You are viewing a plain text version of this content. The canonical link for it is here.
Posted to common-issues@hadoop.apache.org by "Ben Jonas Herbertz (JIRA)" <ji...@apache.org> on 2018/11/27 20:47:00 UTC

[jira] [Updated] (HADOOP-15952) Secure Key Handling Option with TPM2

     [ https://issues.apache.org/jira/browse/HADOOP-15952?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Ben Jonas Herbertz updated HADOOP-15952:
----------------------------------------
    Description: 
Implement the option to use a TPM 2 as a KeyStoreProvider as alternative to JavaKeyStoreProvider. Key Creating and Deleting will be implemented with the TPM.

There is a Java Implementation of interfacing TPMs but only for Version 1 [link|http://trustedjava.sourceforge.net]. The JavaKeystoreProvider Key provisioning is (as I know it) comparable to using a TPM (Making use of Key Encryption Keys).

As mentioned Key Provisioning will be made via the KMS. Only the underlying Keys would be managed by the TPM.

(Part of a Bachelor Thesis at Hochschule Darmstadt)

 

 

  was:
Implement the option to use a TPM 2 as a KeyStoreProvider as alternative to JavaKeyStoreProvider. Key Creating and Deleting will be implemented with the TPM.

Maybe other Functions will be added.

(Part of a Bachelor Thesis at Hochschule Darmstadt)

 

 


> Secure Key Handling Option with TPM2
> ------------------------------------
>
>                 Key: HADOOP-15952
>                 URL: https://issues.apache.org/jira/browse/HADOOP-15952
>             Project: Hadoop Common
>          Issue Type: Improvement
>            Reporter: Ben Jonas Herbertz
>            Priority: Minor
>              Labels: KeyStore, security, tpm
>   Original Estimate: 2,016h
>  Remaining Estimate: 2,016h
>
> Implement the option to use a TPM 2 as a KeyStoreProvider as alternative to JavaKeyStoreProvider. Key Creating and Deleting will be implemented with the TPM.
> There is a Java Implementation of interfacing TPMs but only for Version 1 [link|http://trustedjava.sourceforge.net]. The JavaKeystoreProvider Key provisioning is (as I know it) comparable to using a TPM (Making use of Key Encryption Keys).
> As mentioned Key Provisioning will be made via the KMS. Only the underlying Keys would be managed by the TPM.
> (Part of a Bachelor Thesis at Hochschule Darmstadt)
>  
>  



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

---------------------------------------------------------------------
To unsubscribe, e-mail: common-issues-unsubscribe@hadoop.apache.org
For additional commands, e-mail: common-issues-help@hadoop.apache.org