[ 
https://issues.apache.org/jira/browse/HDFS-6134?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14098113#comment-14098113
 ] 

Suresh Srinivas commented on HDFS-6134:
---------------------------------------

We had conversation about the finer details of the feature and follow up work 
items. Here are some of my comments and points we discussed from that meeting:
# Need a consolidated documents on what extended attributes are introduced. How 
they are used and are restricted.
# Need a way to turn off encryption feature.
# Need description on how for hadoop jobs KMS credential check and decryption 
works. Not sure if there is a design document that covers delegation token from 
KMS.
# All files in encryption in zone must be encrypted. We need to clarify in the 
design if encrypted files can only be in encryption zone and is not allowed 
outside of encryption zone. There are pros and cons to this decision. It would 
be good to decide what to do in this regard and capture it in the design.
# Sequence related to file creation in the design document mentions namenode as 
client. It may be confused with DFS client. Also it is a good idea to discuss 
why this is chosen as opposed to all the KMS interaction in the DFS client. 
Need a discussion on how namenode handles unresponsive KMS and how it affects 
service availability
# Is EDEK creation idempotent? How editlog operations is logged related to this 
should be discussed in the design.
# KMS must be global in the current phase across all the clusters. This should 
be documented in the design as assumption. In future, we could have multiple 
KMS. But that can be enabled in a backward compatible way.



> Transparent data at rest encryption
> -----------------------------------
>
>                 Key: HDFS-6134
>                 URL: https://issues.apache.org/jira/browse/HDFS-6134
>             Project: Hadoop HDFS
>          Issue Type: New Feature
>          Components: security
>    Affects Versions: 3.0.0, 2.3.0
>            Reporter: Alejandro Abdelnur
>            Assignee: Charles Lamb
>         Attachments: HDFS-6134.001.patch, HDFS-6134.002.patch, 
> HDFS-6134_test_plan.pdf, HDFSDataatRestEncryption.pdf, 
> HDFSDataatRestEncryptionProposal_obsolete.pdf, 
> HDFSEncryptionConceptualDesignProposal-2014-06-20.pdf
>
>
> Because of privacy and security regulations, for many industries, sensitive 
> data at rest must be in encrypted form. For example: the health­care industry 
> (HIPAA regulations), the card payment industry (PCI DSS regulations) or the 
> US government (FISMA regulations).
> This JIRA aims to provide a mechanism to encrypt HDFS data at rest that can 
> be used transparently by any application accessing HDFS via Hadoop Filesystem 
> Java API, Hadoop libhdfs C library, or WebHDFS REST API.
> The resulting implementation should be able to be used in compliance with 
> different regulation requirements.



--
This message was sent by Atlassian JIRA
(v6.2#6252)

Reply via email to