A data security method and system for mapreduce computing
A mapreduce framework and data confidentiality technology, applied in digital data protection, computing, electrical digital data processing, etc., can solve problems such as time-consuming and unpredictable, and achieve the effect of indistinguishability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach 1
[0072] see image 3 As shown, compared with the standard MapReduce process, this embodiment mainly modifies the partition function of the map stage and adds another reduce stage in rewriting the MapReduce execution flow. Another reduce stage added before the standard reduce is called reduce1, and the standard reduce is called reduce2 in the present invention after being rewritten. After rewriting MapReduce, it conforms to the indistinguishability of map output and the indistinguishability of reduce input. The amount of data received by each reduce task is equal.
[0073] Assume that the data set input used by the user to submit the job is D, |D| indicates the size of the input data, M indicates the number of map tasks, R indicates the number of reduce tasks in reduce1 and the number of reduce tasks in reduce2 (that is, the number of reduce tasks in reduce1 and reduce2 equal number of reduce tasks). The processing methods of the map phase, the reduce1 phase, and the reduce2 p...
Embodiment approach 2
[0079] In this embodiment, the method of adding false data is used to realize the confidentiality of data, and at the same time, the number K of types of key values is protected. In this embodiment, after MapReduce is rewritten, it conforms to the indistinguishability of the output of the map, and the indistinguishability of the input of the reduce end is not equal, but after random addition and marking, it has no post-statistical inference significance.
[0080] see Figure 4 As shown, compared with the standard MapReduce process, this embodiment mainly modifies the partition function of the map stage and adds another reduce stage in rewriting the MapReduce execution flow. Another reduce stage added before the standard reduce is called reduce1, and the standard reduce is called reduce2 in the present invention after being rewritten.
[0081] Assume that the data set input used by the user to submit the job is D, |D| indicates the size of the input data, M indicates the num...
Embodiment approach 3
[0090] In this embodiment, the way of adding fake data is used to realize data confidentiality, and at the same time, the number K of types of key values is protected. In this embodiment, after MapReduce is rewritten, the indistinguishability of the map output and the indistinguishability of the input of the reduce end are met, and the amount of data received by each reduce task is equal.
[0091] see Figure 5 As shown, compared with the standard MapReduce process, this embodiment mainly modifies the partition function of the map stage and adds another reduce stage in rewriting the MapReduce execution flow. Another reduce stage added before the standard reduce is called reduce1, and the standard reduce is called reduce2 in the present invention after being rewritten.
[0092] Assume that the data set input used by the user to submit the job is D, |D| indicates the size of the input data, M indicates the number of map tasks, R indicates the number of reduce tasks in reduce1...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com