CN109033873A - A kind of data desensitization method preventing privacy compromise - Google Patents

A kind of data desensitization method preventing privacy compromise Download PDF

Info

Publication number
CN109033873A
CN109033873A CN201810796961.6A CN201810796961A CN109033873A CN 109033873 A CN109033873 A CN 109033873A CN 201810796961 A CN201810796961 A CN 201810796961A CN 109033873 A CN109033873 A CN 109033873A
Authority
CN
China
Prior art keywords
data
tables
association
database
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810796961.6A
Other languages
Chinese (zh)
Other versions
CN109033873B (en
Inventor
刘贤洪
贾宗华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Changhong Intelligent Health Technology Co Ltd
Original Assignee
Sichuan Changhong Intelligent Health Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Changhong Intelligent Health Technology Co Ltd filed Critical Sichuan Changhong Intelligent Health Technology Co Ltd
Priority to CN201810796961.6A priority Critical patent/CN109033873B/en
Publication of CN109033873A publication Critical patent/CN109033873A/en
Application granted granted Critical
Publication of CN109033873B publication Critical patent/CN109033873B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H10/00ICT specially adapted for the handling or processing of patient-related medical or healthcare data
    • G16H10/60ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Epidemiology (AREA)
  • Primary Health Care (AREA)
  • Public Health (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The present invention relates to big data fields, disclose a kind of data desensitization method for preventing privacy compromise.It specifically includes following procedure: according to the same index field between the different data table of database, removing dominant association;For the index field between tables of data, cryptographic function is defined, the processing of ID is associated;Association ID value is calculated according to cryptographic function, after association ID value write-in, carries out data access.Technical solution of the present invention mainly uses the thinking of cryptography; algorithm process is carried out to the associate field between tables of data; remove the strong conjunction coupling between database difference table, different data between user information; so that even if in the case where obtaining customer data base super authority; also it can not know the association between each data, information; the data of acquisition and user can not confirm relationship, to realize the secret protection of data.Privacy compromise caused by the database due to caused by platform attack, interior ghost etc. directly accesses can be effectively prevented in this method.

Description

A kind of data desensitization method preventing privacy compromise
Technical field
The present invention relates to big data field, especially a kind of data desensitization method for preventing privacy compromise.
Background technique
With intelligent, networking development, the information age is exactly the epoch of data acquisition.The purposive acquisition of data, It arranges, processing, analysis, utilize, be the obvious characteristic of big data era.
The mode of data acquisition, can can also be passed through with sensor automatic collection by smart machine automatic collection App, user browse webpage isotype backstage and carry out.The content of data acquisition at present, has had been directed to personal every aspect. Data have become the foundation stone of our all Information applications.The acquisition of data, on the one hand brings great convenience for individual, together When the also potential privacy compromise of bring risk.
In medical treatment & health field, when being substantially all the digital hospital having been realized in based on electronic health record at present Generation.Hospital information has formed the information for hospital pipe by the Highgrade integration based on electronic health record, centered on patient information Reason system.Electronic health record is that efficient modern medical service institutions conduct, good clinic diagnosis, scientific research and medical control work must The primary information resource of the important clinical information resources and Residential soil that need.Standardized electronic case history and using it as core The Hospital Information System of new generation of the heart is that the clinical information that realization regional scope is served as theme with resident individual is shared and medical Mechanical interconnection intercommunication, cooperation with service antecedent basis, not only can guarantee Residential soil " count active, counted evidence ", also It can help to implement, specification clinical path, realize medical procedure supervision, improve medical treatment level and emergency command ability.One The electronic medical record system of a standard or similar medical information system include very more user informations, comprising:
(1) patient basis.Such as population information, social and economic information, relatives' information, social security information and life Object information etc.
(2) basic health and fitness information.Including present illness history, medical history, immunity history, allergies, menstrual history, family history, deformity Situation etc.
(3) health event is made a summary.The service activity that clinic is occurred including patient all previous medical institutions.
(4) expense records
(5) Emergency call diagnosis and therapy recording.Including Emergency call case history, outpatient emergency care, check that examining (6) such as records to be hospitalized remembers Record.Including progress note, doctor's advice, disposition record, nursing record etc.
(7) health examination records.With the routine health checkup record of health monitoring, prevention and health care as the main purpose.
These data generally by relevant mechanism acquisition after, in a manner of database etc., be stored in relevant data center, for Treatment, the prevention and health care of family in the future etc. provides powerful support, while also providing data for scientific research, the decision support etc. of hospital It supports.Data also bring the wind of privacy compromise while providing convenient to patient and medical institutions for patient or user Danger.For example, include the privacy informations such as user contact details, identity card, address, kinsfolk in the database of medical information, Personal health privacy information comprising some sensitivities of user, for example, HIV, hepatitis etc., once a leak occurs, will be caused to user non- Often big influence.
Data or privacy compromise include main three kinds of approach: 1, personal device, password etc. are lost, and lead to personal information Leakage.For example, personal mobile phone loses or the password of some app is lost, third party enters after obtaining, and leads to personal letter Breath leakage;2, the invasions such as platform, data lead to high-volume data leak.Existing data center, information system etc., all and Network has carried out connection, and outside intruders once enter platform, system, it is easy to which batch export, even copy walk data library text Part steals user information;3, interior ghost is stolen.The network management personnel of inside, operation maintenance personnel, database administrator, third party system Unite developer etc., can very easily touch database, become the important threat of leakage.
Current database, the information of general user between different tables, pass through some by the way of dividing table to store Field is associated.Ensure database be replicated, access after do not lead to data leak, best mode is carried out to database Encryption, but after data base encryption, new problem can be brought, for example, quick-searching can not be carried out, data statistics point can not be carried out Analysis can not carry out excavation of data etc., and the access speed for also resulting in database substantially reduces, and increases additional lower deployment cost.
Summary of the invention
The technical problems to be solved by the present invention are: in view of the above problems, providing one kind prevents privacy compromise Data desensitization method.
The technical solution adopted by the invention is as follows: a kind of data desensitization method for preventing privacy compromise, specifically includes following Process: step 1, according to the same index field between the different data table of database, dominant association is removed;Step 2, for number According to the index field between table, cryptographic function is defined, the processing of ID is associated;Step 3, it is calculated and is closed according to cryptographic function Join ID value, after association ID value write-in, carries out data access.
Further, the detailed process of the step 1 are as follows: step 11, pass through the identical rope of the different data table of database Draw field and is indexed association;Step 12, the same index field between disparate databases is defined respectively, makes different tables Index word segment value between lattice is entirely different.
Further, the detailed process of the step 2 are as follows: step 21, for the index field between tables of data, define close Code mathematic(al) function ID=f (M1, M2 ... .Mn, R ... ..Key);Wherein, ID is that the index of the table is associated with ID, M1, M2 ..., Mn For data characteristics related to user, R is random number, and Key is the key that this operation is selected, and f is the encryption function of finite field Or one-way Hash algorithm;Step 22, by the calculating of cryptographic function, make the index field and tables of data sheet of each tables of data The index word segment value of body is entirely different.
Further, the detailed process of the step 3 are as follows: step 31, when forward direction is inquired, according to cryptographic function ID=f (M1, M2 ... .Mn, R ... ..Key), calculate association ID value;Step 32, the association ID value calculated is written, as the tables of data Index word segment value;Step 33, data access, data characteristics needed for Query are carried out.
Compared with prior art, having the beneficial effect that by adopting the above technical scheme
(1) technical solution of the present invention mainly uses the thinking of cryptography, carries out to the associate field between tables of data Algorithm process, the strong conjunction coupling between removal database difference table, different data between user information, so that even if obtaining In the case where taking customer data base super authority, the association between each data, information, the data of acquisition and user can not be also known Relationship can not be confirmed, to realize the secret protection of data.This method can be effectively prevented since platform attack, interior ghost etc. are made At database directly access caused by privacy compromise.
(2) leakage of this method in addition to private data can be prevented, meanwhile, excavation, use of the which to data, without shadow Ring, realize safety and performance, the balance between data utilize also meets excavation to data simultaneously, modeling, statistical analysis, The demand of the big datas such as artificial intelligence, decision support application.The balance that safeguard protection and data use is accomplished.
(3) this method is suitable for all fields for being related to user data and acquiring, including medical treatment & health, e-commerce, shifting The fields such as dynamic application, Internet service.
Specific embodiment
The present invention is described further below with reference to embodiment.
The structure of database has very big influence to the performance of database and efficiency, especially very big in data volume In the case where.One application database or data center generally comprise several tables of data, and each tables of data is by several Different fields forms, and the association between table is generally associated by certain fields or external key.Such as a hospital is strong Health archive database, the database include that (a true database has several tables to 4 tables of data, herein only with simple Content is illustrated), tables of data 1 is Basic Information Table, several including the ID number of personnel, the pet name, name, identification card number etc. It is contact method table according to table 2, it is hidden has recorded cell-phone number related to user, Email, home address and other and family Private relevant data.Tables of data 3 is that individual files archives table, has recorded the medical card number of the user, blood group, allergies, chronic The case where history such as disease, infectious disease.Tables of data 4 is physical examination table, and the inside saves user HIV screening, hepatitis B screening etc. and needs weight The data of point secrecy.Tables of data 1 can be associated with individual and the family of 2 user of table by personnel ID (being defined as RY_ID) Contact method, address etc. can also be associated with 3 health account of table of user by the ID, obtain user history medical history case history, Situations such as family history, by the archives ID (being defined as DA_ID) of table 3, the case where the available physical examination table to 4 user of table.Such as Someone normal or improper acquisition database-access rights of fruit, by this way all hidden of user in available tables of data Personal letter breath, causes the leakage of privacy of user potentially hazardous.But if we by tables of data association ID (personnel ID, Archives ID etc.) removal, then it is only clear data unrelated with someone a bit that these data, which become to have no to be associated with, even if data leak, The leakage of privacy will not be caused, meanwhile, data still can carry out normal utilization.
A kind of data desensitization method preventing privacy compromise, specifically includes following procedure:
Step 1, according to the same index field between the different data table of database, dominant association is removed;
Wherein, the detailed process of the step 1 are as follows: step 11, pass through the same index word of the different data table of database Section is indexed association;It is that associated, the i.e. RY_ of tables of data 1 is indexed by RY_ID between tables of data 1 and tables of data 2 The RY_ID value of ID and tables of data 2 be it is identical, by this identical ID, carry out being associated with for essential information and contact method, shape At complete information.Similarly, between tables of data 1 and tables of data 2, tables of data 2 and tables of data 3, tables of data 3 and tables of data 4, and Identical mechanism is indexed association;Step 12, the same index field between disparate databases is defined respectively, is made not It is entirely different with the index word segment value between table, and irregular follow.The RY_ID for defining tables of data 2 is RY_ID2, data The RY_ID of table 3 is RY_ID3, and the DA_ID of tables of data 4 is that DA_ID4 (or even is defined as the completely unrelated field name of title Claim), and their corresponding values are redefined, i.e. RY_ID ≠ RY_ID2 ≠ RY_ID3, DA_ID ≠ DA_ID4.
Step 2, for the index field between tables of data, cryptographic function is defined, the processing of ID is associated;
Wherein, the detailed process of the step 2 are as follows: step 21, for the index field between tables of data, define cryptography Function ID=f (M1, M2 ... .Mn, R ... ..Key).Wherein, ID be the table index be associated with ID, M1, M2 ..., Mn be with The relevant data characteristics of user can be used as the information of identity characteristic, or data characteristics relevant to concordance list user information, example Such as, the information such as name, identity card, social security card are also possible to the ID of user, the quantity and content of M, flexible choice as needed;R It is optional for random number, it can ensure that the ID number of every record of same user is all different after use;Key is this operation selection Key, it is optional;F is the encryption function or one-way Hash algorithm of finite field, if it is considered that the positive connection of tables of data so, It does not support reversely, then hash function to can be used;If considering the join index of forward and reverse, can choose it is symmetrical or Person's rivest, shamir, adelman, such as AES, SM4, RSA, ECC scheduling algorithm.Step 22, by the calculating of cryptographic function, make each The index field of tables of data and the index word segment value of tables of data itself are entirely different.In the case where increasing random number, can do To between the different data record of user, also absolutely not any relationship, in the case where not grasping key and algorithm, anyone The data of database, the directly relevant information of analysis acquisition user cannot be passed through.
Step 3, association ID value is calculated according to cryptographic function, after association ID value write-in, carries out data access.
Wherein, the detailed process of the step 3 are as follows: step 31, when forward direction is inquired, according to cryptographic function
ID=f (M1, M2 ... .Mn, R ... ..Key),
Namely according to known conditions M1, M2 ... .Mn, R ... ..Key, calculate association ID value.Step 32, write-in calculates Association ID value, the index word segment value as the tables of data.Step 33, if it is some known record, data access is carried out, Whose data counter look into is, (M1, M2 ... .Mn, R)=f may be used-1(ID, Key) is calculated keyword M, is determined using M And inquiry.
By taking tables of data 2 as an example, to access the data instance of table 2: assuming that the index function that we define is
RY_ID2=f (XM SFZHM, Key)
Assuming that f be aes algorithm, be character combination operation, then we will search a Zhang San, 51013019560704341 people, then his ID be
RY_ID2=AES (Zhang San 51013019560704341, Key)
It will be in the value RY_ID2 write-in tables of data 2 of the acquisition.In forward direction inquiry, the use can be obtained by identical calculating The data RY_ID2 at family.In whose data of the Query data, then only need to calculate AES (RY_ID2, Key), so that it may Calculating the user information is Zhang San 5101301956070434.
With the technical solution of the present embodiment, the related information of database is removed, it can be ensured that user information and user data It is irrelevant, Outliers leakage in the case where, also can reach protection privacy of user purpose.Meanwhile the choosing for passing through algorithm It selects, the selection of parameter, can also realize the uncoupling between data as needed, the recovery of data information also may be implemented.? In the case of protecting privacy of user, technical conditions are provided for the utilization of data.This method takes between safety and the utilization of data Obtained a balance.
The invention is not limited to specific embodiments above-mentioned.The present invention, which expands to, any in the present specification to be disclosed New feature or any new combination, and disclose any new method or process the step of or any new combination.If this Field technical staff is altered or modified not departing from the unsubstantiality that spirit of the invention is done, should belong to power of the present invention The claimed range of benefit.

Claims (4)

1. a kind of data desensitization method for preventing privacy compromise, which is characterized in that specifically include following procedure: step 1, according to number According to the same index field between the different data table in library, dominant association is removed;Step 2, for the index word between tables of data Section defines cryptographic function, is associated the processing of ID;Step 3, association ID value is calculated according to cryptographic function, ID will be associated with After value write-in, data access is carried out.
2. preventing the data desensitization method of privacy compromise as described in claim 1, which is characterized in that the step 1 it is specific Process are as follows: step 11, association is indexed by the same index field of the different data table of database;It step 12, will be different Same index field between database is defined respectively, keeps the index word segment value between different tables entirely different.
3. preventing the data desensitization method of privacy compromise as claimed in claim 2, which is characterized in that the step 2 it is specific Process are as follows: step 21, for the index field between tables of data, define cryptographic function ID=f (M1, M2 ... .Mn, R ... ..Key);Wherein, ID is that the index of the table is associated with ID, and M1, M2 ..., Mn are data characteristics related to user, and R is random Number, Key are the key that this operation is selected, and f is the encryption function or one-way Hash algorithm of finite field;Step 22, by close The calculating of code mathematic(al) function, keeps the index field of each tables of data and the index word segment value of tables of data itself entirely different.
4. preventing the data desensitization method of privacy compromise as claimed in claim 3, which is characterized in that step 31, forward direction inquiry When, according to cryptographic function ID=f (M1, M2 ... .Mn, R ... ..Key), calculate association ID value;Step 32, it is written and to calculate It is associated with ID value, the index word segment value as the tables of data;Step 33, data access, data characteristics needed for Query are carried out.
CN201810796961.6A 2018-07-19 2018-07-19 Data desensitization method for preventing privacy leakage Active CN109033873B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810796961.6A CN109033873B (en) 2018-07-19 2018-07-19 Data desensitization method for preventing privacy leakage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810796961.6A CN109033873B (en) 2018-07-19 2018-07-19 Data desensitization method for preventing privacy leakage

Publications (2)

Publication Number Publication Date
CN109033873A true CN109033873A (en) 2018-12-18
CN109033873B CN109033873B (en) 2020-11-17

Family

ID=64643590

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810796961.6A Active CN109033873B (en) 2018-07-19 2018-07-19 Data desensitization method for preventing privacy leakage

Country Status (1)

Country Link
CN (1) CN109033873B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109918430A (en) * 2019-01-22 2019-06-21 中国人民解放军战略支援部队信息工程大学 A kind of 5G user data goes associated storage system and access method
CN110138792A (en) * 2019-05-21 2019-08-16 上海市疾病预防控制中心 A kind of public health geodata goes privacy processing method and system
CN111382459A (en) * 2018-12-27 2020-07-07 财团法人工业技术研究院 Private data integration method and server
CN111711674A (en) * 2020-06-05 2020-09-25 华南师范大学 Cloud computing method based on Internet of things
CN111859438A (en) * 2020-07-31 2020-10-30 上海观安信息技术股份有限公司 Reversible desensitization encryption algorithm with specified length
CN112541193A (en) * 2020-12-10 2021-03-23 支付宝(杭州)信息技术有限公司 Method and device for protecting private data
CN113257375A (en) * 2021-05-12 2021-08-13 中国疾病预防控制中心病毒病预防控制所 Method for desensitizing sudden acute infectious disease data

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030046572A1 (en) * 2001-08-30 2003-03-06 Newman Aaron Charles Cryptographic infrastructure for encrypting a database
US20040255133A1 (en) * 2003-06-11 2004-12-16 Lei Chon Hei Method and apparatus for encrypting database columns
US20060041533A1 (en) * 2004-05-20 2006-02-23 Andrew Koyfman Encrypted table indexes and searching encrypted tables
TW200802029A (en) * 2005-09-26 2008-01-01 Ingrian Networks Inc System and method for protecting sensitive data in a database
CN101504668A (en) * 2009-03-24 2009-08-12 北京理工大学 Cryptograph index supported database transparent encryption method
CN101859306A (en) * 2009-04-07 2010-10-13 日电(中国)有限公司 Method and equipment for generating blind index table, and united keyword search method and equipment
CN102243630A (en) * 2010-05-12 2011-11-16 北京安华金和科技有限公司 Method for establishing database cipher text indexes without partial ordering relation
CN102594779A (en) * 2011-01-05 2012-07-18 中国移动通信集团公司 User data processing method and device thereof
CN105824825A (en) * 2015-01-06 2016-08-03 中国移动通信集团湖南有限公司 Sensitive data identifying method and apparatus
CN106874401A (en) * 2016-12-30 2017-06-20 中安威士(北京)科技有限公司 A kind of ciphertext index method of data base-oriented encrypted fields fuzzy search
CN106934030A (en) * 2016-12-08 2017-07-07 戴林 The ciphertext index method and Ku Nei encryption systems of a kind of data base-oriented encryption
CN107145799A (en) * 2017-05-04 2017-09-08 山东浪潮云服务信息科技有限公司 A kind of data desensitization method and device
CN107798253A (en) * 2017-10-31 2018-03-13 新华三大数据技术有限公司 Data desensitization method and device
CN108021822A (en) * 2017-11-30 2018-05-11 广州天鹏计算机科技有限公司 The desensitization method and system of data

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030046572A1 (en) * 2001-08-30 2003-03-06 Newman Aaron Charles Cryptographic infrastructure for encrypting a database
US20040255133A1 (en) * 2003-06-11 2004-12-16 Lei Chon Hei Method and apparatus for encrypting database columns
CN1761923A (en) * 2003-06-11 2006-04-19 甲骨文国际公司 Method and apparatus for encrypting database columns
US20060041533A1 (en) * 2004-05-20 2006-02-23 Andrew Koyfman Encrypted table indexes and searching encrypted tables
TW200802029A (en) * 2005-09-26 2008-01-01 Ingrian Networks Inc System and method for protecting sensitive data in a database
CN101504668A (en) * 2009-03-24 2009-08-12 北京理工大学 Cryptograph index supported database transparent encryption method
CN101859306A (en) * 2009-04-07 2010-10-13 日电(中国)有限公司 Method and equipment for generating blind index table, and united keyword search method and equipment
CN102243630A (en) * 2010-05-12 2011-11-16 北京安华金和科技有限公司 Method for establishing database cipher text indexes without partial ordering relation
CN102594779A (en) * 2011-01-05 2012-07-18 中国移动通信集团公司 User data processing method and device thereof
CN105824825A (en) * 2015-01-06 2016-08-03 中国移动通信集团湖南有限公司 Sensitive data identifying method and apparatus
CN106934030A (en) * 2016-12-08 2017-07-07 戴林 The ciphertext index method and Ku Nei encryption systems of a kind of data base-oriented encryption
CN106874401A (en) * 2016-12-30 2017-06-20 中安威士(北京)科技有限公司 A kind of ciphertext index method of data base-oriented encrypted fields fuzzy search
CN107145799A (en) * 2017-05-04 2017-09-08 山东浪潮云服务信息科技有限公司 A kind of data desensitization method and device
CN107798253A (en) * 2017-10-31 2018-03-13 新华三大数据技术有限公司 Data desensitization method and device
CN108021822A (en) * 2017-11-30 2018-05-11 广州天鹏计算机科技有限公司 The desensitization method and system of data

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
TINGJIAN GE ET AL.: "Fast, Secure Encryption for Indexing in a Column-Oriented DBMS", 《2007 IEEE 23RD INTERNATIONAL CONFERENCE ON DATA ENGINEERING》 *
庄海燕: "数据库加密技术及其在Oracle中的应用", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *
王福伟: "列存储系统的数据安全与网络性能优化模型研究", 《中国博士学位论文全文数据库 信息科技辑》 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111382459A (en) * 2018-12-27 2020-07-07 财团法人工业技术研究院 Private data integration method and server
CN109918430A (en) * 2019-01-22 2019-06-21 中国人民解放军战略支援部队信息工程大学 A kind of 5G user data goes associated storage system and access method
CN109918430B (en) * 2019-01-22 2022-09-23 中国人民解放军战略支援部队信息工程大学 5G user data disassociation storage system and access method
CN110138792A (en) * 2019-05-21 2019-08-16 上海市疾病预防控制中心 A kind of public health geodata goes privacy processing method and system
CN110138792B (en) * 2019-05-21 2020-01-14 上海市疾病预防控制中心 Public health geographic data privacy removal processing method and system
CN111711674A (en) * 2020-06-05 2020-09-25 华南师范大学 Cloud computing method based on Internet of things
CN111711674B (en) * 2020-06-05 2023-03-14 华南师范大学 Cloud computing method based on Internet of things
CN111859438A (en) * 2020-07-31 2020-10-30 上海观安信息技术股份有限公司 Reversible desensitization encryption algorithm with specified length
CN112541193A (en) * 2020-12-10 2021-03-23 支付宝(杭州)信息技术有限公司 Method and device for protecting private data
CN113257375A (en) * 2021-05-12 2021-08-13 中国疾病预防控制中心病毒病预防控制所 Method for desensitizing sudden acute infectious disease data

Also Published As

Publication number Publication date
CN109033873B (en) 2020-11-17

Similar Documents

Publication Publication Date Title
CN109033873A (en) A kind of data desensitization method preventing privacy compromise
De Michele et al. Iot healthcare: Benefits, issues and challenges
CN104732154B (en) By the method and system of data anonymous
KR20190069551A (en) Block chain-based data processing method and device
Shenoy et al. Safeguarding confidentiality in electronic health records
Li et al. Is blockchain for Internet of Medical Things a panacea for COVID-19 pandemic?
US8566113B2 (en) Methods, systems and computer program products for providing a level of anonymity to patient records/information
CN107145704A (en) Health medical treatment monitoring, evaluating system and its method for a kind of Community-oriented
Saleheen et al. mSieve: differential behavioral privacy in time series of mobile sensor data
Bohn et al. Dependability issues of pervasive computing in a healthcare environment
Jain et al. Blockchain and machine learning in health care and management
Unal et al. Machine learning for the security of healthcare systems based on Internet of Things and edge computing
Venkatasubramanian et al. Security solutions for pervasive healthcare
Caruccio et al. Secure IoT analytics for fast deterioration detection in emergency rooms
Khan et al. Development of national health data warehouse Bangladesh: Privacy issues and a practical solution
Deepa A Biometric Approach for Electronic Healthcare Database System using SAML-A Touchfree Technology
Salih et al. Privacy protection in pervasive healthcare monitoring systems with active bundles
Ghazal et al. Secure IoMT pattern recognition and exploitation for multimedia information processing using private blockchain and fuzzy logic
Nikolidakis et al. A secure ubiquitous healthcare system based on IMS and the HL7 standards
JP2009169700A (en) Disease onset identification system secure at cohort tracking
Ding et al. Frequent symptom sets identification from uncertain medical data in differentially private way
Carchiolo et al. Data Collection via Wearable Medical Devices for Mobile Health.
Mirza et al. Security Issues of IoT in Healthcare Sector: A Systematic Review
Baldi et al. A Blockchain Approach for eHealth Situation-Aware Data Processing
Hu et al. The design and implementation of the privacy protection system of a Regional Health Information Platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant