CN114611127B - Database data security management system - Google Patents

Database data security management system Download PDF

Info

Publication number
CN114611127B
CN114611127B CN202210252910.3A CN202210252910A CN114611127B CN 114611127 B CN114611127 B CN 114611127B CN 202210252910 A CN202210252910 A CN 202210252910A CN 114611127 B CN114611127 B CN 114611127B
Authority
CN
China
Prior art keywords
data
cluster
model
library
protection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210252910.3A
Other languages
Chinese (zh)
Other versions
CN114611127A (en
Inventor
陈杰
刘芳
候燕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Zhikun Technology Co ltd
Original Assignee
Hunan Zhikun Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Zhikun Technology Co ltd filed Critical Hunan Zhikun Technology Co ltd
Priority to CN202210252910.3A priority Critical patent/CN114611127B/en
Publication of CN114611127A publication Critical patent/CN114611127A/en
Application granted granted Critical
Publication of CN114611127B publication Critical patent/CN114611127B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/214Generating training patterns; Bootstrap methods, e.g. bagging or boosting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/23Clustering techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries

Abstract

The invention provides a database data security management system, which comprises a public library, a protection library, a security transmission channel and a cluster mapping service module, wherein the public library is used for storing data which can be accessed by all users, the protection library is used for storing data which can be accessed by a specific user, the security transmission channel is used for transporting the data in the protection library, and the cluster mapping service module is used for carrying out security processing on the data in the protection library; the system obtains the clustering data through the data in the protection library after being processed by the clustering model in a mapping mode and then outputs the clustering data to the outside instead of presenting the original data, so that the system has safety, and the clustering model continuously optimizes the data in the public library, so that the output clustering data can more accurately embody the characteristics of the original data.

Description

Database data security management system
Technical Field
The invention relates to the field of data processing, in particular to a database data security management system.
Background
The core and key of database security is data security, which means that the integrity, confidentiality, availability, controllability and auditability of data are ensured by protective measures, because the database stores a large amount of important information and confidential data, and a large amount of data is stored in the database system in a centralized manner for sharing by multiple users, some of the data is not directly open to all users, but when general users are allowed to obtain the characteristics of the data, a special security management system is needed to realize the function.
Now, many data management systems have been developed, and through a lot of search and reference, it is found that the existing authorization systems are disclosed as KR1020170034963A, KR1020010003094A, CN104662870B and KR1020090024336A, including: a security server configured to store an encryption key for encrypting a file or any data and a decryption key for decrypting the file or data; a first computing device configured to send an access authorization list carrying authorization restrictions to the security server, to request an encryption key from the security server, and to encrypt the file or data with the encryption key received from the security server; a second computing device configured to request a decryption key from the secure server and decrypt an encrypted file using the decryption key received from the secure server; and cloud storage configured to share the file between a first user using the first computing device and a second user using the second computing device. However, data in the system can only be completely acquired or not acquired according to the identity of the user, and the effect that an ordinary user can obtain reliable characteristics of corresponding data on the premise of not directly acquiring original data cannot be achieved.
Disclosure of Invention
The invention aims to provide a database data security management system aiming at the defects.
The invention adopts the following technical scheme:
a database data security management system comprises a public library, a protection library, a security transmission channel and a cluster mapping service module, wherein the public library is used for storing data which can be accessed by all users, the protection library is used for storing data which can be accessed by a specific user, the security transmission channel is used for transporting the data in the protection library, and the cluster mapping service module is used for performing security processing on the data in the protection library;
the cluster mapping service module comprises a cluster training manager and a cluster model, the cluster training manager optimizes the cluster model through data in the public library, the cluster model is transmitted to the protection library through the safe transmission channel, when a common user submits a request for accessing data in the protection library, the cluster model processes the corresponding data to obtain cluster data, and the cluster data are transmitted to the corresponding common user through the safe transmission channel;
the cluster model has k centroids, each centroid having n-dimensional elements, with
Figure 895301DEST_PATH_IMAGE001
An ith dimension element representing a jth centroid in the cluster model,
Figure 295189DEST_PATH_IMAGE002
Figure 987202DEST_PATH_IMAGE003
Figure 520951DEST_PATH_IMAGE004
an ith weight coefficient representing a jth centroid,
Figure 716440DEST_PATH_IMAGE005
and
Figure 815459DEST_PATH_IMAGE004
model parameters for constructing a model;
the cluster model processes the accessed original data into m n-dimensional cluster particles
Figure 588243DEST_PATH_IMAGE006
Wherein r has a value in the range of
Figure 269891DEST_PATH_IMAGE007
M is the number of n-dimensional particles,
Figure 444520DEST_PATH_IMAGE008
for the ith dimension element of each particle, the distance between the mass point and the mass center is calculated
Figure 186211DEST_PATH_IMAGE009
Figure 446291DEST_PATH_IMAGE010
If the distance between a certain mass point and the jth mass center is the closest, dividing the mass point into jth mass points;
the cluster model obtains a cluster vector Y =according to the classification of mass points
Figure 931630DEST_PATH_IMAGE011
Wherein, in the step (A),
Figure 960766DEST_PATH_IMAGE012
expressing the number of the ith particles, and normalizing Y to obtain cluster data
Figure 138938DEST_PATH_IMAGE013
Further, the cluster training manager comprises a data preprocessor and a model optimizer, wherein the data preprocessor is used for defining various preprocessing rules for specific types of data items, the specific types of data items comprise area identifiers, time stamps and partition identifiers, the preprocessing rules replace the specific types of data items by placeholder values, the preprocessing rules can be transmitted to the protection library, and when the data in the protection library is preprocessed by using the same preprocessing rules before being processed by the cluster model;
further, the model optimizer comprises a cluster analyzer and a model evaluator, wherein the cluster analyzer is used for modifying the model, the model evaluator is used for evaluating the model, the cluster analyzer can implement a clustering technique to obtain new data and output the new data to the updated cluster model for training, the updated cluster model is tested by using the test data set, the updated cluster model outputs regeneration data corresponding to the test data set, the model evaluator compares the regenerated regeneration data with the test data set and determines whether the model is improved, if the model is improved, the regeneration data is exported to a protection library for data analysis, and if the model is not improved, the model parameters are modified and are reused for model training;
furthermore, a safety query unit is arranged in the protection library, and the safety query unit can identify the identity of the user sending the request and search corresponding data in the protection library according to the request;
further, the security query unit includes a user registry, a data search component, and a security transmission component, where the user registry records user information of a specific user, the data search component can search corresponding data in the protection library according to a cluster identifier in a request, and the security transmission component determines to send a data index to the cluster model or the security transmission channel according to a comparison result between the request user and the user registry.
The beneficial effects obtained by the invention are as follows:
the system adopts the cluster model to obtain the data characteristics in the protection library, and the cluster model has similar processing effect when processing the same type of data in the public library and the protection library, so that the cluster model is optimized and improved through the data in the public library, the data in the protection library is more reliable after being processed by the cluster model, and meanwhile, the data in the protection library is not exposed to common users.
For a better understanding of the features and technical content of the present invention, reference should be made to the following detailed description of the invention and accompanying drawings, which are provided for purposes of illustration and description only and are not intended to limit the invention.
Drawings
FIG. 1 is a schematic view of the overall structural framework of the present invention;
FIG. 2 is a schematic diagram illustrating the working principle of the cluster mapping service module according to the present invention;
FIG. 3 is a schematic diagram of a model optimizer optimization framework of the present invention;
FIG. 4 is a schematic diagram of a placeholder rule handling mechanism according to the present invention;
FIG. 5 is a schematic flow chart of the data in the security access protection library according to the present invention.
Detailed Description
The following is a description of embodiments of the present invention with reference to specific embodiments, and those skilled in the art will understand the advantages and effects of the present invention from the disclosure of the present specification. The invention is capable of other and different embodiments and its several details are capable of modification in various other respects, all without departing from the spirit and scope of the present invention. The drawings of the present invention are for illustrative purposes only and are not intended to be drawn to scale. The following embodiments will further explain the related art of the present invention in detail, but the disclosure is not intended to limit the scope of the present invention.
The first embodiment.
The embodiment provides a database data security management system, which, with reference to fig. 1, includes a public library, a protection library, a secure transmission channel, and a cluster mapping service module, where the public library is used to store data that can be accessed by all users, the protection library is used to store data that can be accessed by a specific user, the secure transmission channel is used to transmit data in the protection library, and the cluster mapping service module is used to perform security processing on data in the protection library;
the cluster mapping service module comprises a cluster training manager and a cluster model, the cluster training manager optimizes the cluster model through data in the public library, the cluster model is transmitted to the protection library through the secure transmission channel, when a common user submits a request for accessing the data in the protection library, the cluster model processes the corresponding data to obtain clustered data, and the clustered data are transmitted to the corresponding common user through the secure transmission channel;
the cluster model has k centroids, each centroid having n-dimensional elements, with
Figure 620735DEST_PATH_IMAGE001
An ith dimension element representing a jth centroid in the cluster model,
Figure 909765DEST_PATH_IMAGE014
Figure 793407DEST_PATH_IMAGE015
Figure 142480DEST_PATH_IMAGE016
an ith weight coefficient representing a jth centroid,
Figure 111573DEST_PATH_IMAGE017
and
Figure 938715DEST_PATH_IMAGE016
model parameters for constructing a model;
the cluster model processes the accessed original data into m n-dimensional cluster particles
Figure 942443DEST_PATH_IMAGE018
Wherein r has a value in the range of
Figure 459487DEST_PATH_IMAGE019
M is the number of n-dimensional particles,
Figure 915876DEST_PATH_IMAGE020
for the ith dimension element of each particle, the distance between the mass point and the mass center is calculated
Figure 546709DEST_PATH_IMAGE021
Figure 280310DEST_PATH_IMAGE022
If the distance between a certain mass point and the jth mass center is the closest, dividing the mass point into jth mass points;
the cluster model obtains a cluster vector Y =according to the classification of mass points
Figure 95819DEST_PATH_IMAGE023
Wherein, in the process,
Figure 914871DEST_PATH_IMAGE024
representing the number of i-th particles, and normalizing Y to obtain clustering data
Figure 474028DEST_PATH_IMAGE025
The cluster training manager comprises a data preprocessor and a model optimizer, wherein the data preprocessor is used for defining various preprocessing rules for specific types of data items, the specific types of data items comprise area identifiers, time stamps and partition identifiers, the preprocessing rules replace the specific types of data items by using placeholder values, the preprocessing rules can be transferred into a protection library, and when data in the protection library is preprocessed by using the same preprocessing rules before being processed by a cluster model;
the model optimizer comprises a cluster analyzer and a model evaluator, wherein the cluster analyzer is used for modifying the model, the model evaluator is used for evaluating the model, the cluster analyzer can implement a clustering technology to obtain new data and output the new data to an updated cluster model for training, the updated cluster model is tested by using a test data set, the updated cluster model outputs regeneration data corresponding to the test data set, the model evaluator compares the regenerated regeneration data with the test data set and determines whether the model is improved, if the model is improved, the regeneration data is exported to a protection library for data analysis, and if the model is not improved, model parameters are modified and reused for model training;
a safety query unit is arranged in the protection library, and the safety query unit can identify the identity of a user sending a request and search corresponding data in the protection library according to the request;
the security query unit comprises a user registry, a data search component and a security transmission component, wherein user information of a specific user is recorded in the user registry, the data search component can search corresponding data in the protection library according to a cluster identifier in a request, and the security transmission component determines to send a data index to the cluster model or the security transmission channel according to a comparison result of the request user and the user registry.
Example two.
The embodiment includes the whole content of the first embodiment, and provides a database data security management system, which includes a public library, a protection library, a security transmission channel and a cluster mapping service module, wherein the public library is used for storing data that can be accessed by all users, the protection library is used for storing data that can be accessed by a specific user, the security transmission channel is used for transporting the data in the protection library, and the cluster mapping service module is used for performing security processing on the data in the protection library;
with reference to fig. 2, the cluster mapping service module includes a cluster training manager and a cluster model, the cluster mapping manager can receive training data, the training data includes log files and data in a public library, the cluster mapping manager can train and optimize the cluster attribute of the training data on the cluster model, the cluster model is output to a protection library through the secure transmission channel after being optimized, the data in the protection library is processed by the cluster model to obtain cluster data, and the cluster data is output to the outside through the secure transmission channel;
the cluster training manager comprises a data preprocessor and a model optimizer, wherein the data preprocessor is used for defining various preprocessing rules for specific types of data items, the specific types of data items comprise area identifiers, time stamps and partition identifiers, the preprocessing rules replace the specific types of data items by placeholder values, and the preprocessing rules can be transmitted to a protection library and are preprocessed by using the same preprocessing rules before being processed by a cluster model;
the placeholder values are used for identifying configuration errors of data items in the public library, when partitions in the public library regenerate data items, the placeholder identifiers are replaced by the placeholder values, different partitions are associated with different configuration data, the configuration data of the partition A is applied to resources of the partition B and can cause errors, when one of the errors generates a log file or other data items, the area identifiers are checked to determine whether correct area identifiers are included in the log file, as a check before data training is performed, and if the wrong area identifiers are detected, the data preprocessor generates a notification indicating that the configuration file needs to be updated;
the model optimizer comprises a cluster analyzer and a model evaluator, wherein the cluster analyzer is used for changing the model, and the model evaluator is used for evaluating the model, and the specific optimization mode is as follows by combining with fig. 3:
the cluster analyzer can implement a clustering technique to obtain new data and output the new data to an updated cluster model for training, test the updated cluster model using a test dataset, the updated cluster model outputting regeneration data corresponding to the test dataset, the model evaluator comparing the regenerated regeneration data with the test dataset and determining whether the model is improved, if the model is improved, exporting the regenerated regeneration data to a protection library for data analysis, and if the model is not improved, modifying model parameters and reusing the modified regeneration data for model training;
the cluster model has k centroids, each centroid having n-dimensional elements, with
Figure 62135DEST_PATH_IMAGE026
An ith dimension element representing a jth centroid in the cluster model,
Figure 782966DEST_PATH_IMAGE027
Figure 89314DEST_PATH_IMAGE028
Figure 452162DEST_PATH_IMAGE029
an ith weight coefficient representing a jth centroid,
Figure 160355DEST_PATH_IMAGE026
and
Figure 52088DEST_PATH_IMAGE029
model parameters to be optimized in the model optimizer;
in connection with FIG. 4, partial data items that vary or differ between protected and unprotected data items may be replaced with placeholder values to make the clustering model more accurate, pre-processing is performed using placeholder rules defined by a user manually viewing the unprotected data items to identify fields, columns, or other portions of the data items that include information that may vary, replacing them with placeholder values as secondary information may vary, the clustering model identifying clusters from information in the data items that is more useful to a task being performed, the placeholder rules including manual rules generated by the user and a machine learning model trained to identify and replace portions of the data items, processed unprotected data generated upon pre-processing the unprocessed unprotected data using the placeholder rules, the processed data used to train the clustering model;
passing placeholder rules to the protected area through a secure transport service, preprocessing unprocessed protected data into processed protected data using the placeholder rules, analyzing the processed data using a cluster model, the placeholder rules comprising a list of data parts to be replaced and placeholder IDs for mapping identifiers to placeholder values;
with reference to fig. 5, the process of securing access to data in the protected library includes the following steps:
s1, the system receives a request of a user for acquiring one or more data items in a protection library;
s2, the system sends a request to a protection library, and a cluster model in the protection library identifies a cluster identifier associated with each of one or more data items;
s3, the cluster model reads corresponding data in a protection library according to the cluster identifier;
s4, the cluster model preprocesses the read corresponding data according to a preprocessing rule;
s5, the cluster model processes the preprocessed data to obtain cluster data;
s6, transmitting the clustering data to a corresponding user through the safe transmission channel;
the public repository and the protection repository are each divided into a plurality of partitions, each partition being logically isolated from the other partitions, each partition being a distinct logical data center supported by one or more physical data centers, and each partition being supported by its own power supply and network infrastructure, thereby preventing a condition affecting one partition in the event of a failure of another partition;
the protection library is internally provided with a safety query unit, the safety query unit can identify the identity of a user sending a request and search corresponding data in the protection library according to the request, for a specific user, the safety query unit directly sends the searched data to the corresponding specific user through the safety transmission channel, for a common user, the safety query unit sends an index address of the searched data to the cluster model, and the cluster model reads and processes the data and then sends the data to the corresponding common user through the safety transmission channel;
the security query unit comprises a user registry, a data search component and a security transmission component, wherein the user registry records user information of a specific user, and can add, delete and modify the user information according to a received instruction, the data search component can search corresponding data in the protection library according to a cluster identifier in a request, and the security transmission component determines to send a data index to the cluster model or the security transmission channel according to a comparison result of the requesting user and the user registry;
the process of processing the original data in the protection library by the cluster model to obtain the clustering data comprises the following steps:
s21, preprocessing the original data, converting the preprocessed original data into m n-dimensional particles to obtain cluster particles, and using the cluster particles
Figure 845732DEST_PATH_IMAGE030
Wherein r has a value in the range of
Figure 746691DEST_PATH_IMAGE031
M is the number of n-dimensional particles,
Figure 40882DEST_PATH_IMAGE032
the ith dimension element of each particle;
s22, the cluster model calculates the distance between the cluster particles and the centroid in the cluster model according to the following formula
Figure 369095DEST_PATH_IMAGE033
Figure 384456DEST_PATH_IMAGE034
If the distance between a certain mass point and the jth mass center is the closest, dividing the mass point into jth mass points;
s23, counting the classified number of particles of all clusters to obtain data
Figure 89107DEST_PATH_IMAGE035
Indicating the number of particles belonging to the i-th class;
s24, obtaining a clustering vector Y =according to the number of the classifications
Figure 506313DEST_PATH_IMAGE036
And normalized to obtain
Figure 146372DEST_PATH_IMAGE037
Obtained in step S24
Figure 39242DEST_PATH_IMAGE037
As clustered data output outside the protection library.
The above disclosure is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention, so that all the modifications and equivalents of the technical changes and equivalents made by the disclosure and drawings are included in the scope of the present invention, and the elements thereof may be updated as the technology develops.

Claims (5)

1. The database data security management system is characterized by comprising a public library, a protection library, a security transmission channel and a cluster mapping service module, wherein the public library is used for storing data which can be accessed by all users, the protection library is used for storing data which can be accessed by a specific user, the security transmission channel is used for transporting the data in the protection library, and the cluster mapping service module is used for performing security processing on the data in the protection library;
the cluster mapping service module comprises a cluster training manager and a cluster model, the cluster training manager optimizes the cluster model through data in the public library, the cluster model is transmitted to the protection library through the safe transmission channel, when a common user submits a request for accessing data in the protection library, the cluster model processes the corresponding data to obtain cluster data, and the cluster data are transmitted to the corresponding common user through the safe transmission channel;
the cluster model has k centroids, each centroid having n-dimensional elements, with
Figure DEST_PATH_IMAGE001
An ith dimension element representing a jth centroid in the cluster model,
Figure 583457DEST_PATH_IMAGE002
Figure DEST_PATH_IMAGE003
Figure 386328DEST_PATH_IMAGE004
an ith weight coefficient representing a jth centroid,
Figure 197289DEST_PATH_IMAGE001
and
Figure 311876DEST_PATH_IMAGE004
model parameters for constructing a model;
the cluster model processes the accessed original data into m n-dimensional cluster particles
Figure DEST_PATH_IMAGE005
Wherein r has a value in the range of
Figure 499275DEST_PATH_IMAGE006
M is the number of n-dimensional particles,
Figure DEST_PATH_IMAGE007
for the ith dimension element of each particle, the distance between the mass point and the mass center is calculated
Figure 687811DEST_PATH_IMAGE008
Figure DEST_PATH_IMAGE009
If the distance between a certain mass point and the jth mass center is the closest, dividing the mass point into jth mass points;
the cluster model obtains a clustering vector Y =according to the classification of particles
Figure 932323DEST_PATH_IMAGE010
Wherein, in the step (A),
Figure DEST_PATH_IMAGE011
representing the quantity of the i-th particles, and normalizing Y to obtain clustering data
Figure 940730DEST_PATH_IMAGE012
2. A database data security management system according to claim 1, wherein the cluster training manager comprises a data pre-processor and a model optimizer, the data pre-processor being configured to define various pre-processing rules for certain types of data items, the certain types of data items including region identifiers, time stamps and partition identifiers, the pre-processing rules replacing these certain types of data items with placeholder values, the pre-processing rules being capable of being passed to the protection repository, data in the protection repository being pre-processed using the same pre-processing rules before being processed with the cluster model.
3. The database data security management system of claim 2, wherein the model optimizer comprises a cluster analyzer and a model evaluator, the cluster analyzer is configured to modify the model, the model evaluator is configured to evaluate the model, the cluster analyzer is configured to perform clustering to obtain new data and output the new data to the updated cluster model for training, the updated cluster model is tested using the test dataset, the updated cluster model outputs regeneration data corresponding to the test dataset, the model evaluator compares the regenerated regeneration data with the test dataset and determines whether the model is improved, if the model is improved, the regenerated regeneration data is exported to a protection library for data analysis, and if the model is not improved, the model parameters are modified and reused for model training.
4. A database data security management system according to claim 3, characterized in that a security query unit is provided in the protection repository, and the security query unit is capable of identifying the identity of the user sending the request and searching the protection repository for corresponding data according to the request.
5. The database data security management system of claim 4, wherein the security query unit includes a user registry, a data search component and a security transmission component, the user registry records user information of a specific user, the data search component can search the corresponding data in the protection repository according to the cluster identifier in the request, and the security transmission component determines to send a data index to the cluster model or the security transmission channel according to a comparison result between the requesting user and the user registry.
CN202210252910.3A 2022-03-15 2022-03-15 Database data security management system Active CN114611127B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210252910.3A CN114611127B (en) 2022-03-15 2022-03-15 Database data security management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210252910.3A CN114611127B (en) 2022-03-15 2022-03-15 Database data security management system

Publications (2)

Publication Number Publication Date
CN114611127A CN114611127A (en) 2022-06-10
CN114611127B true CN114611127B (en) 2022-10-28

Family

ID=81862185

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210252910.3A Active CN114611127B (en) 2022-03-15 2022-03-15 Database data security management system

Country Status (1)

Country Link
CN (1) CN114611127B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116776346B (en) * 2023-06-08 2024-03-05 南京师范大学常州创新发展研究院 Data security management system

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107480553B (en) * 2017-07-28 2020-11-06 北京明朝万达科技股份有限公司 Data exploration system, method, equipment and storage medium
US11606373B2 (en) * 2018-02-20 2023-03-14 Darktrace Holdings Limited Cyber threat defense system protecting email networks with machine learning models
CN109492429B (en) * 2018-10-30 2020-10-16 华南师范大学 Privacy protection method for data release
CN110555316B (en) * 2019-08-15 2023-04-18 石家庄铁道大学 Privacy protection table data sharing method based on cluster anonymity
CN110737917A (en) * 2019-10-15 2020-01-31 卓尔智联(武汉)研究院有限公司 Data sharing device and method based on privacy protection and readable storage medium
CN113626858A (en) * 2021-07-21 2021-11-09 西安电子科技大学 Privacy protection k-means clustering method, device, medium and terminal
CN113743496A (en) * 2021-09-01 2021-12-03 北京工业大学 K-anonymous data processing method and system based on cluster mapping

Also Published As

Publication number Publication date
CN114611127A (en) 2022-06-10

Similar Documents

Publication Publication Date Title
AU2018361246B2 (en) Data protection via aggregation-based obfuscation
US10135609B2 (en) Managing a database management system using a blockchain database
CN106682527A (en) Data security control method and system based on data classification and grading
US20240045875A1 (en) Systems and methods for management of data analytics platforms using metadata
US11366928B2 (en) Systems and method of contextual data masking for private and secure data linkage
US20210133079A1 (en) Validation of log files using blockchain system
CN112417492A (en) Service providing method based on data classification and classification
CN114611127B (en) Database data security management system
US20220067570A1 (en) Training machine learning models with training data
EP3591561A1 (en) An anonymized data processing method and computer programs thereof
CN116910023A (en) Data management system
US10963587B1 (en) User action collection for sensitive customer data
Vinutha et al. Analysis of NSL-KDD dataset using K-means and canopy clustering algorithms based on distance metrics
Vaz et al. On creation of synthetic samples from gans for fake news identification algorithms
CN114154476A (en) Execution credibility judgment method for large instrument sharing experiment
CN117077210B (en) Financial data query method and system
US20230367636A1 (en) System and method for determining memory resource configuration for network nodes to operate in a distributed computing network
US20230367903A1 (en) System and method for detecting and obfuscating confidential information in task logs
CN115481108B (en) Management method and system for same data among different departments
Ma et al. Multi-source Data Collection Data Security Analysis
Das et al. Big Data Analytics: An overview
Raghavan et al. Analytics using metadata associations for digital investigations
CN117828682A (en) Audit data-based credibility measurement method, system and medium
Añasco et al. Using Data Mining Techniques for the Detection of SQL Injection Attacks on Database Systems
Ismail Resilience to shocks in national vaccination delivery systems: From analysis of shock effects to resilience-strengthening intervention approaches in Lebanon

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant