Unlock instant, AI-driven research and patent intelligence for your innovation.

A method for restoration and detection of structured sensitive data based on big data

A technology for structured data and sensitive data, applied in the field of information security, can solve the problems of structured sensitive data leakage, no sensitive data restoration detection, undetectable structured sensitive data restoration, etc., and achieves the effect of efficient and rapid restoration and detection

Active Publication Date: 2022-02-08
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP +1
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the generation of massive data, data from diverse sources converge into the big data center, and after these structured data are fused in a certain way, sensitive data may be restored
[0003] Existing technical research mainly focuses on how to de-private sensitive data to ensure the security of sensitive data in a single use case, but ignores the problem of structured sensitive data leakage after sensitive data is aggregated. Research on reduction detection
Therefore, there is an urgent need for a method for detecting structured sensitive data restoration based on big data to solve the problems that the restoration of structured sensitive data cannot be detected and the degree of leakage cannot be evaluated in a big data environment.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for restoration and detection of structured sensitive data based on big data
  • A method for restoration and detection of structured sensitive data based on big data
  • A method for restoration and detection of structured sensitive data based on big data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to have a clearer understanding of the technical features, purposes and effects of the present invention, specific implementations of the present invention are now described. It should be understood that the specific embodiments described here are only used to explain the present invention, and are not intended to limit the present invention, that is, the described embodiments are only some of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0042] The present invention proposes a method for restoring and detecting structured sensitive data based on big data, including structured data extraction, knowledge representation and knowledge map construction, and sensitive data restoration, wherein:

[0043] 1. Structured data extraction

[0044...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to the field of information security technology. The present invention discloses a method for restoring and detecting structured sensitive data based on big data, including structured data extraction, knowledge representation and knowledge map construction, and sensitive data restoration. The structured data extraction is aimed at Structured data in databases and text files are aggregated and extracted according to data standards. The final form of data aggregation is a relational database, and then the data is converted into RDF format; knowledge representation and knowledge map construction are knowledge elements obtained from different data sources Carry out fusion to build the relationship between the data to form a knowledge map; sensitive data restoration is to extract the associated data from the aggregated data according to the standard configuration, import the data into the associated database according to the relationship of the knowledge map, and then perform sensitive data restoration query. The invention solves the problems that it is impossible to detect whether the massive structured sensitive data is restored after desensitization in the big data environment, and it is impossible to evaluate the leakage of sensitive data.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for restoring and detecting structured sensitive data based on big data. Background technique [0002] In the big data environment, data is frequently shared and exchanged, and there are more and more government and enterprise data circulation transactions. In order to protect privacy, the structured stored data is deprived and transmitted to the network. This is currently the most commonly used method for data privacy protection. However, with the generation of massive data, data from diverse sources converges to the big data center, and after these structured data are fused in a certain way, it is possible to restore sensitive data. [0003] Existing technical research mainly focuses on how to de-private sensitive data to ensure the security of sensitive data in a single use case, but ignores the problem of structured sensitive data leakage after sensitiv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57G06F16/36G06F16/25G06F16/215
CPCG06F21/577G06F16/367G06F16/254G06F16/215
Inventor 陈天莹李霄万力杨政林青彪陈锦王禹成林
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP