Re: HBase security research

2012-06-18 Thread Enis Söztutar
Hi, This sounds interesting. I cannot comment on the research / paper aspects of your work, but from my experience, there are different considerations for implementing something for research and the open source side of things. If you are interested in getting your work into the project, the best w

Re: HBase security research

2012-06-18 Thread erwin x
Hi all, Thank you for all your enthusiastic responses! I already started to hack the HBase security source code a litte bit, but I think a separate project using co-processors is indeed a good idea. I can then create a separate solution for the research problem using as much as possible of the ex

Re: HBase security research

2012-06-17 Thread Andrew Purtell
HBASE-1697, apologies for that. On Jun 17, 2012, at 10:28 AM, Andrew Purtell wrote: > I'd also encourage you to read HBASE-1637 and subtasks to see what has > already gone in and how it was implemented basically as Joey had suggested. > If you reimplement something the first question that wil

Re: HBase security research

2012-06-17 Thread Andrew Purtell
I'd also encourage you to read HBASE-1637 and subtasks to see what has already gone in and how it was implemented basically as Joey had suggested. If you reimplement something the first question that will be asked is what part of HBase code can be reused I.e incremental dev is preferred where po

Re: HBase security research

2012-06-17 Thread Jonathan Hsieh
Hi erwinx, Sounds interesting to me! If your purposes are to research/a paper, I'm always a fan of spending some time to define the problem (something constrained to 2 pages would be good) you are trying to solve. I find it personally helpful to myself and it would help us greatly if you ask us

Re: HBase security research

2012-06-17 Thread Joey Echeverria
Hey Erwinx, You're research sounds very interesting, and the features you describe are definitely useful for some use cases. The easiest way to implement these features would to use co-processors, which let you extend HBase without the modifying the core. My recommendation would be to build the fe

HBase security research

2012-06-17 Thread erwin x
Hi all, I am investigating how HBase can be used to store sensitive/confidential information. This research is part of my master thesis for computing science at a university. The research involves mostly confidentiality, for example: - Describing the location of the data within the distributed s