederlands
  • Huawei Cloud
    • Activities
    • Products
    • Solutions
    • Pricing
    • KooGallery
    • Partners
    • Developers
    • Support
    • About Us
    Hot
    • Free Packages
    • Elastic Cloud Server (ECS)
    • Object Storage Service (OBS)
    • ModelArts
    • Cloud Container Engine (CCE)
      Show more results for “”
      • Contact Us
      • Documentation
      • Console
        • My Account
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Sign In Sign Up
      • Sign In
      • Sign Up
        • My Account Complete Sign Up
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Log Out
      Cancel
      Hot
      • Free Packages
      • Elastic Cloud Server (ECS)
      • Object Storage Service (OBS)
      • ModelArts
      • Cloud Container Engine (CCE)
        • All
        • Products
        • Solutions
        • Documentation
        • KooGallery
        • Developer
        • Learn
        • Others
        1696 results found.
        • How Do I Use a DEK? - Data Encryption Workshop

          How Do I Use a DEK? - Data Encryption Workshop

          A data encryption key (DEK) is used to encrypt data. Using KMS, you can create, encrypt, and decrypt DEKs. The KMS system does not save, manage, or track your DEKs, neither does it use the DEKs to encrypt or decrypt data.

          Help > Data Encryption Workshop > FAQs > KMS Related
        • CREATE COLUMN ENCRYPTION KEY - GaussDB

          CREATE COLUMN ENCRYPTION KEY - GaussDB

          If you specify the SM4 algorithm to encrypt CEKs when creating a CMK, you must specify the SM3 and SM4 algorithms (SM4_SM3) to encrypt data when creating CEKs.

          Help > GaussDB > Developer Guide(Distributed_V2.0-8.x) > SQL Reference > SQL Syntax > C
        • CREATE COLUMN ENCRYPTION KEY - GaussDB

          CREATE COLUMN ENCRYPTION KEY - GaussDB

          If you specify the SM4 algorithm to encrypt CEKs when creating a CMK, you must specify the SM3 and SM4 algorithms (SM4_SM3) to encrypt data when creating CEKs.

          Help > GaussDB > Developer Guide(Centralized_V2.0-8.x) > SQL Reference > SQL Syntax > C
        • CREATE COLUMN ENCRYPTION KEY - GaussDB

          CREATE COLUMN ENCRYPTION KEY - GaussDB

          If you specify the SM4 algorithm to encrypt CEKs when creating a CMK, you must specify the SM3 and SM4 algorithms (SM4_SM3) to encrypt data when creating CEKs.

          Help > GaussDB > Developer Guide(Distributed_V2.0-3.x) > SQL Reference > SQL Syntax
        • CREATE COLUMN ENCRYPTION KEY - GaussDB

          CREATE COLUMN ENCRYPTION KEY - GaussDB

          If you specify the SM4 algorithm to encrypt CEKs when creating a CMK, you must specify the SM3 and SM4 algorithms (SM4_SM3) to encrypt data when creating CEKs.

          Help > GaussDB > Developer Guide(Centralized_V2.0-3.x) > SQL Reference > SQL Syntax
        • Managing Encrypted EVS Disks - Elastic Volume Service

          Managing Encrypted EVS Disks - Elastic Volume Service

          EVS enables you to encrypt data on newly created disks as required. For details, see Purchasing an EVS Disk. It uses the industry-standard XTS-AES-256 cryptographic algorithm and keys to encrypt EVS disks.

          Help > Elastic Volume Service > User Guide
        • CREATE COLUMN ENCRYPTION KEY - GaussDB

          CREATE COLUMN ENCRYPTION KEY - GaussDB

          If you specify the SM4 algorithm to encrypt CEKs when creating a CMK, you must specify the SM3 and SM4 algorithms (SM4_SM3) to encrypt data when creating CEKs.

          Help > GaussDB > Developer Guide(Distributed_V2.0-2.x)
        • Developer Guide(Centralized_V2.0-2.x) - GaussDB

          Developer Guide(Centralized_V2.0-2.x) - GaussDB

          If you specify the SM4 algorithm to encrypt CEKs when creating a CMK, you must specify the SM3 and SM4 algorithms (SM4_SM3) to encrypt data when creating CEKs.

          Help > GaussDB > Developer Guide(Centralized_V2.0-2.x)
        • Using the Encryption Tool of the Flume Client - MapReduce Service

          Using the Encryption Tool of the Flume Client - MapReduce Service

          Run the following command to switch the directory: cd fusioninsight-flume-Flume component version number/bin Run the following command to encrypt information: ./genPwFile.sh Input the information that you want to encrypt twice.

          Help > MapReduce Service > Component Operation Guide (LTS) > Using Flume > Enterprise-Class Enhancements of Flume
        • Using the Encryption Tool of the Flume Client - MapReduce Service

          Using the Encryption Tool of the Flume Client - MapReduce Service

          Run the following command to switch the directory: cd fusioninsight-flume-Flume component version number/bin Run the following command to encrypt information: ./genPwFile.sh Input the information that you want to encrypt twice.

          Help > MapReduce Service > Component Operation Guide (Normal) > Using Flume > Enterprise-Class Enhancements of Flume
        • Does OBS Support Encrypted Upload? - Object Storage Service

          Does OBS Support Encrypted Upload? - Object Storage Service

          You can encrypt objects while uploading. Data is encrypted on the server and then stored in OBS. When downloading the encrypted objects, the encrypted data will be decrypted on the server and displayed for you in plaintext.

          Help > Object Storage Service > FAQs > Server-Side Encryption
        • Example 2: Encrypting or Decrypting Large Volumes of Data - Data Encryption Workshop

          Example 2: Encrypting or Decrypting Large Volumes of Data - Data Encryption Workshop

          The ciphertext DEK was generated by using a CMK to encrypt the plaintext DEK. Use the plaintext DEK to encrypt a plaintext file, generating a ciphertext file. Store the ciphertext DEK and the ciphertext file together in a permanent storage device or a storage service.

          Help > Data Encryption Workshop > API Reference > Application Examples
        • Can I Update CMKs Created by KMS-Generated Key Materials? - Data Encryption Workshop

          Can I Update CMKs Created by KMS-Generated Key Materials? - Data Encryption Workshop

          You can only use KMS to create new CMKs to encrypt and decrypt data. Parent topic: KMS Related

          Help > Data Encryption Workshop > FAQs > KMS Related
        • Managing Encrypted Disks - Dedicated Distributed Storage Service

          Managing Encrypted Disks - Dedicated Distributed Storage Service

          You can create new disks and determine whether to encrypt the disks or not. When a disk is created from a backup, the encryption attribute of the new disk will be consistent with that of the backup's source disk.

          Help > Dedicated Distributed Storage Service > User Guide > Disk Management
        • How Do I Obtain Access Keys (AK/SK Pairs) for the EU-Dublin Region? - Identity and Access Management

          How Do I Obtain Access Keys (AK/SK Pairs) for the EU-Dublin Region? - Identity and Access Management

          The account and IAM users in the account need to use access keys to encrypt and sign requests in this region. Users access cloud services in the EU-Dublin region as federated virtual users.

          Help > Identity and Access Management > FAQs > Passwords and Credentials
        • User Guide - Object Storage Service

          User Guide - Object Storage Service

          A user generates and keeps keys, and OBS uses the keys to encrypt objects.

          Help > Object Storage Service > User Guide
        • SEC07-05 Transmission Data Encryption - Well-Architected Framework

          SEC07-05 Transmission Data Encryption - Well-Architected Framework

          Use HTTPS to encrypt communication between clients and servers for web application APIs.

          Help > Well-Architected Framework > Well-Architected Framework and Practices > Security Pillar > Data Security and Privacy Protection > SEC07 General Data Security
        • Collector Privacy Statement - Log Tank Service

          Collector Privacy Statement - Log Tank Service

          After the installation, ICAgent will encrypt your AK/SK pair and store it. Parent topic: Privacy and Sensitive Information Protection Statement

          Help > Log Tank Service > Service Overview > Privacy and Sensitive Information Protection Statement
        • Configuring Secure Channel Encryption for ClickHouse Clusters - CloudTable Service

          Configuring Secure Channel Encryption for ClickHouse Clusters - CloudTable Service

          Configuring Secure Channel Encryption for ClickHouse Clusters You can enable secure channel encryption to encrypt data transmission. This section describes how to enable a secure channel for a ClickHouse cluster. Enabling Channel Encryption Log in to the CloudTable console.

          Help > CloudTable Service > User Guide > Using ClickHouse > ClickHouse Cluster Management
        • What Security Protection Policies Does DRS Have? - Data Replication Service

          What Security Protection Policies Does DRS Have? - Data Replication Service

          Uses SSL channels to encrypt data during transmission. Management Use the Identity and Access Management (IAM) service to manage DRS permissions. Parent topic: Network and Security

          Help > Data Replication Service > FAQs > Network and Security
        Total results: 1696
        • Previous
        • 1
        • 2
        • 3
        • 4
        • 5
        • ...
        • 85
        • Next
        • Go
        Load More
        Was this helpful?
        Feedbacks
        /200
        Submit Feedback Cancel
        Contact Sales After-Sales Self Service
        • Site Terms
        • Privacy Statement

        Explore Huawei Cloud

        Why Us Customer Stories Trust Center Legal Press Releases

        Featured Services

        Elastic Cloud Server (ECS) Elastic IP (EIP) RDS for MySQL Elastic Volume Service (EVS) MapReduce Service (MRS)

        Service and Support

        Documentation Contact Us Public Notices Support Plans Service Health Dashboard

        Account and Payment

        Top Up Invoices Billing Center My Account Payment Method

        Quick Links

        Huawei Corporate Huawei Enterprise Huawei Consumer Business Huawei Developers

        © 2025, Huawei Cloud Computing Technologies Co., Ltd. and/or its affiliates. All rights reserved.

        • Site Terms
        • Privacy Statement