Sensitive data protection system and method of data circulation and transaction of big data platform

A big data platform and technology for sensitive data, applied in the field of big data, can solve problems such as lack of sensitive data protection, verification of desensitization results, and obstruction of data flow.

Active Publication Date: 2016-06-08
CHINA ELECTRONICS TECH CYBER SECURITY CO LTD
View PDF3 Cites 84 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] (1) Most of the existing sensitive data protection methods focus on the sharing and publishing of data circulation, and lack the protection of sensitive data in the entire link of data circulation
[0009] (2) Excessive attention to user privacy will also hinder data circulation. How to combine the advantages and disadvantages of different sensitive data protection methods to select appropriate technologies for different links of data circulation and achieve a balance between sensitive data protection and data availability is an urgent problem to be solved question
[0010] (3) Most of the sensitive data protection technologies are directly processing sensitive data, but they do not consider how to discover sensitive data, how to verify the correctness and authenticity of desensitization results

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensitive data protection system and method of data circulation and transaction of big data platform
  • Sensitive data protection system and method of data circulation and transaction of big data platform
  • Sensitive data protection system and method of data circulation and transaction of big data platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] For better understanding of the present invention, the present invention is described in detail below with reference to the accompanying drawings.

[0072] like figure 1 As shown in the figure, a sensitive data protection system for data circulation and transaction of a big data platform of the present invention includes a data acquisition module for discovering and protecting sensitive content during data acquisition, and a data acquisition module for sensitive data in the process of data sharing. A data sharing module that performs protection processing, a data exchange module that configures a desensitization strategy to desensitize relatively sensitive data in the data exchange process, and a data acquisition module that protects data file download links and storage addresses in the data acquisition process, A desensitization management module that manages, monitors and audits the desensitization and protection of sensitive data.

[0073] The data collection module...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a sensitive data protection system of the data circulation and transaction of a big data platform. The sensitive data protection system is characterized in that the sensitive data protection system of the data circulation and transaction of the big data platform comprises a data collection module, a data sharing module, a data exchange module, a data acquisition module and a desensitization management module, wherein the data collection module discovers sensitive contents in data collection and carries out protection processing on the sensitive contents; the data sharing module carries out the protection processing on the sensitive data in a data sharing process; the data exchange module carries out desensitization processing on a relative sensitive data configuration desensitization strategy in a data exchange process; the data acquisition module protects a data file downloading link and a storage address in a data acquisition process; and the desensitization management module manages, monitors and audits the desensitization and the protection processing of the sensitive data. The invention also discloses a sensitive data protection method of the data circulation and transaction of the big data platform.

Description

technical field [0001] The invention relates to the field of big data, in particular, to a sensitive data protection system and method for data circulation and transaction of a big data platform. Background technique [0002] In the big data environment, the demand for data collection, circulation, exchange and sharing, transaction, analysis and mining is becoming stronger and stronger, and a large amount of sensitive data is collected on the big data center platform. Protecting these sensitive data in use and preventing user privacy leakage has become the focus of big data security. At present, the existing sensitive data protection adopts the following four protection methods: [0003] (1) The method of access control: by restricting the user's access to data through the user's identity and the security level to which it belongs, preventing unauthorized access to sensitive data, and realizing the protection of sensitive data. This method reduces the availability of data ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6209
Inventor 陈天莹李全兵李霄
Owner CHINA ELECTRONICS TECH CYBER SECURITY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products