Zettaset efforts for Hadoop large data encryption

Source: Internet
Author: User
Keywords Large data think Express manage services

Http://www.aliyun.com/zixun/aggregation/14111.html, an enterprise-level data analyst company for Hadoop Production management and security software, says it plans to increase encryption at the end of 2013 >zettaset

Eric Murray, the security architect who works at Zettaset, says the orchestrator suite of companies managing the Hadoop cluster is being enhanced, including building a symmetric key Management Server based on the Hadoop data partition encryption. He points out that this option does not aim at field-level encryption, but will allow security managers to establish an automatic encryption method for data stored in the Hadoop database.

Based on the AES256 Advanced Encryption Standard, this security architecture uses a symmetric encryption key, and for encryption and decryption, the data is stored in the kernel node of the compute node. Encryption typically leads to performance overhead, and Zettaset relies on symmetric cipher encryption rather than public key encryption because Murray thinks the former is faster.

Data processing will not be completed until it is decrypted, so one problem is the symmetric key situation that has been protected since the knowledge of the highly skilled hacker capturing the encryption key during the calculation. Zettaset aware of the threat. "Stealing memory can be done," Murray admits. However, this is still seen as difficult.

According to Zettaset, database encryption is very professional, and open source Hadoop is almost impossible today. The Company believes that its encryption function is most closely related to other companies ' Gazzang products.

Zettaset said the Zettaset would be incompatible with a Hadoop-based partitioned encryption system in the next few months, including a way to set up a key Management server based on certificates. These will be sold as part of the Zettaset orchestrator software, which currently supports other security types, including Hadoop role-based access control.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.