[ https://issues.apache.org/jira/browse/HIVE-8049?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Xiaomeng Huang updated HIVE-8049: --------------------------------- Description: This patch implement transparent column level encryption. Users don't need to set anything when they quey tables. # setup kms and set kms-acls.xml (e.g. user1 and root has permission to get key) {code} <property> <name>hadoop.kms.acl.GET</name> <value>user1 root</value> <description> ACL for get-key-version and get-current-key operations. </description> </property> {code} # set hive-site.xml {code} <property> <name>hadoop.security.key.provider.path</name> <value>kms://http@localhost:16000/kms</value> </property> {code} # create an encrypted table {code} drop table student_column_encrypt; create table student_column_encrypt (s_key INT, s_name STRING, s_country STRING, s_age INT) ROW FORMAT SERDE 'org.apache.hadoop.hive.serde2.lazy.LazySimpleSerDe' WITH SERDEPROPERTIES ('column.encode.columns'='s_country,s_age', 'column.encode.classname'='org.apache.hadoop.hive.serde2.crypto.CryptoRewriter') STORED AS TEXTFILE TBLPROPERTIES('hive.encrypt.keynames'='hive.k1'); insert overwrite table student_column_encrypt select s_key, s_name, s_country, s_age from student; select * from student_column_encrypt; {code} # query table by different user, this is transparent to users. It is very convenient and don't need to set anything. {code} [root@huang1 hive_data]# hive hive> select * from student_column_encrypt; OK 0 Armon China 20 1 Jack USA 21 2 Lucy England 22 3 Lily France 23 4 Yom Spain 24 Time taken: 0.759 seconds, Fetched: 5 row(s) [root@huang1 hive_data]# su user2 [user2@huang1 hive_data]$ hive hive> select * from student_column_encrypt; OK 0 Armon dqyb188= NULL 1 Jack YJez NULL 2 Lucy cKqV1c8MTw== NULL 3 Lily c7aT180H NULL 4 Yom ZrST0MA= NULL Time taken: 0.77 seconds, Fetched: 5 row(s) {code} was: This patch implement transparent column level encryption. Users don't need to set anything when they quey tables. # setup kms and set kms-acls.xml (e.g. user1 and root has permission to get key) {code} <property> <name>hadoop.kms.acl.GET</name> <value>user1 root</value> <description> ACL for get-key-version and get-current-key operations. </description> </property> {code} # set hive-site.xml {code} <property> <name>hadoop.security.kms.uri</name> <value>http://localhost:16000/kms</value> </property> {code} # create an encrypted table {code} -- region-aes-column.q drop table region_aes_column; create table region_aes_column (r_regionkey int, r_name string) ROW FORMAT SERDE 'org.apache.hadoop.hive.serde2.lazy.LazySimpleSerDe' WITH SERDEPROPERTIES ('column.encode.columns'='r_name', 'column.encode.classname'='org.apache.hadoop.hive.serde2.aes.AESRewriter') STORED AS TEXTFILE TBLPROPERTIES("hive.encrypt.keynames"="hive.k1"); insert overwrite table region_aes_column select r_regionkey, r_name from region; {code} # query table by different user, this is transparent to users. It is very convenient and don't need to set anything. {code} [root@huang1 hive_data]# hive hive> select * from region_aes_column; OK 0 AFRICA 1 AMERICA 2 ASIA 3 EUROPE 4 MIDDLE EAST Time taken: 0.9 seconds, Fetched: 5 row(s) [root@huang1 hive_data]# su user1 [user1@huang1 hive_data]$ hive hive> select * from region_aes_column; OK 0 AFRICA 1 AMERICA 2 ASIA 3 EUROPE 4 MIDDLE EAST Time taken: 0.899 seconds, Fetched: 5 row(s) [root@huang1 hive_data]# su user2 [user2@huang1 hive_data]$ hive hive> select * from region_aes_column; OK 0 RcQycWVD 1 Rc8lam9Bxg== 2 RdEpeQ== 3 Qdcyd3ZH 4 ScskfGpHp8KIIuY= Time taken: 0.749 seconds, Fetched: 5 row(s) {code} > Transparent column level encryption using kms > --------------------------------------------- > > Key: HIVE-8049 > URL: https://issues.apache.org/jira/browse/HIVE-8049 > Project: Hive > Issue Type: Sub-task > Reporter: Xiaomeng Huang > Assignee: Xiaomeng Huang > Attachments: HIVE-8049.001.patch > > > This patch implement transparent column level encryption. Users don't need to > set anything when they quey tables. > # setup kms and set kms-acls.xml (e.g. user1 and root has permission to get > key) > {code} > <property> > <name>hadoop.kms.acl.GET</name> > <value>user1 root</value> > <description> > ACL for get-key-version and get-current-key operations. > </description> > </property> > {code} > # set hive-site.xml > {code} > <property> > <name>hadoop.security.key.provider.path</name> > <value>kms://http@localhost:16000/kms</value> > </property> > {code} > # create an encrypted table > {code} > drop table student_column_encrypt; > create table student_column_encrypt (s_key INT, s_name STRING, s_country > STRING, s_age INT) ROW FORMAT SERDE > 'org.apache.hadoop.hive.serde2.lazy.LazySimpleSerDe' > WITH SERDEPROPERTIES ('column.encode.columns'='s_country,s_age', > 'column.encode.classname'='org.apache.hadoop.hive.serde2.crypto.CryptoRewriter') > > STORED AS TEXTFILE TBLPROPERTIES('hive.encrypt.keynames'='hive.k1'); > insert overwrite table student_column_encrypt > select > s_key, s_name, s_country, s_age > from student; > > select * from student_column_encrypt; > {code} > # query table by different user, this is transparent to users. It is very > convenient and don't need to set anything. > {code} > [root@huang1 hive_data]# hive > hive> select * from student_column_encrypt; > OK > 0 Armon China 20 > 1 Jack USA 21 > 2 Lucy England 22 > 3 Lily France 23 > 4 Yom Spain 24 > Time taken: 0.759 seconds, Fetched: 5 row(s) > [root@huang1 hive_data]# su user2 > [user2@huang1 hive_data]$ hive > hive> select * from student_column_encrypt; > OK > 0 Armon dqyb188= NULL > 1 Jack YJez NULL > 2 Lucy cKqV1c8MTw== NULL > 3 Lily c7aT180H NULL > 4 Yom ZrST0MA= NULL > Time taken: 0.77 seconds, Fetched: 5 row(s) > {code} -- This message was sent by Atlassian JIRA (v6.3.4#6332)