检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Will I Be Billed for the Encryption Provided by OBS Server-Side Encryption? When using SSE-KMS, you are billed for both storage and KMS key requests. When using SSE-OBS and SSE-C, you are only billed for storage. To learn the billing for KMS key requests, see How Is DEW Charged? To
CREATE COLUMN ENCRYPTION KEY Function CREATE COLUMN ENCRYPTION KEY creates a CEK that can be used to encrypt a specified column in a table. Precautions This syntax is specific to a fully-encrypted database. When using gsql to connect to a database server, you need to use the -C parameter
Obtaining Bucket Encryption Configuration Functions OBS uses the GET method to obtain the encryption configuration of a specified bucket. To perform this operation, you must have the GetEncryptionConfiguration permission. By default, only the bucket owner can delete the tags of a
Deleting the Encryption Configuration of a Bucket Functions OBS uses the DELETE method to delete the encryption configuration of a specified bucket. To perform this operation, you must have the PutEncryptionConfiguration permission. By default, only the bucket owner can delete the
DROP COLUMN ENCRYPTION KEY Function CREATE COLUMN ENCRYPTION KEY deletes a column encryption key (CEK). Precautions Only the CEK owner or a user who has been granted the DROP permission can run this command. By default, the system administrator has this permission. Syntax 1 DROP COLUMN
Configuring the Hive Column Encryption Scenario Hive supports encryption of one or multiple columns in a table. When creating a Hive table, you can specify the column to be encrypted and encryption algorithm. When data is inserted into the table using the insert statement, the related
Configuring Flink Authentication and Encryption Security Authentication Flink supports the following authentication modes: Kerberos authentication: It is used between the Flink Yarn client and Yarn ResourceManager, JobManager and ZooKeeper, JobManager and HDFS, TaskManager and HDFS
Configuring the Hive Column Encryption Scenario Hive supports encryption of one or multiple columns in a table. When creating a Hive table, you can specify the column to be encrypted and encryption algorithm. When data is inserted into the table using the insert statement, the related
Configuring Flink Authentication and Encryption Security Authentication Flink supports the following authentication modes: Kerberos authentication: It is used between the Flink Yarn client and Yarn ResourceManager, JobManager and ZooKeeper, JobManager and HDFS, TaskManager and HDFS
Using the Homomorphic Encryption Library This section describes how to use the homomorphic encryption library. Procedure Buy a BCS instance and downloading files. When buying a BCS instance, select ECDSA for Security Mechanism. After the subscription, download the homomorphic encryption
Attribute-based Encryption Key Management Initializing an ABE Master Key Updating an ABE Master Key Querying an ABE Master Key Applying for an ABE User Key Authorizing an ABE User Key Querying an ABE User Key Application Decrypting Data with ABE User Keys Parent topic: Trusted Data
Protecting Videos with HLS Encryption Environment Preparation You have downloaded the SDK. Scenario Description Hotlink protection prevents unauthorized users from downloading or playing VOD content. However, this cannot prevent malicious paid users from downloading the content to
Enabling HTTPS Encryption for Websites An SSL certificate secures the communication between the website and the client and authenticates the identity of the website. This topic walks you through how to enable HTTPS-encrypted communication with SSL certificates from the scratch. Figure
Configuration File Encryption Scheme The configuration file often contains sensitive information, such as account and passwords. In this case, the sensitive information needs to be encrypted to ensure security. This section describes how to use jasypt-spring-boot-starter to encrypt
Compatibility Check of Secret Encryption Check Items Check whether the target version supports secret encryption. If it does not, clusters that have this feature enabled cannot be upgraded to the target version. Solution Secret encryption is supported in CCE clusters of v1.27 or later
HBase Secure Channel Encryption You can enable secure channel encryption to encrypt data transmission. This section describes how to enable the security channel for an HBase cluster. Enabling security channel may cause performance deterioration in a cluster. Enabling Channel Encryption
Compatibility Check of Secret Encryption Check Items Check whether the target version supports secret encryption. If it does not, clusters that have this feature enabled cannot be upgraded to the target version. Solution Secret encryption is supported in CCE clusters of v1.27 or later
CREATE COLUMN ENCRYPTION KEY Description Creates a CEK that can be used to encrypt a specified column in a table. Precautions This syntax is specific to a fully-encrypted database. When using gsql to connect to a database server, you need to use the -C parameter to enable the fully-encrypted
DROP COLUMN ENCRYPTION KEY Description Drops a CEK. Precautions Only the CEK owner or a user who has been granted the DROP permission can run this command. System administrators have this permission by default. Syntax 1 DROP COLUMN ENCRYPTION KEY [ IF EXISTS ] client_column_key_name
CREATE COLUMN ENCRYPTION KEY Description Creates a CEK that can be used to encrypt a specified column in a table. Precautions This syntax is specific to a fully-encrypted database. When using gsql to connect to a database server, you need to use the -C parameter to enable the fully-encrypted