Data Security means protecting a data from destructive forces and the unwanted actions of unauthorized users.
QueryIO provides data security by means of encryption and using kerberos.
You can encrypt big data while data import OR use S3 compatible REST api.
Encryption is the process of transforming information (referred to as plain text) using an algorithm (called a cipher) to make it unreadable to anyone, usually referred to as a cipher text. The result of the process is encrypted information (in cryptography, referred to as cipher text). The reverse process, i.e., to make the encrypted information readable again, is referred to as decryption (i.e. to make it unencrypted)
QueryIO supports following encryption algorithm :
The Advanced Encryption Standard (AES) algorithm uses one of three cipher key strengths: a 128-, 192- or 256-bit encryption key (password). Each encryption key size causes the algorithm to behave slightly differently, so the increasing key sizes not only offer a larger number of bits with which you can scramble the data, but also increase the complexity of the cipher algorithm.
QueryIO supports AES with 256-bit encryption key. The key size used for an AES cipher specifies the number of repetitions of transformation rounds that convert the input, called the plain text, into the final output, called the cipher text. For a 256-bit key, there are 14 cycles of repetitions.
Click here to see how to use encryption using S3 compatible REST API.
QueryIO uses kerberos protocol to provide security.
Kerberos is a computer network authentication protocol which works on the basis of "tickets" to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner. Click here to know more about kerberos setup.