Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for identifying and detecting data security levels

A technology of data security and security level, applied in structured data retrieval, database model, relational database, etc., can solve the problem that k-means clustering algorithm cannot work.

Active Publication Date: 2021-03-12
TIANJIN NANKAI UNIV GENERAL DATA TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the data security level needs to automatically form the most suitable category, the commonly used k-means clustering algorithm cannot work

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for identifying and detecting data security levels
  • A method and device for identifying and detecting data security levels
  • A method and device for identifying and detecting data security levels

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0056] The identification and detection data security grading method provided by the present invention includes the following steps, and the overall processing flow is as follows: figure 1 Shown:

[0057] Step 1. Build a sensitive data dictionary;

[0058] Step 2. Construct a topic-related feature vector for each data unit, and cluster the data units of the big data platform to obtain a topic classification;

[0059] Step 3. Calculate the sensitivity score of each data unit and construct a security-related attribute feature vector for each data unit;

[0060] Step 4. Cluster the data units of the big data platform according to the security-related feature vectors and set the security level;

[0061] Step 5, identifying and detecting the security level of the new data unit;

[0062] Concrete design of the present invention realizes as follow...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and device for identifying and detecting data security levels. The present invention aims to provide a method for identifying and detecting data security levels. The object of this method is the stored data of a relational database or a big data service provider. It can determine the security level of a single relational table, a single storage file or a single database. The higher the level, the greater the loss caused by data leakage or damage. . This method takes the amount of sensitive data contained in the data unit as the most important feature, combines the subject of the data unit and the amount of data, clusters as many data units as possible on the big data service platform, and sets the security classification according to the results, and can The new data unit is identified for its security level. This grading method can comprehensively, accurately and effectively evaluate the data security level, provide reference for which level of data security protection should be set for ordinary data services and big data service platforms, and provide support for evaluating big data service capabilities.

Description

technical field [0001] The invention belongs to the field of data mining, and relates to the detection and evaluation of data security levels by applying big data analysis algorithms to big data, and specifically relates to data representation, feature extraction, and innovation and application of clustering algorithms. Background technique [0002] Data is often stored in a database in a certain form, which is convenient for users to access and operate. Nowadays, big data emerges on the basis of a wider and more open cloud platform. On the one hand, it changes people's lifestyle and perception of data. On the other hand, it also puts forward higher requirements for the security protection of sensitive private data. People hope that data service providers can safely store sensitive data and provide reliable data services, especially in a big data environment, because malicious tampering, leakage, loss, damage, etc. of sensitive data will cause very serious consequences. For...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/28G06N3/04
CPCG06F16/285G06N3/045
Inventor 赵伟武新崔维力刘奥
Owner TIANJIN NANKAI UNIV GENERAL DATA TECH