[
https://issues.apache.org/jira/browse/HDFS-6134?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13947281#comment-13947281
]
Tsz Wo Nicholas Sze commented on HDFS-6134:
-------------------------------------------
Nice doc!
For #3 HDFS Encryption (Client Side), if the keys are available in NN, are the
keys encrypted? Otherwise, a malicious admin could possibly dump the NN memory
in order to obtain the keys. I think we should clarify how to encrypt the keys
in NN in the doc.
For #4, the keys are available in DNs for encrypting the data, i.e. the keys
must not be encrypted. A malicious admin definitely could obtain the keys by
dumping the DN memory. So #4 does not work.
> Transparent data at rest encryption
> -----------------------------------
>
> Key: HDFS-6134
> URL: https://issues.apache.org/jira/browse/HDFS-6134
> Project: Hadoop HDFS
> Issue Type: New Feature
> Components: security
> Affects Versions: 2.3.0
> Reporter: Alejandro Abdelnur
> Assignee: Alejandro Abdelnur
> Attachments: HDFSDataAtRestEncryption.pdf
>
>
> Because of privacy and security regulations, for many industries, sensitive
> data at rest must be in encrypted form. For example: the healthÂcare industry
> (HIPAA regulations), the card payment industry (PCI DSS regulations) or the
> US government (FISMA regulations).
> This JIRA aims to provide a mechanism to encrypt HDFS data at rest that can
> be used transparently by any application accessing HDFS via Hadoop Filesystem
> Java API, Hadoop libhdfs C library, or WebHDFS REST API.
> The resulting implementation should be able to be used in compliance with
> different regulation requirements.
--
This message was sent by Atlassian JIRA
(v6.2#6252)