Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Database attribute sensitivity quantification method based on attack probability

A quantitative method and database technology, applied in the field of data security, can solve problems such as inaccuracy, incomplete definition of sensitive information, ignorance of semantic information, etc., to achieve authentic and credible results and retain data availability

Active Publication Date: 2020-05-22
XIDIAN UNIV
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this technique is that it only analyzes the sensitivity from a single column, ignores the relationship between columns, and ignores the semantic information of each column.
[0007] To sum up, the existing sensitive quantification system has various problems such as incomplete definition of sensitive information and poor consideration of the relationship between columns. When faced with databases of different types, different semantic information, and different application scenarios, they cannot Accurately and quickly identify sensitive information and classify sensitivity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database attribute sensitivity quantification method based on attack probability

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] Table 1

[0051] ID sex Birthday Nation Salary(50k)

10564 M 0324 China > 12368 M 0930 China <

13851 F 0930 Brazil > 18635 F 0506 China <

20654 M 0825 USA <

25101 F 1114 China >

[0052] Table 1 is a personal information database, where each row represents a person’s ID, gender, date of birth, nationality and salary information in Table 1. The sensitivity analysis of this database is now carried out. The specific process is as follows:

[0053] Give each column a probability of being acquired by the attacker in advance. After the experience of the data manager and comprehensive analysis based on the published information, give each column a probability of being acquired by the attacker in advance P={0.1, 0.5, 0.5, 0.8, 0.5 };

[0054] Enter the database into the framework of the primary key search algorithm, analyze its primary key and composite primary key, and the output result is:

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an attack probability-based database attribute sensitivity quantification method, which comprises the following steps of: 1) endowing each column in a database with the probability of possibly obtaining the column in advance by an attacker; 2) inputting the database into a database primary key analysis system to obtain all primary keys and composite primary keys of the database; 3) sorting each column in the database according to a result output in the step 2), and finding out which primary keys and composite primary keys each column appears in; 4) calculating the probability that each column in the database is successfully attacked; and 5) performing sensitivity quantification and sorting on each column in the database according to the probability calculated in thestep 4 that each column in the database is successfully attacked, outputting sensitivity quantification and sorting results, and completing database attribute sensitivity quantification based on attack probability. According to the method, sensitivity quantification and sorting can be carried out on all attributes in the database according to the attack success probability of an attacker, and theaccuracy is high.

Description

technical field [0001] The invention belongs to the technical field of data security, and relates to a database attribute sensitivity quantification method based on attack probability. Background technique [0002] With the advent of the era of big data, various types of data play an increasingly important role in people's daily life. While all kinds of data services have brought countless conveniences to people, they have also created a series of security problems. For example, personal information such as mobile phone numbers, photos, work units, and birth dates in social networks, as well as real-time information such as user operation logs and location information, will be stored in the database by the service provider. Once these data are attacked, In the event of data leakage, all private information of users may flow into the hands of criminals, and the consequences will be disastrous. Therefore, the management risks brought about by social security big data are bec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6254G06F21/6227
Inventor 李辉龚政赵柯纯
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products