CN112384889A - 工作负载供应中的数据隐私意识 - Google Patents
工作负载供应中的数据隐私意识 Download PDFInfo
- Publication number
- CN112384889A CN112384889A CN201980042397.1A CN201980042397A CN112384889A CN 112384889 A CN112384889 A CN 112384889A CN 201980042397 A CN201980042397 A CN 201980042397A CN 112384889 A CN112384889 A CN 112384889A
- Authority
- CN
- China
- Prior art keywords
- workload
- location
- data
- determining
- data privacy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012545 processing Methods 0.000 claims description 52
- 230000004044 response Effects 0.000 claims description 41
- 238000000034 method Methods 0.000 claims description 33
- 238000012544 monitoring process Methods 0.000 claims description 19
- 238000004590 computer program Methods 0.000 claims description 11
- 238000010586 diagram Methods 0.000 description 18
- 230000006870 function Effects 0.000 description 18
- 230000015654 memory Effects 0.000 description 18
- 230000008569 process Effects 0.000 description 13
- 230000009471 action Effects 0.000 description 5
- 238000007726 management method Methods 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 230000008520 organization Effects 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 238000013500 data storage Methods 0.000 description 3
- 230000001902 propagating effect Effects 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 238000003491 array Methods 0.000 description 2
- 230000001364 causal effect Effects 0.000 description 2
- 239000000835 fiber Substances 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000002085 persistent effect Effects 0.000 description 2
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 description 1
- 230000009172 bursting Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000002153 concerted effect Effects 0.000 description 1
- 229910052802 copper Inorganic materials 0.000 description 1
- 239000010949 copper Substances 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000010801 machine learning Methods 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000000116 mitigating effect Effects 0.000 description 1
- 230000037361 pathway Effects 0.000 description 1
- 238000013439 planning Methods 0.000 description 1
- 230000004043 responsiveness Effects 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000012384 transportation and delivery Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5005—Allocation of resources, e.g. of the central processing unit [CPU] to service a request
- G06F9/5027—Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals
- G06F9/505—Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals considering the load
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5083—Techniques for rebalancing the load in a distributed system
- G06F9/5088—Techniques for rebalancing the load in a distributed system involving task migration
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogram communication
- G06F9/542—Event management; Broadcasting; Multicasting; Notifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/50—Service provisioning or reconfiguring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Multimedia (AREA)
- Debugging And Monitoring (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (15)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/032,893 | 2018-07-11 | ||
US16/032,893 US10635825B2 (en) | 2018-07-11 | 2018-07-11 | Data privacy awareness in workload provisioning |
PCT/IB2019/055079 WO2020012270A1 (en) | 2018-07-11 | 2019-06-18 | Data privacy awareness in workload provisioning |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112384889A true CN112384889A (zh) | 2021-02-19 |
Family
ID=69139143
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201980042397.1A Pending CN112384889A (zh) | 2018-07-11 | 2019-06-18 | 工作负载供应中的数据隐私意识 |
Country Status (6)
Country | Link |
---|---|
US (3) | US10635825B2 (zh) |
JP (1) | JP7369728B2 (zh) |
CN (1) | CN112384889A (zh) |
DE (1) | DE112019002052T5 (zh) |
GB (1) | GB2588056B (zh) |
WO (1) | WO2020012270A1 (zh) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10635825B2 (en) | 2018-07-11 | 2020-04-28 | International Business Machines Corporation | Data privacy awareness in workload provisioning |
US11328086B2 (en) * | 2018-09-06 | 2022-05-10 | Microsoft Technology Licensing, Llc | Privacy disclosure |
US20230153457A1 (en) * | 2021-11-12 | 2023-05-18 | Microsoft Technology Licensing, Llc | Privacy data management in distributed computing systems |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120204187A1 (en) * | 2011-02-08 | 2012-08-09 | International Business Machines Corporation | Hybrid Cloud Workload Management |
JP2016515746A (ja) * | 2013-04-19 | 2016-05-30 | ニシラ, インコーポレイテッド | エンドポイントセキュリティとネットワークセキュリティサービスを調整するフレームワーク |
US20160253216A1 (en) * | 2015-02-26 | 2016-09-01 | Strato Scale Ltd. | Ordering schemes for network and storage i/o requests for minimizing workload idle time and inter-workload interference |
US20170091473A1 (en) * | 2015-09-29 | 2017-03-30 | International Business Machines Corporation | Inter-process access control |
CN107015895A (zh) * | 2015-12-30 | 2017-08-04 | 国际商业机器公司 | 对分布式应用的合规的以数据为中心的监测 |
CN107852417A (zh) * | 2016-05-11 | 2018-03-27 | 甲骨文国际公司 | 多租户身份和数据安全性管理云服务 |
Family Cites Families (48)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7681032B2 (en) | 2001-03-12 | 2010-03-16 | Portauthority Technologies Inc. | System and method for monitoring unauthorized transport of digital content |
JP2003216449A (ja) * | 2002-01-23 | 2003-07-31 | Nec Corp | パッチ処理システム |
US20050076233A1 (en) | 2002-11-15 | 2005-04-07 | Nokia Corporation | Method and apparatus for transmitting data subject to privacy restrictions |
US20050065823A1 (en) | 2003-09-23 | 2005-03-24 | Siemens Medical Solutions Usa, Inc. | Method and apparatus for privacy checking |
US8561126B2 (en) | 2004-12-29 | 2013-10-15 | International Business Machines Corporation | Automatic enforcement of obligations according to a data-handling policy |
US9231886B2 (en) * | 2005-03-16 | 2016-01-05 | Adaptive Computing Enterprises, Inc. | Simple integration of an on-demand compute environment |
US8707383B2 (en) * | 2006-08-16 | 2014-04-22 | International Business Machines Corporation | Computer workload management with security policy enforcement |
US9069599B2 (en) | 2008-06-19 | 2015-06-30 | Servicemesh, Inc. | System and method for a cloud computing abstraction layer with security zone facilities |
US8321204B2 (en) | 2008-08-26 | 2012-11-27 | Saraansh Software Solutions Pvt. Ltd. | Automatic lexicon generation system for detection of suspicious e-mails from a mail archive |
US10565065B2 (en) * | 2009-04-28 | 2020-02-18 | Getac Technology Corporation | Data backup and transfer across multiple cloud computing providers |
US20110126197A1 (en) | 2009-11-25 | 2011-05-26 | Novell, Inc. | System and method for controlling cloud and virtualized data centers in an intelligent workload management system |
US8473752B2 (en) * | 2010-03-17 | 2013-06-25 | Lenovo (Singapore) Pte. Ltd. | Apparatus, system, and method for auditing access to secure data |
US20120005720A1 (en) | 2010-07-01 | 2012-01-05 | International Business Machines Corporation | Categorization Of Privacy Data And Data Flow Detection With Rules Engine To Detect Privacy Breaches |
US9727751B2 (en) | 2010-10-29 | 2017-08-08 | Nokia Technologies Oy | Method and apparatus for applying privacy policies to structured data |
JP5593260B2 (ja) | 2011-03-17 | 2014-09-17 | 株式会社エヌ・ティ・ティ・データ | 移動要求装置、移動要求方法、移動要求プログラム |
CN102779114B (zh) | 2011-05-12 | 2018-06-29 | 商业对象软件有限公司 | 利用自动规则生成的非结构化数据支持 |
US8661500B2 (en) | 2011-05-20 | 2014-02-25 | Nokia Corporation | Method and apparatus for providing end-to-end privacy for distributed computations |
US9229777B2 (en) * | 2011-08-08 | 2016-01-05 | International Business Machines Corporation | Dynamically relocating workloads in a networked computing environment |
WO2013101723A1 (en) | 2011-12-27 | 2013-07-04 | Wellpoint, Inc. | Method and system for data pattern matching, masking and removal of sensitive data |
US9086929B2 (en) * | 2012-04-06 | 2015-07-21 | International Business Machines Corporation | Dynamic allocation of a workload across a plurality of clouds |
US9536108B2 (en) | 2012-10-23 | 2017-01-03 | International Business Machines Corporation | Method and apparatus for generating privacy profiles |
EP2782041B1 (en) | 2013-03-22 | 2018-11-14 | F. Hoffmann-La Roche AG | Analysis system ensuring that sensitive data are not accessible |
US9424421B2 (en) * | 2013-05-03 | 2016-08-23 | Visa International Service Association | Security engine for a secure operating environment |
US9300691B1 (en) | 2013-07-18 | 2016-03-29 | Symantec Corporation | Systems and methods for enforcing secure network segmentation for sensitive workloads |
JP6171708B2 (ja) | 2013-08-08 | 2017-08-02 | 富士通株式会社 | 仮想マシン管理方法、仮想マシン管理プログラム及び仮想マシン管理装置 |
US9330108B2 (en) * | 2013-09-30 | 2016-05-03 | International Business Machines Corporation | Multi-site heat map management |
US9544306B2 (en) | 2013-10-29 | 2017-01-10 | Airwatch Llc | Attempted security breach remediation |
US20150156131A1 (en) * | 2013-12-04 | 2015-06-04 | International Business Machines Corporation | Method and system of geographic migration of workloads between private and public clouds |
US10091238B2 (en) * | 2014-02-11 | 2018-10-02 | Varmour Networks, Inc. | Deception using distributed threat detection |
US9521122B2 (en) | 2014-05-09 | 2016-12-13 | International Business Machines Corporation | Intelligent security analysis and enforcement for data transfer |
US9912529B2 (en) * | 2014-08-20 | 2018-03-06 | International Business Machines Corporation | Tenant-specific log for events related to a cloud-based service |
CN104253870B (zh) | 2014-09-29 | 2018-01-12 | 广州华多网络科技有限公司 | 控制数据访问周期的方法和装置 |
US20160127417A1 (en) | 2014-10-29 | 2016-05-05 | SECaaS Inc. | Systems, methods, and devices for improved cybersecurity |
US9609026B2 (en) | 2015-03-13 | 2017-03-28 | Varmour Networks, Inc. | Segmented networks that implement scanning |
US9467476B1 (en) | 2015-03-13 | 2016-10-11 | Varmour Networks, Inc. | Context aware microsegmentation |
US10212178B2 (en) | 2015-04-07 | 2019-02-19 | Zingbox, Ltd. | Packet analysis based IoT management |
US20170041264A1 (en) | 2015-08-07 | 2017-02-09 | Sensaura Inc. | System and method for controlling data transmissions using human state-based data |
US10140438B2 (en) | 2015-12-16 | 2018-11-27 | International Business Machines Corporation | Hidden separation and access to data on a device |
US10204384B2 (en) | 2015-12-21 | 2019-02-12 | Mcafee, Llc | Data loss prevention of social media content |
CN105657009B (zh) | 2015-12-30 | 2018-12-21 | 浪潮(北京)电子信息产业有限公司 | 对象网关负载均衡系统、方法及跨区域对象网关存储系统 |
WO2018068133A1 (en) * | 2016-10-11 | 2018-04-19 | BicDroid Inc. | Methods, systems and computer program products for data protection by policing processes accessing encrypted data |
US10664364B2 (en) * | 2016-10-18 | 2020-05-26 | Lenovo Enterprise Solutions (Singapore) Pte. Ltd. | Transferring a server configuration parameter along with a workload |
US20180176206A1 (en) * | 2016-12-15 | 2018-06-21 | Bank Of America Corporation | Dynamic Data Protection System |
US10839098B2 (en) | 2017-04-07 | 2020-11-17 | International Business Machines Corporation | System to prevent export of sensitive data |
US11121875B2 (en) * | 2017-10-20 | 2021-09-14 | Illumio, Inc. | Enforcing a segmentation policy using cryptographic proof of identity |
US11075937B2 (en) * | 2018-02-22 | 2021-07-27 | Illumio, Inc. | Generating a segmentation policy based on vulnerabilities |
US11030185B2 (en) * | 2018-05-07 | 2021-06-08 | Microsoft Technology Licensing, Llc | Schema-agnostic indexing of distributed databases |
US10635825B2 (en) | 2018-07-11 | 2020-04-28 | International Business Machines Corporation | Data privacy awareness in workload provisioning |
-
2018
- 2018-07-11 US US16/032,893 patent/US10635825B2/en active Active
-
2019
- 2019-06-18 JP JP2020572936A patent/JP7369728B2/ja active Active
- 2019-06-18 GB GB2020078.8A patent/GB2588056B/en active Active
- 2019-06-18 DE DE112019002052.8T patent/DE112019002052T5/de active Pending
- 2019-06-18 CN CN201980042397.1A patent/CN112384889A/zh active Pending
- 2019-06-18 WO PCT/IB2019/055079 patent/WO2020012270A1/en active Application Filing
-
2020
- 2020-03-02 US US16/805,859 patent/US10949545B2/en active Active
-
2021
- 2021-02-10 US US17/172,958 patent/US11610002B2/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120204187A1 (en) * | 2011-02-08 | 2012-08-09 | International Business Machines Corporation | Hybrid Cloud Workload Management |
JP2016515746A (ja) * | 2013-04-19 | 2016-05-30 | ニシラ, インコーポレイテッド | エンドポイントセキュリティとネットワークセキュリティサービスを調整するフレームワーク |
US20160253216A1 (en) * | 2015-02-26 | 2016-09-01 | Strato Scale Ltd. | Ordering schemes for network and storage i/o requests for minimizing workload idle time and inter-workload interference |
US20170091473A1 (en) * | 2015-09-29 | 2017-03-30 | International Business Machines Corporation | Inter-process access control |
CN107015895A (zh) * | 2015-12-30 | 2017-08-04 | 国际商业机器公司 | 对分布式应用的合规的以数据为中心的监测 |
CN107852417A (zh) * | 2016-05-11 | 2018-03-27 | 甲骨文国际公司 | 多租户身份和数据安全性管理云服务 |
Also Published As
Publication number | Publication date |
---|---|
DE112019002052T5 (de) | 2021-01-07 |
JP7369728B2 (ja) | 2023-10-26 |
WO2020012270A1 (en) | 2020-01-16 |
GB2588056B (en) | 2022-06-08 |
GB202020078D0 (en) | 2021-02-03 |
US20210173942A1 (en) | 2021-06-10 |
JP2021531552A (ja) | 2021-11-18 |
US20200019713A1 (en) | 2020-01-16 |
US11610002B2 (en) | 2023-03-21 |
US20200202011A1 (en) | 2020-06-25 |
US10949545B2 (en) | 2021-03-16 |
US10635825B2 (en) | 2020-04-28 |
GB2588056A (en) | 2021-04-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10841328B2 (en) | Intelligent container resource placement based on container image vulnerability assessment | |
US8843621B2 (en) | Event prediction and preemptive action identification in a networked computing environment | |
CN111868727B (zh) | 用于数据匿名化的方法和系统 | |
US9479398B2 (en) | Enforcing runtime policies in a networked computing environment | |
US11610002B2 (en) | Data privacy awareness in workload provisioning | |
US9424403B2 (en) | Obtaining software asset insight by analyzing collected metrics using analytic services | |
CN114640713B (zh) | 数据访问监视和控制 | |
US10956232B2 (en) | Instructing the use of application programming interface commands in a runtime environment | |
JP7377058B2 (ja) | ファイアウォールを通したコンプライアンス違反のサーバに向かう通信/そのようなサーバからの通信を一時停止する、コンピュータによって実施される方法、コンピュータ・システム、およびコンピュータ・プログラム | |
US10140163B2 (en) | Intelligent framework for shared services orchestration | |
US11636386B2 (en) | Determining data representative of bias within a model | |
CN111095310A (zh) | 实现动态和自动地更改用户简档以增强性能 | |
US9699201B2 (en) | Automated response to detection of threat to cloud virtual machine | |
US9021479B2 (en) | Enforcing machine deployment zoning rules in an automatic provisioning environment | |
US9563419B2 (en) | Managing deployment of application pattern based applications on runtime platforms | |
US20170116011A1 (en) | Ordering optimization of host machines in a computing environment based on policies | |
US11520846B2 (en) | Petition creation through social analytics | |
US20210109905A1 (en) | Processing metrics data with graph data context analysis | |
US11954231B2 (en) | Recursively adapting a sensitive content masking technique | |
US11016874B2 (en) | Updating taint tags based on runtime behavior profiles | |
US11178110B2 (en) | Controlling compliance remediations | |
CN116414811A (zh) | 通过和围绕数据目录到已注册数据源的受管理的数据库连通性(gdbc) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20210508 Address after: Tortola Island, British Virgin Islands Applicant after: Green City Plaza Co.,Ltd. Address before: Armank, New York, USA Applicant before: International Business Machines Corp. |
|
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20240619 Address after: California, USA Applicant after: WORKDAY Inc. Country or region after: U.S.A. Address before: Tortola Island, British Virgin Islands Applicant before: Green City Plaza Co.,Ltd. Country or region before: British Virgin Islands |
|
TA01 | Transfer of patent application right |