A data desensitization method for preventing privacy leakage

A data desensitization and privacy technology, applied in the field of big data, can solve problems such as increased deployment cost, inability to mine data, slow database access speed, etc., achieve a balance between security protection and data use, achieve security and performance, and achieve privacy protection Effect

Active Publication Date: 2018-12-18
四川长虹智慧健康科技有限公司
View PDF15 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] (4) Expense records
To ensure that the database is copied and accessed without causing data leakage, the best way is to encrypt the database, but after the database is encrypted, it will bring new problems, such as the inability to perform fast retrieval, data statistical analysis, and Data mining, etc., will also greatly reduce the access speed of the database and increase additional deployment costs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention will be further described below in conjunction with the examples.

[0024] The structure of the database has a great impact on the performance and efficiency of the database, especially when the amount of data is very large. An application database, or data center, generally includes several data tables, and each data table is composed of several different fields, and the association between tables is generally carried out through certain fields or foreign keys. For example, a hospital health record database, the database includes 4 data tables (a real database has several tables, here is only an example with simple content), data table 1 is the basic information table, which includes the ID number of the personnel, Nickname, name, ID number, etc., data table 2 is a contact form, which records the mobile phone number, email, home address and other data related to family privacy related to the user. Data table 3 is a personal filing table, which re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of big data and discloses a data desensitization method for preventing privacy leakage. The method specifically includes the following procedures: according to the same index field between different data tables of the database, removing the explicit association; defining cryptographic functions for the index fields between the data tables to process the association IDs; calculating the association ID value according to the cryptographic function, and performing the data access after the association ID value is written. The technical scheme of the invention mainly adopts the thinking of cryptography, carries out the algorithm processing to the data table correlation field, and removes the strong association coupling between different tables and different data and user information in database, so it is impossible to know the association between data and information, and the relationship between data and user can not be confirmed even under the conditionof obtaining super privilege of user database, and the privacy protection of data is realized. This method can effectively prevent the privacy leakage caused by the direct access to the database caused by platform attacks, insider and so on.

Description

technical field [0001] The invention relates to the field of big data, in particular to a data desensitization method for preventing privacy leakage. Background technique [0002] With the development of intelligence and networking, the information age is the era of data collection. The purposeful collection, arrangement, processing, analysis, and utilization of data are the obvious characteristics of the big data era. [0003] The way of data collection can be automatic collection by sensors, automatic collection by smart devices, or in the background through apps, users browsing webpages and other modes. The current content of data collection has involved all aspects of individuals. Data has become the cornerstone of all our information applications. The collection of data, on the one hand, brings great convenience to individuals, but also brings potential risks of privacy leakage. [0004] In the field of medical and health care, the era of digital hospitals based on ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G16H10/60
CPCG06F21/6227G06F21/6245G16H10/60
Inventor 刘贤洪贾宗华
Owner 四川长虹智慧健康科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products