High-security desensitization method based on big data information system

An information system, high security technology, applied in digital data protection, electronic digital data processing, computer security devices, etc., can solve problems such as speed processing and desensitization of sensitive data, to improve security and crack the difficulty factor, High safety and the effect of desensitization protection

Active Publication Date: 2017-05-10
STATE GRID CORP OF CHINA +2
View PDF5 Cites 38 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, the data volume of sensitive information is also growing rapidly, reaching the PB level. When traditional desensitization technologies face such a large amount of sensitive data, it is difficult to effectively process and solve the problem of sensitive data desensitization.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • High-security desensitization method based on big data information system
  • High-security desensitization method based on big data information system
  • High-security desensitization method based on big data information system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0066] Embodiments of the present invention are described in detail below, examples of the embodiments are shown in the drawings, and the technical solutions in the embodiments of the present invention are clearly and completely described. The embodiments described by referring to the figures are exemplary and are only for explaining the present invention and should not be construed as limiting the present invention.

[0067] On the one hand, the embodiment of the present invention discloses a desensitization method for information system security. combine figure 1 , the method includes the following steps:

[0068] combined with figure 1 As shown, firstly, the source data of the business system is transferred to the oracle database of the server physical machine through the kettle data extraction tool.

[0069] The oracle database of this physical machine is inaccessible outside the firewall, and all the data is extracted into the hive database of hadoop through kettle and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a high-security desensitization method based on a big data information system. The method is characterized by comprising the first step of conducting preprocessing before conducting desensitization use on sensitive data; the second steps of using a compound layering type desensitization algorithm model to conduct encryption on the sensitive data; the third step of conducting source tracing and auditing after conducting desensitization use on the sensitive data. According to the high-security desensitization method based on the big data information system, the compound layering type desensitization algorithm is adopted as a core, and the method is used for realizing protection of the visited sensitive information under the situation that an information system is invaded illegally and authority is utilized to break loopholes of a traditional desensitization algorithm. The high-security desensitization method based on the big data information system has the advantages that on the one hand, the danger coefficient of the sensitive data is effectively reduced, the security of the sensitive data is sharply improved, the breaking difficulty coefficient is sharply increased, and desensitization protection of the sensitive data is realized; on the other hand, efficiency characteristics of each arithmetic unit in the desensitization model can be given full play through the model algorithm.

Description

technical field [0001] The invention relates to a high-security desensitization method based on a big data information system. Background technique [0002] At present, with the continuous deepening of my country's informatization construction, the enterprise's informatization business system is increasingly dependent on the information communication system, and the security and reliability of the information communication system will directly affect the security and confidentiality of enterprise data information; however, data resources Often contains a large amount of sensitive information, once leaked or illegally used, it will bring irreparable losses to individuals and even the country. [0003] The database protects data security through user, role, and permission technologies. However, most applications do not make full use of this protection mechanism of the database, but control data access through applications. For example, application operators log in to the databa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30G06F21/62
CPCG06F16/20G06F21/6218
Inventor 张吉生吴旻荣沙卫国于烨柴育峰党引郭景维张波康乐任东晓冯国礼
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products