CN110869932A - 匿名加密数据 - Google Patents

匿名加密数据 Download PDF

Info

Publication number
CN110869932A
CN110869932A CN201880045907.6A CN201880045907A CN110869932A CN 110869932 A CN110869932 A CN 110869932A CN 201880045907 A CN201880045907 A CN 201880045907A CN 110869932 A CN110869932 A CN 110869932A
Authority
CN
China
Prior art keywords
encrypted data
computer
clusters
cluster
component
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201880045907.6A
Other languages
English (en)
Chinese (zh)
Inventor
S·安东纳托斯
S·布拉格因
M·凯撒瓦尼
A·考尔
S·梅塔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Publication of CN110869932A publication Critical patent/CN110869932A/zh
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1408Protection against unauthorised use of memory or access to memory by using cryptography
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2212/00Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
    • G06F2212/10Providing a specific technical effect
    • G06F2212/1052Security improvement
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Data Mining & Analysis (AREA)
  • Evolutionary Computation (AREA)
  • Mathematical Physics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)
CN201880045907.6A 2017-07-12 2018-06-08 匿名加密数据 Pending CN110869932A (zh)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US15/648,179 US10700864B2 (en) 2017-07-12 2017-07-12 Anonymous encrypted data
US15/648,179 2017-07-12
PCT/IB2018/054139 WO2019012343A1 (en) 2017-07-12 2018-06-08 ANONYMOUS ENCOUNTERED DATA

Publications (1)

Publication Number Publication Date
CN110869932A true CN110869932A (zh) 2020-03-06

Family

ID=64999235

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201880045907.6A Pending CN110869932A (zh) 2017-07-12 2018-06-08 匿名加密数据

Country Status (6)

Country Link
US (2) US10700864B2 (enExample)
JP (1) JP7102499B2 (enExample)
CN (1) CN110869932A (enExample)
DE (1) DE112018003544T5 (enExample)
GB (1) GB2577466A (enExample)
WO (1) WO2019012343A1 (enExample)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115048658A (zh) * 2021-03-09 2022-09-13 技术创新研究所 利用匿名分片技术保护分布式数据的系统、方法和计算机可读介质

Families Citing this family (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10764048B2 (en) * 2017-12-20 2020-09-01 Nxp B.V. Privacy-preserving evaluation of decision trees
US11461360B2 (en) * 2018-03-30 2022-10-04 AVAST Software s.r.o. Efficiently initializing distributed clustering on large data sets
US11056981B2 (en) 2018-07-07 2021-07-06 Intelesol, Llc Method and apparatus for signal extraction with sample and hold and release
US11581725B2 (en) 2018-07-07 2023-02-14 Intelesol, Llc Solid-state power interrupters
US11671029B2 (en) 2018-07-07 2023-06-06 Intelesol, Llc AC to DC converters
US11205011B2 (en) 2018-09-27 2021-12-21 Amber Solutions, Inc. Privacy and the management of permissions
US11334388B2 (en) 2018-09-27 2022-05-17 Amber Solutions, Inc. Infrastructure support to enhance resource-constrained device capabilities
US11349296B2 (en) 2018-10-01 2022-05-31 Intelesol, Llc Solid-state circuit interrupters
US10985548B2 (en) 2018-10-01 2021-04-20 Intelesol, Llc Circuit interrupter with optical connection
US11463274B2 (en) * 2018-11-07 2022-10-04 Amber Semiconductor, Inc. Third party application enablement for node networks deployed in residential and commercial settings
CN113455105B (zh) 2018-12-17 2024-06-28 因特莱索有限责任公司 Ac驱动的发光二极管系统
KR20210099564A (ko) * 2018-12-31 2021-08-12 인텔 코포레이션 인공 지능을 이용한 보안 시스템
US12014535B2 (en) * 2019-03-19 2024-06-18 Nec Corporation System, client apparatus, data processing method, computer program and recording medium
US11170964B2 (en) 2019-05-18 2021-11-09 Amber Solutions, Inc. Intelligent circuit breakers with detection circuitry configured to detect fault conditions
US12212651B2 (en) 2019-11-15 2025-01-28 International Business Machines Corporation Enabling boosting protocols on encrypted data
US11349297B2 (en) 2020-01-21 2022-05-31 Amber Solutions, Inc. Intelligent circuit interruption
CN111723396B (zh) * 2020-05-20 2023-02-10 华南理工大学 一种基于SaaS的通用云数据隐私保护平台与方法
US11670946B2 (en) 2020-08-11 2023-06-06 Amber Semiconductor, Inc. Intelligent energy source monitoring and selection control system
JP7165795B2 (ja) * 2020-08-31 2022-11-04 株式会社日立製作所 データ解析システムのプライバシー保護データを生成する方法及びデバイス
CN112508075B (zh) * 2020-12-01 2024-07-05 平安科技(深圳)有限公司 基于横向联邦的dbscan聚类方法、及其相关设备
US11216580B1 (en) * 2021-03-12 2022-01-04 Snowflake Inc. Secure machine learning using shared data in a distributed database
US12113525B2 (en) 2021-09-30 2024-10-08 Amber Semiconductor, Inc. Intelligent electrical switches
WO2023058240A1 (ja) * 2021-10-08 2023-04-13 日本電信電話株式会社 クラスタリング装置、クラスタリング方法、およびプログラム
US12348028B2 (en) 2021-10-22 2025-07-01 Amber Semiconductor, Inc. Multi-output programmable power manager
KR102651820B1 (ko) * 2021-12-03 2024-03-27 주식회사 스패로우 기밀 데이터의 보안성을 위한 하이브리드 클라우드 기반 SECaaS 장치 및 방법
CN114866486B (zh) * 2022-03-18 2024-06-18 广州大学 一种基于数据包的加密流量分类系统

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104732154A (zh) * 2013-12-18 2015-06-24 国际商业机器公司 将数据匿名化的方法和系统
US20150339488A1 (en) * 2013-01-10 2015-11-26 Nec Corporation Information processing device, information processing method and medium
US20160012193A1 (en) * 2014-07-09 2016-01-14 Gal Almogy System, method and computer program product for disease monitoring and identification
US20170053214A1 (en) * 2014-04-28 2017-02-23 Hewlett Packard Enterprise Development Lp Network flow classification
CN106570348A (zh) * 2016-10-08 2017-04-19 徐州医科大学 一种具有抑制机制的流式生物数据隐私保护增量发布算法
US20180121811A1 (en) * 2015-04-03 2018-05-03 Ptc Inc. Profiling a population of examples in a precisely descriptive or tendency-based manner

Family Cites Families (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6049613A (en) 1997-03-07 2000-04-11 Jakobsson; Markus Method and apparatus for encrypting, decrypting, and providing privacy for data values
US20030130893A1 (en) 2000-08-11 2003-07-10 Telanon, Inc. Systems, methods, and computer program products for privacy protection
US7856100B2 (en) 2005-12-19 2010-12-21 Microsoft Corporation Privacy-preserving data aggregation using homomorphic encryption
US8055668B2 (en) 2008-02-13 2011-11-08 Camouflage Software, Inc. Method and system for masking data in a consistent manner across multiple data sources
US8112422B2 (en) 2008-10-27 2012-02-07 At&T Intellectual Property I, L.P. Computer systems, methods and computer program products for data anonymization for aggregate query answering
US8825074B2 (en) * 2009-02-02 2014-09-02 Waldeck Technology, Llc Modifying a user'S contribution to an aggregate profile based on time between location updates and external events
US9471645B2 (en) * 2009-09-29 2016-10-18 International Business Machines Corporation Mechanisms for privately sharing semi-structured data
US20120254333A1 (en) * 2010-01-07 2012-10-04 Rajarathnam Chandramouli Automated detection of deception in short and multilingual electronic messages
US8626749B1 (en) 2010-04-21 2014-01-07 Stan Trepetin System and method of analyzing encrypted data in a database in near real-time
US8930896B1 (en) 2010-07-23 2015-01-06 Amazon Technologies, Inc. Data anonymity and separation for user computation
CA3179622C (en) 2010-10-08 2025-08-05 Brian Leemoffat PRIVATE DATA SHARING SYSTEM
US9276911B2 (en) 2011-05-13 2016-03-01 Indiana University Research & Technology Corporation Secure and scalable mapping of human sequencing reads on hybrid clouds
US8990558B2 (en) * 2011-11-09 2015-03-24 Safer Point Ltd Securing information in a cloud computing system
CN103336770B (zh) * 2012-02-28 2017-03-01 国际商业机器公司 用于标识互补数据对象的方法和系统
US9117444B2 (en) * 2012-05-29 2015-08-25 Nuance Communications, Inc. Methods and apparatus for performing transformation techniques for data clustering and/or classification
GB2509709A (en) 2013-01-09 2014-07-16 Ibm Transparent encryption/decryption gateway for cloud storage services
US9020754B2 (en) * 2013-03-22 2015-04-28 Here Global B.V. Vehicle arrival prediction
US9471883B2 (en) 2013-05-09 2016-10-18 Moodwire, Inc. Hybrid human machine learning system and method
US9280593B1 (en) * 2013-07-24 2016-03-08 Amazon Technologies, Inc. Centroid detection for clustering
US9378382B1 (en) 2013-10-31 2016-06-28 Washington University Methods and systems for encrypting private datasets using cryptosets
US9332423B2 (en) * 2013-11-27 2016-05-03 Google Technology Holdings LLC Methods and systems for system updating of mobile devices operating in privacy or other informationally restricted modes
JP6309866B2 (ja) 2014-09-04 2018-04-11 株式会社東芝 匿名化システム
EP3252704B1 (en) * 2015-01-27 2022-04-06 Beijing Didi Infinity Technology and Development Co., Ltd. Information providing method and system for on-demand service
US10818084B2 (en) * 2015-04-07 2020-10-27 Geopogo, Inc. Dynamically customized three dimensional geospatial visualization
US9785792B2 (en) * 2016-03-04 2017-10-10 Color Genomics, Inc. Systems and methods for processing requests for genetic data based on client permission data
JP2017027137A (ja) 2015-07-16 2017-02-02 日本電気株式会社 情報処理装置、情報処理方法、及び、プログラム
US9934395B2 (en) 2015-09-11 2018-04-03 International Business Machines Corporation Enabling secure big data analytics in the cloud
US10235623B2 (en) * 2016-02-12 2019-03-19 Adobe Inc. Accurate tag relevance prediction for image search
US10567222B2 (en) * 2016-08-23 2020-02-18 Cisco Technology, Inc. Recommending configurations for client networking environment based on aggregated cloud managed information
US10425449B2 (en) * 2017-02-15 2019-09-24 Dell Products, L.P. Classifying internet-of-things (IOT) gateways using principal component analysis

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150339488A1 (en) * 2013-01-10 2015-11-26 Nec Corporation Information processing device, information processing method and medium
CN104732154A (zh) * 2013-12-18 2015-06-24 国际商业机器公司 将数据匿名化的方法和系统
US20170053214A1 (en) * 2014-04-28 2017-02-23 Hewlett Packard Enterprise Development Lp Network flow classification
US20160012193A1 (en) * 2014-07-09 2016-01-14 Gal Almogy System, method and computer program product for disease monitoring and identification
US20180121811A1 (en) * 2015-04-03 2018-05-03 Ptc Inc. Profiling a population of examples in a precisely descriptive or tendency-based manner
CN106570348A (zh) * 2016-10-08 2017-04-19 徐州医科大学 一种具有抑制机制的流式生物数据隐私保护增量发布算法

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115048658A (zh) * 2021-03-09 2022-09-13 技术创新研究所 利用匿名分片技术保护分布式数据的系统、方法和计算机可读介质
CN115048658B (zh) * 2021-03-09 2023-12-01 技术创新研究所 利用匿名分片技术保护分布式数据的系统、方法和计算机可读介质

Also Published As

Publication number Publication date
GB202000292D0 (en) 2020-02-26
GB2577466A (en) 2020-03-25
JP7102499B2 (ja) 2022-07-19
US20190020475A1 (en) 2019-01-17
US20190020477A1 (en) 2019-01-17
JP2020527794A (ja) 2020-09-10
US10700866B2 (en) 2020-06-30
US10700864B2 (en) 2020-06-30
WO2019012343A1 (en) 2019-01-17
DE112018003544T5 (de) 2020-03-26

Similar Documents

Publication Publication Date Title
CN110869932A (zh) 匿名加密数据
US10581970B2 (en) Providing information on published configuration patterns of storage resources to client systems in a network computing environment
CN114586030A (zh) 私密转移学习
US11764941B2 (en) Decision tree-based inference on homomorphically-encrypted data without bootstrapping
CN114586032B (zh) 安全的工作负载配置
US20190087604A1 (en) Applying a differential privacy operation on a cluster of data
WO2023098433A1 (en) Secure policy distribution in a cloud environment
US10361915B2 (en) System, method and computer program product for network function optimization based on locality and function type
US10834188B2 (en) Distribution of data in cloud storage based on policies maintained in metadata
JP7762473B2 (ja) 複数の非集中ポリシにおいて機密性を維持すること(複数の非集中ポリシにおいてメタデータの機密性を維持する方法、システム及びコンピュータプログラム)
US20210255886A1 (en) Distributed model execution
CN116158052A (zh) 多密钥加密数据去重
US11194838B2 (en) Generating a data partitioning strategy for secure and efficient query processing
US10521359B2 (en) Secure distance computations
CN114595467A (zh) 针对数据中心对象的多阶段保护
US10693628B2 (en) Enabling distance-based operations on data encrypted using a homomorphic encryption scheme with inefficient decryption
US10938561B2 (en) Tuple level security for streams processing
US11893128B2 (en) Data query against an encrypted database
US12321466B2 (en) Database hierarchical encryption for hybrid-cloud environment
US10680801B2 (en) Data distribution against credential information leak
US12323391B2 (en) Virtual private networks for similar profiles
Bahrami A Dynamic Cloud with Data Privacy Preservation
US20220043930A1 (en) Database map restructuring for data security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20200306

WD01 Invention patent application deemed withdrawn after publication