检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Simulated Encryption Test Before configuring the encryption task, you are advised to perform a simulated encryption test to check whether the encryption is normal. Procedure Log in to a database encryption and access control instance as the sysadmin user. In the navigation tree, choose
Encryption Table Management For encrypted tables, functions such as Edit Index and Edit Non-encrypted Column are supported on the web page. Editing Index When the data volume is large (for example, more than 10 million rows), querying encrypted columns is time-consuming. You can add
Will I Be Billed for the Encryption Provided by OBS Server-Side Encryption? When using SSE-KMS, you are billed for both storage and KMS key requests. When using SSE-OBS and SSE-C, you are only billed for storage. To learn the billing for KMS key requests, see How Is DEW Charged? To
CREATE COLUMN ENCRYPTION KEY Function CREATE COLUMN ENCRYPTION KEY creates a CEK that can be used to encrypt a specified column in a table. Precautions This syntax is specific to a fully-encrypted database. When using gsql to connect to a database server, you need to use the -C parameter
Obtaining Bucket Encryption Configuration Functions OBS uses the GET method to obtain the encryption configuration of a specified bucket. To perform this operation, you must have the GetEncryptionConfiguration permission. By default, only the bucket owner can delete the tags of a
Deleting the Encryption Configuration of a Bucket Functions OBS uses the DELETE method to delete the encryption configuration of a specified bucket. To perform this operation, you must have the PutEncryptionConfiguration permission. By default, only the bucket owner can delete the
DROP COLUMN ENCRYPTION KEY Function CREATE COLUMN ENCRYPTION KEY deletes a column encryption key (CEK). Precautions Only the CEK owner or a user who has been granted the DROP permission can run this command. By default, the system administrator has this permission. Syntax 1 DROP COLUMN
Configuring the Hive Column Encryption Scenario Hive supports encryption of one or multiple columns in a table. When creating a Hive table, you can specify the column to be encrypted and encryption algorithm. When data is inserted into the table using the insert statement, the related
Configuring Flink Authentication and Encryption Security Authentication Flink supports the following authentication modes: Kerberos authentication: It is used between the Flink Yarn client and Yarn ResourceManager, JobManager and ZooKeeper, JobManager and HDFS, TaskManager and HDFS
Configuring the Hive Column Encryption Scenario Hive supports encryption of one or multiple columns in a table. When creating a Hive table, you can specify the column to be encrypted and encryption algorithm. When data is inserted into the table using the insert statement, the related
Configuring Flink Authentication and Encryption Security Authentication Flink supports the following authentication modes: Kerberos authentication: It is used between the Flink Yarn client and Yarn ResourceManager, JobManager and ZooKeeper, JobManager and HDFS, TaskManager and HDFS
Using the Homomorphic Encryption Library This section describes how to use the homomorphic encryption library. Procedure Buy a BCS instance and downloading files. When buying a BCS instance, select ECDSA for Security Mechanism. After the subscription, download the homomorphic encryption
Attribute-based Encryption Key Management Initializing an ABE Master Key Updating an ABE Master Key Querying an ABE Master Key Applying for an ABE User Key Authorizing an ABE User Key Querying an ABE User Key Application Decrypting Data with ABE User Keys Parent topic: Trusted Data
Protecting Videos with HLS Encryption Environment Preparation You have downloaded the SDK. Scenario Description Hotlink protection prevents unauthorized users from downloading or playing VOD content. However, this cannot prevent malicious paid users from downloading the content to
Enabling HTTPS Encryption for Websites An SSL certificate secures the communication between the website and the client and authenticates the identity of the website. This topic walks you through how to enable HTTPS-encrypted communication with SSL certificates from the scratch. Figure
Compatibility Check of Secret Encryption Check Items Check whether the target version supports secret encryption. If it does not, clusters that have this feature enabled cannot be upgraded to the target version. Solution Secret encryption is supported in CCE clusters of v1.27 or later
HBase Secure Channel Encryption You can enable secure channel encryption to encrypt data transmission. This section describes how to enable the security channel for an HBase cluster. Enabling security channel may cause performance deterioration in a cluster. Enabling Channel Encryption
Compatibility Check of Secret Encryption Check Items Check whether the target version supports secret encryption. If it does not, clusters that have this feature enabled cannot be upgraded to the target version. Solution Secret encryption is supported in CCE clusters of v1.27 or later
SEC07-04 Static Data Encryption Encryption prevents unauthorized users from accessing and stealing data. Sensitive static data should be encrypted by default to ensure confidentiality even if the data is accessed or disclosed without authorization. Risk level High Key strategies Enable
SEC07-05 Transmission Data Encryption Encrypt data during transmission to prevent data from being stolen, tampered with, or viewed by unauthorized users. Risk level High Key strategies Using encryption protocols: Ensure that secure encryption protocols are used to encrypt data and