Unlock instant, AI-driven research and patent intelligence for your innovation.

A Data Security Storage Method Based on Attribute Partition

A data security storage and data technology, applied in the distributed field, can solve the problems of privacy leakage, without considering the impact of data privacy protection, etc., to achieve the effect of protecting tenant privacy, improving computing efficiency and adaptability, and simplifying complexity

Active Publication Date: 2019-05-10
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these methods do not consider the impact of data privacy protection when dividing and processing user data, and only start from the perspective of performance and other requirements.
In addition, in a distributed environment, the data isolation between different users is logically isolated. At the same time, in order not to affect the efficiency of application data processing, the data is often stored in the server in plain text. Once the server is compromised, it will cause serious damage. Serious Privacy Leakage Problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Data Security Storage Method Based on Attribute Partition
  • A Data Security Storage Method Based on Attribute Partition
  • A Data Security Storage Method Based on Attribute Partition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] Below in conjunction with accompanying drawing, the present invention is described in further detail:

[0047] The method of the present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments. It should be understood that these examples are only used to illustrate the present invention and are not intended to limit the scope of the present invention.

[0048] The input of the present invention is application data and user service quality requirements, according to the actual situation of the present invention, user service quality is represented by two tuples {privacy, time}, wherein privacy{a 1 , a 2 , a 3 ...} represents the privacy constraint rule, a i Represents a privacy constraint attribute pair. time indicates the performance requirement time. Among them, privacy constraints mainly include the following three aspects:

[0049] Combined privacy constraints, that is, combinations of privacy at...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to the distributed field, and in particular to a data security storage method based on attribute division in consideration of privacy protection in distributed storage; it includes the following steps: preprocessing the data submitted by the application, and then processing the data according to the degree of relevance of the data Clustering, and then divide the clustered data according to the privacy protection requirements of the tenants, and finally use a heuristic algorithm to store the divided data in different nodes, so that the stored results meet the user's performance and service quality requirements at the same time Maximum resource utilization. This method takes into account both security and performance requirements, not only considers the service quality requirements of different users, but also considers the privacy protection of data, and can also improve the resource utilization rate of service providers and reduce their operating costs.

Description

【Technical field】 [0001] The invention relates to the field of distribution, in particular to a data security storage method based on attribute division considering privacy protection in the distribution. 【Background technique】 [0002] With the development of informatization and Internet technology, the number of network users and the scale of applications are rapidly expanding, and the amount of data storage is showing explosive growth. In the face of massive data, it is also required to be able to manage and calculate quickly and improve the response speed. The distributed environment is well adapted to these requirements, but not only can optimize the performance overhead brought by data storage, but also the open platform and shared mode of the distributed environment, users and resources are highly concentrated, and it also faces a lot of security and privacy protection aspects of the challenge. Especially in application data-oriented access scenarios, where applicat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/28G06F16/22G06F21/62
CPCG06F16/22G06F16/285G06F21/6245
Inventor 罗光春田玲胡旺张栗粽
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More