检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Table 1 Keys Name Description Function DEK An encryption key that is used for encrypting data. Encrypts specific data. Custom key An encryption key created using DEW for encrypting DEKs. A custom key can encrypt multiple DEKs. Supports CMK disabling and scheduled deletion.
For details about how to encrypt or decrypt a large amount of data, see Encrypting or Decrypting a Large Amount of Data. Parent topic: KMS
Small-size Data Encryption and Decryption Encrypting Data Decrypting Data Parent Topic: Key Management APIs
The key used for encrypting the ECS is the same as that used for encrypting the image. An image created from an encrypted ECS is also encrypted. The key used for encrypting the image is the same as that used for encrypting the ECS.
For details about image encryption, see Encrypting Data in IMS. When creating an ECS, you can encrypt added data disks. For details about data disk encryption, see Encrypting Data in IMS.
Encrypting a DDS Database After encryption is enabled, disk data will be encrypted and stored on the server when you create a Document Database Service (DDS) database instance or expand disk capacity.
The key used for encrypting the image is the same as that used for encrypting the system disk.
The key used for encrypting the FlexusX instance is the same as that used for encrypting the image. An image created from an encrypted FlexusX instance is also encrypted. The key used for encrypting the image is the same as that used for encrypting the FlexusX instance.
Model Management Module (Optional) Encrypting a Model Creating a Model Instance Performing Inference Using a Model Example - Model Management
Model Management Module (Optional) Encrypting a Model Creating a Model Instance Performing Inference Using a Model Example - Model Management
Using a Key Using KMS for Encryption Encrypting and Decrypting Small-size Data Online Using a Custom Key Parent Topic: Key Management Service
DEK Management Generating a Random Number Creating a DEK Creating a Plaintext-free DEK Encrypting a DEK Decrypting a DEK Parent Topic: Key Management APIs
Managing Private Images Creating an ECS from an Image Modifying an Image Exporting an Image Exporting Image List Checking the Disk Capacity of an Image Deleting Images Sharing Images Encrypting Images Replicating Images Within a Region Replicating Images Across Regions
Key Management Service Using KMS to Encrypt Offline Data Using KMS to Encrypt and Decrypt Data for Cloud Services Using the Encryption SDK to Encrypt and Decrypt Local Files Encrypting and Decrypting Data Through Cross-region DR Using KMS to Protect File Integrity
EVS EVS Overview Using an Existing EVS Disk Through a Static PV Using an EVS Disk Through a Dynamic PV Dynamically Mounting an EVS Disk to a StatefulSet Encrypting EVS Disks Expanding the Capacity of an EVS Disk Snapshots and Backups Configuring EVS Mount Options Parent Topic: Storage
Connection Information Management Setting Security Group Rules for a GeminiDB Influx Instance Binding an EIP to a GeminiDB Influx Instance Node Changing the Security Group of a GeminiDB Influx Instance Encrypting Data over SSL for a GeminiDB Influx Instance Accessing a GeminiDB Influx
Code Example (Java) ISV Server Verifying Requests ISV Server Signing a Response Message Body ISV Server Encrypting the Username and Password After Resource Enabling ISV Server Decrypting the Mobile Number and Email Address Java Code Example Parent topic: SaaS Access Guide V1.0 (Deprecated
GaussDB(DWS) Sensitive Data Management GaussDB(DWS) Row-Level Access Control GaussDB(DWS) Data Masking Encrypting and Decrypting GaussDB(DWS) Strings Using pgcrypto to Encrypt GaussDB(DWS) Data Parent Topic: GaussDB(DWS) Database Security Management
The keys used for encrypting images are stored in DEW. Encrypting Images Elastic Volume Service (EVS) You can create a data disk image using a data disk of an ECS. The created data disk image can be used to create other EVS disks.
Group Rules for a GeminiDB Cassandra Instance Binding an EIP to a GeminiDB Cassandra Instance Node Viewing the IP Address and Port Number of a GeminiDB Cassandra Instance Changing the Port of a GeminiDB Cassandra Instance Changing the Security Group of a GeminiDB Cassandra Instance Encrypting