Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
2Activity
0 of .
Results for:
No results containing your search query
P. 1
Secure HBase

Secure HBase

Ratings: (0)|Views: 411|Likes:
Published by Oleksiy Kovyrin
Hadoop World 2010
Hadoop World 2010

More info:

Published by: Oleksiy Kovyrin on Oct 14, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as ODP, PDF, TXT or read online from Scribd
See more
See less

11/27/2012

pdf

text

original

 
 
Secure HBase
Hadoop Group @ Trend Micro:
Andrew Purtell, Gary Helmling, Joshua Ho, Eugene Koontz, Mingjie Lai
 
 
Overview
Why?
User isolation (control over your data)
Multi-tenancy: private and public cloud
What is it?
Client access to HBase is authenticated
User data is private unless access has been granted
Access to data can be granted at a table or per columnfamily basis
What is it not?
Row-level or per value (cell)
Push down of file ownership to HDFS
Full Role Based Access Control
 
 
Concepts
Authentication
Who are you?
Authorization
Can user A do action X within context Y?
Isolation
System-wide concern
Requires enforcement of authorization internally
Authorization useless if system leaks data in other ways
 –
Observability of storage files
 –
Eavesdropping on data in transit

Activity (2)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->