CN109033873A - A kind of data desensitization method preventing privacy compromise - Google Patents
A kind of data desensitization method preventing privacy compromise Download PDFInfo
- Publication number
- CN109033873A CN109033873A CN201810796961.6A CN201810796961A CN109033873A CN 109033873 A CN109033873 A CN 109033873A CN 201810796961 A CN201810796961 A CN 201810796961A CN 109033873 A CN109033873 A CN 109033873A
- Authority
- CN
- China
- Prior art keywords
- data
- tables
- association
- database
- value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H10/00—ICT specially adapted for the handling or processing of patient-related medical or healthcare data
- G16H10/60—ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Epidemiology (AREA)
- Primary Health Care (AREA)
- Public Health (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The present invention relates to big data fields, disclose a kind of data desensitization method for preventing privacy compromise.It specifically includes following procedure: according to the same index field between the different data table of database, removing dominant association;For the index field between tables of data, cryptographic function is defined, the processing of ID is associated;Association ID value is calculated according to cryptographic function, after association ID value write-in, carries out data access.Technical solution of the present invention mainly uses the thinking of cryptography; algorithm process is carried out to the associate field between tables of data; remove the strong conjunction coupling between database difference table, different data between user information; so that even if in the case where obtaining customer data base super authority; also it can not know the association between each data, information; the data of acquisition and user can not confirm relationship, to realize the secret protection of data.Privacy compromise caused by the database due to caused by platform attack, interior ghost etc. directly accesses can be effectively prevented in this method.
Description
Technical field
The present invention relates to big data field, especially a kind of data desensitization method for preventing privacy compromise.
Background technique
With intelligent, networking development, the information age is exactly the epoch of data acquisition.The purposive acquisition of data,
It arranges, processing, analysis, utilize, be the obvious characteristic of big data era.
The mode of data acquisition, can can also be passed through with sensor automatic collection by smart machine automatic collection
App, user browse webpage isotype backstage and carry out.The content of data acquisition at present, has had been directed to personal every aspect.
Data have become the foundation stone of our all Information applications.The acquisition of data, on the one hand brings great convenience for individual, together
When the also potential privacy compromise of bring risk.
In medical treatment & health field, when being substantially all the digital hospital having been realized in based on electronic health record at present
Generation.Hospital information has formed the information for hospital pipe by the Highgrade integration based on electronic health record, centered on patient information
Reason system.Electronic health record is that efficient modern medical service institutions conduct, good clinic diagnosis, scientific research and medical control work must
The primary information resource of the important clinical information resources and Residential soil that need.Standardized electronic case history and using it as core
The Hospital Information System of new generation of the heart is that the clinical information that realization regional scope is served as theme with resident individual is shared and medical
Mechanical interconnection intercommunication, cooperation with service antecedent basis, not only can guarantee Residential soil " count active, counted evidence ", also
It can help to implement, specification clinical path, realize medical procedure supervision, improve medical treatment level and emergency command ability.One
The electronic medical record system of a standard or similar medical information system include very more user informations, comprising:
(1) patient basis.Such as population information, social and economic information, relatives' information, social security information and life
Object information etc.
(2) basic health and fitness information.Including present illness history, medical history, immunity history, allergies, menstrual history, family history, deformity
Situation etc.
(3) health event is made a summary.The service activity that clinic is occurred including patient all previous medical institutions.
(4) expense records
(5) Emergency call diagnosis and therapy recording.Including Emergency call case history, outpatient emergency care, check that examining (6) such as records to be hospitalized remembers
Record.Including progress note, doctor's advice, disposition record, nursing record etc.
(7) health examination records.With the routine health checkup record of health monitoring, prevention and health care as the main purpose.
These data generally by relevant mechanism acquisition after, in a manner of database etc., be stored in relevant data center, for
Treatment, the prevention and health care of family in the future etc. provides powerful support, while also providing data for scientific research, the decision support etc. of hospital
It supports.Data also bring the wind of privacy compromise while providing convenient to patient and medical institutions for patient or user
Danger.For example, include the privacy informations such as user contact details, identity card, address, kinsfolk in the database of medical information,
Personal health privacy information comprising some sensitivities of user, for example, HIV, hepatitis etc., once a leak occurs, will be caused to user non-
Often big influence.
Data or privacy compromise include main three kinds of approach: 1, personal device, password etc. are lost, and lead to personal information
Leakage.For example, personal mobile phone loses or the password of some app is lost, third party enters after obtaining, and leads to personal letter
Breath leakage;2, the invasions such as platform, data lead to high-volume data leak.Existing data center, information system etc., all and
Network has carried out connection, and outside intruders once enter platform, system, it is easy to which batch export, even copy walk data library text
Part steals user information;3, interior ghost is stolen.The network management personnel of inside, operation maintenance personnel, database administrator, third party system
Unite developer etc., can very easily touch database, become the important threat of leakage.
Current database, the information of general user between different tables, pass through some by the way of dividing table to store
Field is associated.Ensure database be replicated, access after do not lead to data leak, best mode is carried out to database
Encryption, but after data base encryption, new problem can be brought, for example, quick-searching can not be carried out, data statistics point can not be carried out
Analysis can not carry out excavation of data etc., and the access speed for also resulting in database substantially reduces, and increases additional lower deployment cost.
Summary of the invention
The technical problems to be solved by the present invention are: in view of the above problems, providing one kind prevents privacy compromise
Data desensitization method.
The technical solution adopted by the invention is as follows: a kind of data desensitization method for preventing privacy compromise, specifically includes following
Process: step 1, according to the same index field between the different data table of database, dominant association is removed;Step 2, for number
According to the index field between table, cryptographic function is defined, the processing of ID is associated;Step 3, it is calculated and is closed according to cryptographic function
Join ID value, after association ID value write-in, carries out data access.
Further, the detailed process of the step 1 are as follows: step 11, pass through the identical rope of the different data table of database
Draw field and is indexed association;Step 12, the same index field between disparate databases is defined respectively, makes different tables
Index word segment value between lattice is entirely different.
Further, the detailed process of the step 2 are as follows: step 21, for the index field between tables of data, define close
Code mathematic(al) function ID=f (M1, M2 ... .Mn, R ... ..Key);Wherein, ID is that the index of the table is associated with ID, M1, M2 ..., Mn
For data characteristics related to user, R is random number, and Key is the key that this operation is selected, and f is the encryption function of finite field
Or one-way Hash algorithm;Step 22, by the calculating of cryptographic function, make the index field and tables of data sheet of each tables of data
The index word segment value of body is entirely different.
Further, the detailed process of the step 3 are as follows: step 31, when forward direction is inquired, according to cryptographic function ID=f
(M1, M2 ... .Mn, R ... ..Key), calculate association ID value;Step 32, the association ID value calculated is written, as the tables of data
Index word segment value;Step 33, data access, data characteristics needed for Query are carried out.
Compared with prior art, having the beneficial effect that by adopting the above technical scheme
(1) technical solution of the present invention mainly uses the thinking of cryptography, carries out to the associate field between tables of data
Algorithm process, the strong conjunction coupling between removal database difference table, different data between user information, so that even if obtaining
In the case where taking customer data base super authority, the association between each data, information, the data of acquisition and user can not be also known
Relationship can not be confirmed, to realize the secret protection of data.This method can be effectively prevented since platform attack, interior ghost etc. are made
At database directly access caused by privacy compromise.
(2) leakage of this method in addition to private data can be prevented, meanwhile, excavation, use of the which to data, without shadow
Ring, realize safety and performance, the balance between data utilize also meets excavation to data simultaneously, modeling, statistical analysis,
The demand of the big datas such as artificial intelligence, decision support application.The balance that safeguard protection and data use is accomplished.
(3) this method is suitable for all fields for being related to user data and acquiring, including medical treatment & health, e-commerce, shifting
The fields such as dynamic application, Internet service.
Specific embodiment
The present invention is described further below with reference to embodiment.
The structure of database has very big influence to the performance of database and efficiency, especially very big in data volume
In the case where.One application database or data center generally comprise several tables of data, and each tables of data is by several
Different fields forms, and the association between table is generally associated by certain fields or external key.Such as a hospital is strong
Health archive database, the database include that (a true database has several tables to 4 tables of data, herein only with simple
Content is illustrated), tables of data 1 is Basic Information Table, several including the ID number of personnel, the pet name, name, identification card number etc.
It is contact method table according to table 2, it is hidden has recorded cell-phone number related to user, Email, home address and other and family
Private relevant data.Tables of data 3 is that individual files archives table, has recorded the medical card number of the user, blood group, allergies, chronic
The case where history such as disease, infectious disease.Tables of data 4 is physical examination table, and the inside saves user HIV screening, hepatitis B screening etc. and needs weight
The data of point secrecy.Tables of data 1 can be associated with individual and the family of 2 user of table by personnel ID (being defined as RY_ID)
Contact method, address etc. can also be associated with 3 health account of table of user by the ID, obtain user history medical history case history,
Situations such as family history, by the archives ID (being defined as DA_ID) of table 3, the case where the available physical examination table to 4 user of table.Such as
Someone normal or improper acquisition database-access rights of fruit, by this way all hidden of user in available tables of data
Personal letter breath, causes the leakage of privacy of user potentially hazardous.But if we by tables of data association ID (personnel ID,
Archives ID etc.) removal, then it is only clear data unrelated with someone a bit that these data, which become to have no to be associated with, even if data leak,
The leakage of privacy will not be caused, meanwhile, data still can carry out normal utilization.
A kind of data desensitization method preventing privacy compromise, specifically includes following procedure:
Step 1, according to the same index field between the different data table of database, dominant association is removed;
Wherein, the detailed process of the step 1 are as follows: step 11, pass through the same index word of the different data table of database
Section is indexed association;It is that associated, the i.e. RY_ of tables of data 1 is indexed by RY_ID between tables of data 1 and tables of data 2
The RY_ID value of ID and tables of data 2 be it is identical, by this identical ID, carry out being associated with for essential information and contact method, shape
At complete information.Similarly, between tables of data 1 and tables of data 2, tables of data 2 and tables of data 3, tables of data 3 and tables of data 4, and
Identical mechanism is indexed association;Step 12, the same index field between disparate databases is defined respectively, is made not
It is entirely different with the index word segment value between table, and irregular follow.The RY_ID for defining tables of data 2 is RY_ID2, data
The RY_ID of table 3 is RY_ID3, and the DA_ID of tables of data 4 is that DA_ID4 (or even is defined as the completely unrelated field name of title
Claim), and their corresponding values are redefined, i.e. RY_ID ≠ RY_ID2 ≠ RY_ID3, DA_ID ≠ DA_ID4.
Step 2, for the index field between tables of data, cryptographic function is defined, the processing of ID is associated;
Wherein, the detailed process of the step 2 are as follows: step 21, for the index field between tables of data, define cryptography
Function ID=f (M1, M2 ... .Mn, R ... ..Key).Wherein, ID be the table index be associated with ID, M1, M2 ..., Mn be with
The relevant data characteristics of user can be used as the information of identity characteristic, or data characteristics relevant to concordance list user information, example
Such as, the information such as name, identity card, social security card are also possible to the ID of user, the quantity and content of M, flexible choice as needed;R
It is optional for random number, it can ensure that the ID number of every record of same user is all different after use;Key is this operation selection
Key, it is optional;F is the encryption function or one-way Hash algorithm of finite field, if it is considered that the positive connection of tables of data so,
It does not support reversely, then hash function to can be used;If considering the join index of forward and reverse, can choose it is symmetrical or
Person's rivest, shamir, adelman, such as AES, SM4, RSA, ECC scheduling algorithm.Step 22, by the calculating of cryptographic function, make each
The index field of tables of data and the index word segment value of tables of data itself are entirely different.In the case where increasing random number, can do
To between the different data record of user, also absolutely not any relationship, in the case where not grasping key and algorithm, anyone
The data of database, the directly relevant information of analysis acquisition user cannot be passed through.
Step 3, association ID value is calculated according to cryptographic function, after association ID value write-in, carries out data access.
Wherein, the detailed process of the step 3 are as follows: step 31, when forward direction is inquired, according to cryptographic function
ID=f (M1, M2 ... .Mn, R ... ..Key),
Namely according to known conditions M1, M2 ... .Mn, R ... ..Key, calculate association ID value.Step 32, write-in calculates
Association ID value, the index word segment value as the tables of data.Step 33, if it is some known record, data access is carried out,
Whose data counter look into is, (M1, M2 ... .Mn, R)=f may be used-1(ID, Key) is calculated keyword M, is determined using M
And inquiry.
By taking tables of data 2 as an example, to access the data instance of table 2: assuming that the index function that we define is
RY_ID2=f (XM SFZHM, Key)
Assuming that f be aes algorithm, be character combination operation, then we will search a Zhang San,
51013019560704341 people, then his ID be
RY_ID2=AES (Zhang San 51013019560704341, Key)
It will be in the value RY_ID2 write-in tables of data 2 of the acquisition.In forward direction inquiry, the use can be obtained by identical calculating
The data RY_ID2 at family.In whose data of the Query data, then only need to calculate AES (RY_ID2, Key), so that it may
Calculating the user information is Zhang San 5101301956070434.
With the technical solution of the present embodiment, the related information of database is removed, it can be ensured that user information and user data
It is irrelevant, Outliers leakage in the case where, also can reach protection privacy of user purpose.Meanwhile the choosing for passing through algorithm
It selects, the selection of parameter, can also realize the uncoupling between data as needed, the recovery of data information also may be implemented.?
In the case of protecting privacy of user, technical conditions are provided for the utilization of data.This method takes between safety and the utilization of data
Obtained a balance.
The invention is not limited to specific embodiments above-mentioned.The present invention, which expands to, any in the present specification to be disclosed
New feature or any new combination, and disclose any new method or process the step of or any new combination.If this
Field technical staff is altered or modified not departing from the unsubstantiality that spirit of the invention is done, should belong to power of the present invention
The claimed range of benefit.
Claims (4)
1. a kind of data desensitization method for preventing privacy compromise, which is characterized in that specifically include following procedure: step 1, according to number
According to the same index field between the different data table in library, dominant association is removed;Step 2, for the index word between tables of data
Section defines cryptographic function, is associated the processing of ID;Step 3, association ID value is calculated according to cryptographic function, ID will be associated with
After value write-in, data access is carried out.
2. preventing the data desensitization method of privacy compromise as described in claim 1, which is characterized in that the step 1 it is specific
Process are as follows: step 11, association is indexed by the same index field of the different data table of database;It step 12, will be different
Same index field between database is defined respectively, keeps the index word segment value between different tables entirely different.
3. preventing the data desensitization method of privacy compromise as claimed in claim 2, which is characterized in that the step 2 it is specific
Process are as follows: step 21, for the index field between tables of data, define cryptographic function ID=f (M1, M2 ... .Mn, R ...
..Key);Wherein, ID is that the index of the table is associated with ID, and M1, M2 ..., Mn are data characteristics related to user, and R is random
Number, Key are the key that this operation is selected, and f is the encryption function or one-way Hash algorithm of finite field;Step 22, by close
The calculating of code mathematic(al) function, keeps the index field of each tables of data and the index word segment value of tables of data itself entirely different.
4. preventing the data desensitization method of privacy compromise as claimed in claim 3, which is characterized in that step 31, forward direction inquiry
When, according to cryptographic function ID=f (M1, M2 ... .Mn, R ... ..Key), calculate association ID value;Step 32, it is written and to calculate
It is associated with ID value, the index word segment value as the tables of data;Step 33, data access, data characteristics needed for Query are carried out.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810796961.6A CN109033873B (en) | 2018-07-19 | 2018-07-19 | Data desensitization method for preventing privacy leakage |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810796961.6A CN109033873B (en) | 2018-07-19 | 2018-07-19 | Data desensitization method for preventing privacy leakage |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109033873A true CN109033873A (en) | 2018-12-18 |
CN109033873B CN109033873B (en) | 2020-11-17 |
Family
ID=64643590
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810796961.6A Active CN109033873B (en) | 2018-07-19 | 2018-07-19 | Data desensitization method for preventing privacy leakage |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109033873B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109918430A (en) * | 2019-01-22 | 2019-06-21 | 中国人民解放军战略支援部队信息工程大学 | A kind of 5G user data goes associated storage system and access method |
CN110138792A (en) * | 2019-05-21 | 2019-08-16 | 上海市疾病预防控制中心 | A kind of public health geodata goes privacy processing method and system |
CN111382459A (en) * | 2018-12-27 | 2020-07-07 | 财团法人工业技术研究院 | Private data integration method and server |
CN111711674A (en) * | 2020-06-05 | 2020-09-25 | 华南师范大学 | Cloud computing method based on Internet of things |
CN111859438A (en) * | 2020-07-31 | 2020-10-30 | 上海观安信息技术股份有限公司 | Reversible desensitization encryption algorithm with specified length |
CN112541193A (en) * | 2020-12-10 | 2021-03-23 | 支付宝(杭州)信息技术有限公司 | Method and device for protecting private data |
CN113257375A (en) * | 2021-05-12 | 2021-08-13 | 中国疾病预防控制中心病毒病预防控制所 | Method for desensitizing sudden acute infectious disease data |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030046572A1 (en) * | 2001-08-30 | 2003-03-06 | Newman Aaron Charles | Cryptographic infrastructure for encrypting a database |
US20040255133A1 (en) * | 2003-06-11 | 2004-12-16 | Lei Chon Hei | Method and apparatus for encrypting database columns |
US20060041533A1 (en) * | 2004-05-20 | 2006-02-23 | Andrew Koyfman | Encrypted table indexes and searching encrypted tables |
TW200802029A (en) * | 2005-09-26 | 2008-01-01 | Ingrian Networks Inc | System and method for protecting sensitive data in a database |
CN101504668A (en) * | 2009-03-24 | 2009-08-12 | 北京理工大学 | Cryptograph index supported database transparent encryption method |
CN101859306A (en) * | 2009-04-07 | 2010-10-13 | 日电(中国)有限公司 | Method and equipment for generating blind index table, and united keyword search method and equipment |
CN102243630A (en) * | 2010-05-12 | 2011-11-16 | 北京安华金和科技有限公司 | Method for establishing database cipher text indexes without partial ordering relation |
CN102594779A (en) * | 2011-01-05 | 2012-07-18 | 中国移动通信集团公司 | User data processing method and device thereof |
CN105824825A (en) * | 2015-01-06 | 2016-08-03 | 中国移动通信集团湖南有限公司 | Sensitive data identifying method and apparatus |
CN106874401A (en) * | 2016-12-30 | 2017-06-20 | 中安威士(北京)科技有限公司 | A kind of ciphertext index method of data base-oriented encrypted fields fuzzy search |
CN106934030A (en) * | 2016-12-08 | 2017-07-07 | 戴林 | The ciphertext index method and Ku Nei encryption systems of a kind of data base-oriented encryption |
CN107145799A (en) * | 2017-05-04 | 2017-09-08 | 山东浪潮云服务信息科技有限公司 | A kind of data desensitization method and device |
CN107798253A (en) * | 2017-10-31 | 2018-03-13 | 新华三大数据技术有限公司 | Data desensitization method and device |
CN108021822A (en) * | 2017-11-30 | 2018-05-11 | 广州天鹏计算机科技有限公司 | The desensitization method and system of data |
-
2018
- 2018-07-19 CN CN201810796961.6A patent/CN109033873B/en active Active
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030046572A1 (en) * | 2001-08-30 | 2003-03-06 | Newman Aaron Charles | Cryptographic infrastructure for encrypting a database |
US20040255133A1 (en) * | 2003-06-11 | 2004-12-16 | Lei Chon Hei | Method and apparatus for encrypting database columns |
CN1761923A (en) * | 2003-06-11 | 2006-04-19 | 甲骨文国际公司 | Method and apparatus for encrypting database columns |
US20060041533A1 (en) * | 2004-05-20 | 2006-02-23 | Andrew Koyfman | Encrypted table indexes and searching encrypted tables |
TW200802029A (en) * | 2005-09-26 | 2008-01-01 | Ingrian Networks Inc | System and method for protecting sensitive data in a database |
CN101504668A (en) * | 2009-03-24 | 2009-08-12 | 北京理工大学 | Cryptograph index supported database transparent encryption method |
CN101859306A (en) * | 2009-04-07 | 2010-10-13 | 日电(中国)有限公司 | Method and equipment for generating blind index table, and united keyword search method and equipment |
CN102243630A (en) * | 2010-05-12 | 2011-11-16 | 北京安华金和科技有限公司 | Method for establishing database cipher text indexes without partial ordering relation |
CN102594779A (en) * | 2011-01-05 | 2012-07-18 | 中国移动通信集团公司 | User data processing method and device thereof |
CN105824825A (en) * | 2015-01-06 | 2016-08-03 | 中国移动通信集团湖南有限公司 | Sensitive data identifying method and apparatus |
CN106934030A (en) * | 2016-12-08 | 2017-07-07 | 戴林 | The ciphertext index method and Ku Nei encryption systems of a kind of data base-oriented encryption |
CN106874401A (en) * | 2016-12-30 | 2017-06-20 | 中安威士(北京)科技有限公司 | A kind of ciphertext index method of data base-oriented encrypted fields fuzzy search |
CN107145799A (en) * | 2017-05-04 | 2017-09-08 | 山东浪潮云服务信息科技有限公司 | A kind of data desensitization method and device |
CN107798253A (en) * | 2017-10-31 | 2018-03-13 | 新华三大数据技术有限公司 | Data desensitization method and device |
CN108021822A (en) * | 2017-11-30 | 2018-05-11 | 广州天鹏计算机科技有限公司 | The desensitization method and system of data |
Non-Patent Citations (3)
Title |
---|
TINGJIAN GE ET AL.: "Fast, Secure Encryption for Indexing in a Column-Oriented DBMS", 《2007 IEEE 23RD INTERNATIONAL CONFERENCE ON DATA ENGINEERING》 * |
庄海燕: "数据库加密技术及其在Oracle中的应用", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
王福伟: "列存储系统的数据安全与网络性能优化模型研究", 《中国博士学位论文全文数据库 信息科技辑》 * |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111382459A (en) * | 2018-12-27 | 2020-07-07 | 财团法人工业技术研究院 | Private data integration method and server |
CN109918430A (en) * | 2019-01-22 | 2019-06-21 | 中国人民解放军战略支援部队信息工程大学 | A kind of 5G user data goes associated storage system and access method |
CN109918430B (en) * | 2019-01-22 | 2022-09-23 | 中国人民解放军战略支援部队信息工程大学 | 5G user data disassociation storage system and access method |
CN110138792A (en) * | 2019-05-21 | 2019-08-16 | 上海市疾病预防控制中心 | A kind of public health geodata goes privacy processing method and system |
CN110138792B (en) * | 2019-05-21 | 2020-01-14 | 上海市疾病预防控制中心 | Public health geographic data privacy removal processing method and system |
CN111711674A (en) * | 2020-06-05 | 2020-09-25 | 华南师范大学 | Cloud computing method based on Internet of things |
CN111711674B (en) * | 2020-06-05 | 2023-03-14 | 华南师范大学 | Cloud computing method based on Internet of things |
CN111859438A (en) * | 2020-07-31 | 2020-10-30 | 上海观安信息技术股份有限公司 | Reversible desensitization encryption algorithm with specified length |
CN112541193A (en) * | 2020-12-10 | 2021-03-23 | 支付宝(杭州)信息技术有限公司 | Method and device for protecting private data |
CN113257375A (en) * | 2021-05-12 | 2021-08-13 | 中国疾病预防控制中心病毒病预防控制所 | Method for desensitizing sudden acute infectious disease data |
Also Published As
Publication number | Publication date |
---|---|
CN109033873B (en) | 2020-11-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109033873A (en) | A kind of data desensitization method preventing privacy compromise | |
De Michele et al. | Iot healthcare: Benefits, issues and challenges | |
CN104732154B (en) | By the method and system of data anonymous | |
KR20190069551A (en) | Block chain-based data processing method and device | |
Shenoy et al. | Safeguarding confidentiality in electronic health records | |
Li et al. | Is blockchain for Internet of Medical Things a panacea for COVID-19 pandemic? | |
US8566113B2 (en) | Methods, systems and computer program products for providing a level of anonymity to patient records/information | |
CN107145704A (en) | Health medical treatment monitoring, evaluating system and its method for a kind of Community-oriented | |
Saleheen et al. | mSieve: differential behavioral privacy in time series of mobile sensor data | |
Bohn et al. | Dependability issues of pervasive computing in a healthcare environment | |
Jain et al. | Blockchain and machine learning in health care and management | |
Unal et al. | Machine learning for the security of healthcare systems based on Internet of Things and edge computing | |
Venkatasubramanian et al. | Security solutions for pervasive healthcare | |
Caruccio et al. | Secure IoT analytics for fast deterioration detection in emergency rooms | |
Khan et al. | Development of national health data warehouse Bangladesh: Privacy issues and a practical solution | |
Deepa | A Biometric Approach for Electronic Healthcare Database System using SAML-A Touchfree Technology | |
Salih et al. | Privacy protection in pervasive healthcare monitoring systems with active bundles | |
Ghazal et al. | Secure IoMT pattern recognition and exploitation for multimedia information processing using private blockchain and fuzzy logic | |
Nikolidakis et al. | A secure ubiquitous healthcare system based on IMS and the HL7 standards | |
JP2009169700A (en) | Disease onset identification system secure at cohort tracking | |
Ding et al. | Frequent symptom sets identification from uncertain medical data in differentially private way | |
Carchiolo et al. | Data Collection via Wearable Medical Devices for Mobile Health. | |
Mirza et al. | Security Issues of IoT in Healthcare Sector: A Systematic Review | |
Baldi et al. | A Blockchain Approach for eHealth Situation-Aware Data Processing | |
Hu et al. | The design and implementation of the privacy protection system of a Regional Health Information Platform |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |