WO2016122668A1 - Multiple user data storage and separation - Google Patents

Multiple user data storage and separation Download PDF

Info

Publication number
WO2016122668A1
WO2016122668A1 PCT/US2015/013987 US2015013987W WO2016122668A1 WO 2016122668 A1 WO2016122668 A1 WO 2016122668A1 US 2015013987 W US2015013987 W US 2015013987W WO 2016122668 A1 WO2016122668 A1 WO 2016122668A1
Authority
WO
WIPO (PCT)
Prior art keywords
records
data
trees
memory
privacy
Prior art date
Application number
PCT/US2015/013987
Other languages
French (fr)
Inventor
Joseph A. Miller
Original Assignee
Hewlett Packard Enterprise Development Lp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hewlett Packard Enterprise Development Lp filed Critical Hewlett Packard Enterprise Development Lp
Priority to PCT/US2015/013987 priority Critical patent/WO2016122668A1/en
Priority to PCT/US2015/019786 priority patent/WO2016122682A1/en
Priority to PCT/US2015/019794 priority patent/WO2016122686A1/en
Priority to PCT/US2015/019792 priority patent/WO2016122685A1/en
Priority to PCT/US2015/019788 priority patent/WO2016122683A1/en
Priority to PCT/US2015/019789 priority patent/WO2016122684A1/en
Priority to PCT/US2015/025768 priority patent/WO2016122697A1/en
Publication of WO2016122668A1 publication Critical patent/WO2016122668A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

A multiple user data storage and separation apparatus includes memory and records stored in the memory, the records defined by correlated tree structures having schema such that the records are unrestricted by relational table structures. The records include user data items associated with multiple different users. Privacy labels are stored in the memory and correlated with each of the records using privacy label tree structures. The privacy labels distinguish among the users. Instructions are stored in the memory that, when executed, cause a processor to receive a communication including user identifier data and query data, to identify a set of the privacy labels based on the user identifier data; to identify a set of the records based on the query data, and to return, in response to the communication, only records from the identified set of records that are associated with the set of the privacy labels.

Description

MULTIPLE USER DATA STORAGE AND SEPARATION
BACKGROUND
[0001] Providers of cloud computing services may deploy multiple different business applications, such as email applications and case management systems. Each of these business applications may have multiple different clients. In some instances, client personnel may utilize shared business applications. In order to deploy multiple different business applications for multiple different clients, providers of cloud computing services typically deploy multiple servers with each server having multiple database instances. For example, a provider of cloud computing services may deploy 10 different business applications, with each business application having 10 clients for a total of 100 different service instances. The service provider may deploy, for example, 10 different servers, with each server having multiple database instances. Such databases are typically relational databases that enforce relational table structures, such as a column and row structure, to correlate and store data. As such, the service provider may deploy a separate relational database instance for each client on each of the different servers in order to provide appropriate data separation among clients.
BRIEF DESCRIPTION OF THE DRAWINGS
[0002] Figure 1 is a schematic illustration of an example multiple user data storage and separation apparatus.
[0003] Figure 2 is a diagram illustrating example tree structures for facilitating the multiple user data storage and separation functionality of the apparatus of Figure 1.
[0004] Figure 3A is a Venn diagram illustrating an example relationship between receipts and labels defined by the tree structures of Figure 2. [0005] Figure 3B is a Venn diagram illustrating an example relationship between receipts and nodes defined by the tree structures of Figure 2.
[0006] Figure 3C is a Venn diagram illustrating an example relationship among nodes, receipts, and labels defined by the tree structures of Figure 2.
[0007] Figure 4 is a diagram illustrating an example implementation of the tree structures of Figure 2.
[0008] Figure 5 is a flow diagram of an example process that may be carried out by the multiple user data storage and separation apparatus of Figure 1.
DETAILED DESCRIPTION OF EXAMPLES
[0009] Examples of apparatus, systems, and methods having multiple user data storage and separation functionality are disclosed herein. Multiple user data storage and separation functionality is of increasing interest to providers of cloud computing services. In particular, the use of virtualization as opposed to server hardware duplication is increasing. Business applications, however, are currently developed from the ground up, often using available off-the-shelf applications, and have a typically large system footprint due in part to the limitations and complexities of relational database technologies used for data storage. These limitations and complexities may lead to, for example, the need for separate database instances for multiple different system users in order to ensure appropriate data separation is maintained. This may in turn lead to high licensing and maintenance costs for deployment of business applications.
[00010] The apparatus, systems, and methods having multiple user data storage and separation functionality disclosed herein may facilitate the
implementation of a single computing system or virtualized operating system having a single database instance that stores and separates data for multiple users without resulting in bleeding or unauthorized disclosure of data from one user to another. In particular, the apparatus, systems, and methods having multiple user data storage and separation functionality disclosed herein may utilize data records defined by correlated tree structures having schema such that the records are unrestricted by relational table structures, such as columns and rows. Privacy labels distinguishing among multiple users may be correlated with each of the records using privacy label tree structures. The use of such tree structures may impose fewer limitations on and provide greater flexibility of the structure of each record while at the same time maintaining appropriate data separation.
[00011] Figure 1 schematically illustrates an example multiple user data storage and separation apparatus 100. As will be described hereafter, apparatus 100 may include multiple user data storage and separation functionality. Apparatus 100 may be, for example, a component of a cloud computing system used to provide multiple different business applications, such as email applications and case management systems, to multiple different users 101. In particular, apparatus 100 may provide a single database instance that stores and separates data for multiple users 101 without resulting in bleeding or unauthorized disclosure of data from one user to another.
[00012] Apparatus 100 may include processing electronics 102. Processing electronics 102 may include, for example, a processor 104 configured to execute logic in the form of instruction modules contained in a memory 106. For purposes of this application, the term "processor" shall mean a presently developed or future developed processor 104 that executes sequences of instructions contained in memory 106. In general, upon executing instructions contained in the memory, processor 104 may provide multiple user data storage and separation functionality in apparatus 100. The instructions may be loaded in a random access memory (RAM) for execution by the processor 102 from a read only memory (ROM), a mass storage device, or some other persistent storage. In some examples, hardwired circuitry modules may be used in processing electronics 102 in place of, or in combination with, processor 104 and/or instruction modules stored in memory 106 to implement the multiple user data storage and separation functionality described herein. For example, the multiple user data storage and separation functionality of apparatus 100 may be implemented entirely or in part by logic contained in an application-specific integrated circuit (ASIC). Unless otherwise specifically noted, processing electronics 102 is not limited to any specific combination of hardware circuitry modules and instruction modules, nor to any particular source for instructions executed by processor 104.
[00013] Memory 106 may include a non-transitory computer-readable medium.
The term "non-transitory computer-readable medium" as used herein includes any computer readable medium, excluding only transitory propagating signals per se. Memory 104 may include, for example any non-volatile or volatile memory such as DRAM, RAM, ROM, register memory, or some combination of these; for example a hard disk combined with RAM. Memory 106 may store software instruction modules for execution by processor 104. In some examples, memory 106 may further store data for use by processor 104. Memory 106 may store various software instruction modules that direct processor 104 to carry out various interrelated actions, such as the multiple user data storage and separation functionality of apparatus 100.
[00014] As shown in Figure 1, memory 106 may include records 108 stored therein. Records 108 may be, for example, individual user data items or groupings of associated user data items. For example, apparatus 100 may be a component of a cloud computing system that provides an email application, and memory 106 may store email records. Such records 108 may be comprised of associated user data items such as "Subject" data from the subject lines of emails, "Message" data including the text of emails, "To" data including the identity of message recipients, and "From" data including the identity of message senders. Memory 106 may store data items for multiple different users 101. The term "user" as used herein may refer to single individuals (e.g., clients or employees) or entities (e.g., companies or corporate entities) or grouping or subgroupings of individuals and/or entities (e.g., an employer entity, an IT department subgroup entity, and subgroups of individual employees).
[00015] Records 108 may be defined by and stored using correlated tree structures 1 10. For example, records 108 may be defined by node-based binary tree structures used for data storage and searching, such as self-balancing binary tree structures. In particular, tree structures 1 10 may have schema definitions such that stored records 108 are unrestricted by the rigid relational table structures required between instances of stored data in relational databases, such as rows and columns. In some examples, the structures of two different records 108 may not be the same. For example, continuing with the email example from above, some records 108 may be structured and stored by associating "Subject", "Message", "To", and "From" user data items, while some records 108 may be structured and stored by associating only "Subject", "Message", "To" user data items. In this example, the schema defined by tree structures 1 10 may not require null or placeholder "From" data for those records 108 that are structured to exclude it, as opposed to a relational table structure, which would require null "From" values in each record 108.
[00016] Memory 106 may also include privacy labels 1 12. Privacy labels 112 may distinguish among multiple different users 101. Each privacy label 1 12 may include a unique identification mapping to a user 101. In some examples, privacy label 1 12 may include a number of tokens (e.g., unique randomly generated cryptographically entropic values having a predetermined number of bytes, etc.) that are uniquely provisioned to user 101. For example, multiple different users 101 may include a manager who shares a subset of records 108 with an employee. The manager may be provisioned a privacy label 1 12 having a particular set of N tokens. The employee may be provisioned with a privacy label 1 12 having, for example, a subset of the N tokens.
[00017] Privacy labels 112 may be correlated with records 108 whenever user data items associated as records 108 are written to memory 106. For example, the manager's privacy label 1 12 including the full set of N tokens may be correlated with all records 108 written to memory 106 by the manager. A different privacy label 1 12 containing a subset of the N tokens may be correlated with all records 108 written to memory 106 by the employee.
[00018] Once privacy labels 1 12 are correlated with records 108, they may be compared with user identifier data provided by users 101 requesting records 108 from memory 106 in order to ensure that only records 108 associated with a particular user 101 are accessed by that user 101. For example, the manager may provide user identifier data including the full set of N tokens along with query data to apparatus 100. The full set of N tokens in the user identifier data may be compared with privacy labels 1 12 correlated with records 108 in order to ensure that only records 108 with correlated privacy labels 112 including the full set of N tokens provisioned to the manager, and records 108 with correlated privacy labels 1 12 including the subset of N tokens provisioned to the employee are returned to the manager. Even if the user identifier data provided by the manager includes the full set of N tokens, the manager may still access records 108 having fewer than N correlated tokens, provided that all tokens for a record 108 are included in the full set of N tokens provided by the manager. Similarly, the employee may provide user identifier data including the subset of N tokens along with query data to apparatus 100. The subset of N tokens in the user identifier data may be compared with privacy labels 1 12 in order to ensure that only records 108 correlated with the subset of N tokens provisioned to the employee are returned to the employee. The employee may not access records 108 for which there are a greater number of correlated tokens than those provided by the employee. Other provisioning schemes for privacy labels 1 12 are contemplated as well.
[00019] Privacy labels 1 12 may be correlated with each of records 108 using privacy label tree structures included in tree structures 1 10. The privacy label tree structures defining privacy labels 1 12 may have schema definitions similar to other tree structures 1 10. That is, privacy labels 1 12 may be structured and stored without being restricted by the rigid relational table structures required between instances of stored data in relational databases, such as rows and columns.
[00020] By way of example, Figure 2 is a diagram illustrating example tree structures 200 for facilitating the multiple user data storage and separation functionality of apparatus 100. As shown in Figure 2, the tree structures 200 defining records may include segment trees 202 and receipt trees 204. Segment trees 202 may include a number of correlated trees corresponding to segments 206. Segments 206 may correspond to, for example, a particular type or grouping of user data items. For example, as shown in Figure 2, segments 206 may include a segment 206a for "Subject" data from the subject lines of emails, a segment 206b for "Message" data including the text of emails, a segment 206c for "To" data including the identity of message recipients, and a segment 206d for "From" data including the identity of message senders. Each tree structure corresponding to a segment 206 may include a number of nodes 208. Each node 208 may in turn be an individual node, may be a parent node having a number of child nodes, or may be a child node depending from a parent node. Each node 208 may contain a user data item or a reference to a user data item (e.g., if a user data item is stored in a location other than memory 106). For example, node 208a may include particular "Subject" data for an email, node 208b may include particular "Message" data for an email, node 208c may include particular "To" data for an email, and node 208d may include particular "From" data for an email. Each node 208 may also contain a reference to a number N of receipts 210. That is, each of the nodes 208 in a segment tree 206 has a corresponding receipt tree 204 to define a respective set of records 108 stored in memory 106 in which that respective node 208 is included.
[00021] Receipt trees 204 may include a number of correlated trees corresponding to receipts 206. Each receipt 206 may correspond to and define a respective set of N associated nodes 208, where each of the nodes 208 contains a reference to the respective receipt 210. Accordingly, each node 208 may list a number N of receipts 210, and each receipt 210 may list an unrelated number N of nodes 208. The set of N associated nodes for a particular receipt 210 may define a record 108. For example, each of nodes 208a, 208b, 208c, and 208d may contain a reference to a receipt 210a. Figure 2 illustrates an example reference to a receipt 210a for node 208c. In turn, receipt 210a may contain references to each of nodes 208a, 208b, 208c, and 208d. Figure 2 illustrates an example reference to node 208c for receipt 210a. As such, receipt 210a may define a record that includes each of nodes 208a, 208b, 208c, and 208d. It will be appreciated that the additional receipt references for node 208c shown in Figure 2 may represent the inclusion of node 208c in N-1 other records 108 that may contain additional, fewer, or different nodes 208 than those for record 108a defined by receipt 210a. [00022] As shown in Figure 2, tree structures 200 may also include privacy label trees 212. Privacy label trees 212 may include a number of correlated trees corresponding to privacy labels 214. Privacy labels 214 are correlated with receipts 210 in receipt trees 204 to define respective sets of records 208 associated with respective different users 101. In particular, each privacy label 214 may correspond to and define a respective set of N associated receipts 210, where each of the receipts 210 contains a reference to the respective privacy label 214. Accordingly, each privacy label 214 may list a number N of receipts 210, and each receipt 210 may list an unrelated number N of privacy labels 214. In some examples, for each privacy label 214, there may or may not be a corresponding receipt 210, but for each receipt 210, there must be at least one privacy label 214. The set of N associated receipts 210 for a particular privacy label 214 may define a set of records 108 for which a particular user 101 may gain access, provided that particular privacy label 214 has been provisioned to that particular user 101.
[00023] As will be appreciated, each node 208 may have a number N of corresponding receipts 210, which may, in turn, have a number N of corresponding privacy labels 214, which may provide a theoretically unbounded storage capability, limited only by the details of the particular practical implementation. As may also be appreciated, segments 206 and their corresponding nodes 208 may be grouped according to any particular attribute and are not limited in structure by the rigid relational table structures required between instances of stored data in relational databases, such as rows and columns. As such, segments 206 and their corresponding nodes 208 may be easily repurposed and/or reused simply by addition, deletion, or modification of corresponding receipts 210.
[00024] Figures 3A, 3B, and 3C are Venn diagrams providing an alternative representation of the relationships among tree structures 200 shown in Figure 2. In Figures 3A, 3B, and 3C, set L is the set of all receipts for all privacy labels, set is the set of all receipts, and set K is the set of all receipts for a given node in a segment tree. Each privacy label may have many corresponding receipts. Each receipt may have many corresponding nodes. Each node may have a corresponding receipt tree of receipts. For purposes of Figures 3A, 3B, and 3C, it may be assumed that, for each privacy label, there may or may not be a corresponding receipt, but for each receipt, there must be at least one privacy label. Under this assumption, while all members of set must correspond to one or more members (i.e., lists of corresponding receipts) of set L, not all members in set L will correspond to elements of set R. L (l R must always equal R, and therefore R ίΞ L as shown in Figure 3 A.
[00025] Referring now to Figures 3B and 3C, set S is the set of all nodes having an associated binary receipt tree, and So, Si, ... Sn are all binary trees.
Assuming each receipt tree has multiple corresponding nodes, for each x ε Sn, K is the set of receipts for each node x. V x e Sn: V y e K Π R where K is not {} and K is the set of receipts for node x as shown in Fig. 3B. Thus, each node is directly correlated with a privacy label upon assignment of a receipt. Each receipt may reference up to Sn nodes. Each privacy label may reference up to N receipts.
Accordingly, the total set of all nodes corresponding to a given privacy label is the intersection of nodes in the sets of S, for nodes corresponding to a receipt in K, by which there is a corresponding privacy label set in R, as shown in Figure 3C.
[00026] Figure 4 is a diagram illustrating an example implementation 400 of tree structures 200. Implementation 400 includes correlated binary tree structures corresponding to segments 402, receipts 404, and privacy labels 406. The three possible segments are segment 402a, corresponding to "Name" data, segment 402b, corresponding to "Age", and a segment 402c, corresponding to "Favorite Day" data. Figure 4 illustrates three specific examples. In the first example, a record that uses only one of three possible segments 402 is illustrated. In particular, segment 402a is used, and a node 408a is assigned to Name data "Bob". Node 408a has a corresponding receipt 410a. In the second example, a record that uses two of three possible segments 402 is illustrated. In particular, segments 402a and 402b are used, and nodes 408b and 408c are assigned to Name data "Joe" and Age data "21" respectively. Nodes 408b and 408c both correspond to receipt 410b. In the third example, a record that uses all three possible segments 402 is illustrated. In particular, segments 402a, 402b, and 402c are used. Node 402d is assigned to Name data "Ted". Node 402e is assigned to Favorite Day data "Tuesday". Node 408c is reused. Nodes 402c, 402d, and 402e correspond to receipt 410c. The records for Bob and Ted share the same privacy label 412a (e.g., the records for Bob and Ted were created by the same user), while the record for Joe is correlated with privacy label 412b.
[00027] Referring again to Figure 1 , memory 106 may include receiving module 1 14, label identification module 1 16, query processing module 1 18, and privacy module 120. Modules 1 14, 1 16, 1 18 and 120 may cooperate to cause processing electronics 102 to carry out the process 500 set forth by the flow diagram of Figure 5. As indicated by a step 502, receiving module 1 14 may receive a communication 121 including user identifier data 122 and query data 124. For example, each privacy label 1 12 may include a unique identification mapping to a user 101. In some examples, privacy label 1 12 may include a number of tokens that are uniquely provisioned to user 101. User 101 may send a communication 121 including user identifier data 122 that includes a set of N tokens along with a query to apparatus 100.
[00028] In some examples, user identifier data 122 is out of band data with respect to query data 124. That is, user identification data 122 may be received by receiving module 1 14 in the same communication as query data 124, but may be kept separate from query data 124 by a conceptually independent data channel provided as an inherent characteristic of the communication channel and transmission protocol, as opposed to requiring a separate communication channel and endpoints to be established at apparatus 100. In this way, user 101 need not be aware of and is not required to enter user identification data 122, and user identifier 124 may be processed independent of query data 124 by label identification module 1 16 and privacy module 120. Query data 124 may be, for example, a select statement or other type of query that defines the scope of a data request. For example, query data 124 may include a request to retrieve all emails from person X having Y in the subject line. Other types of query data 124 are contemplated as well.
[00029] At a step 504, label identification module 1 16 may identify a set of privacy labels 1 12 based on user identifier data 122. In some examples, label identification module 1 16 identifies the set of the privacy labels 1 12 by comparing tokens in the user identifier data 122 with tokens in privacy labels 1 12 stored in memory 106. In some examples, if tokens in the user identifier data 122 do not match tokens in any privacy labels 1 12, user 101 is informed that no data exists. In some examples, label identification module 1 16 communicates with a privacy label mapping service to obtain the actual tokens for the ones the user is providing (e.g., user 101 is not provided with the actual tokens used by apparatus 100, but rather reference tokens).
[00030] At a step 506, query processing module 1 18 may identify a set of records 108 based on query data 124. In some examples, query processing module 1 18 may identify the set of records 108 using tree structures such as those described with reference to Figure 2. For example, query processing module 1 18 may identify segment tree nodes associated with query data 124, and further identify receipts correlated with the segment tree nodes associated with the query data using receipt trees correlated with the segment trees. By way of example, query data 124 may include a request to retrieve all emails from person X having Y in the subject line. Query processing module 1 18 may search segment trees for segments corresponding to "From" and "Subject" in order to identify nodes matching X and Y. Query processing module 1 18 may then identify receipts correlated with nodes matching X and Y. The identified set of receipts may correspond to a set of records 108 meeting the requirements of query data 124.
[00031] At a step 508, privacy module 120 may return, in response to communication 121, only records 126 from the set of records 108 identified by query processing module 1 18 that are associated with the set of the privacy labels 1 12 identified by label identification module 1 16. In some examples, privacy module 120 may identify the appropriate records 108 using tree structures such as those described with reference to Figure 2. For example, privacy module 120 may identify privacy labels 1 12 correlated with the receipts that correspond to a set of records 108 meeting the requirements of query data 124. Privacy module 120 may then compare the resulting set of privacy labels 1 12 with the set of the privacy labels 1 12 identified by label identification module 1 16. Privacy module 120 may then return only those records 108 for which the set of privacy labels 1 12 identified by privacy module 120 match those identified by label identification module 1 16. If there are no matching privacy labels 1 12, then privacy module 120 may respond to the communication indicating no data exists.
[00032] Although the present disclosure has been described with reference to example embodiments, workers skilled in the art will recognize that changes may be made in form and detail without departing from the spirit and scope of the claimed subject matter. For example, although different example embodiments may have been described as including one or more features providing one or more benefits, it is contemplated that the described features may be interchanged with one another or alternatively be combined with one another in the described example embodiments or in other alternative embodiments. Because the technology of the present disclosure is relatively complex, not all changes in the technology are foreseeable. The present disclosure described with reference to the example embodiments and set forth in the following claims is manifestly intended to be as broad as possible. For example, unless specifically otherwise noted, the claims reciting a single particular element also encompass a plurality of such particular elements.

Claims

WHAT IS CLAIMED IS:
1. A multiple user data storage and separation apparatus, comprising:
memory;
records stored in the memory, the records defined by correlated tree structures having schema such that the records are unrestricted by relational table structures, the records including user data items associated with multiple different users;
privacy labels stored in the memory and correlated with each of the records using privacy label tree structures; wherein the privacy labels distinguish among the users; and
instructions stored in the memory, the instructions, when executed, causing a processor to
receive a communication including user identifier data and query data;
identify a set of the privacy labels based on the user identifier data; identify a set of the records based on the query data; and return, in response to the communication, only records from the identified set of records that are associated with the set of the privacy labels.
2. The apparatus of claim 1 , wherein the tree structures defining the records include segment trees, the segment trees including nodes corresponding to the user data items, and wherein the tree structures defining the records stored in the memory further include receipt trees, the receipt trees including receipts that define respective sets of segment tree nodes included in each of the respective records stored in the memory, and wherein each of the nodes in the segment trees has a corresponding one of the receipt trees to define a respective set of the records stored in the memory in which that respective segment tree node is included.
3. The apparatus of claim 2, wherein the instructions, when executed, cause the processor to identify the set of the records based on the query data by identifying segment tree nodes associated with the query data, and by identifying receipts correlated with the segment tree nodes associated with the query data using the receipt trees.
4. The apparatus of claim 2, wherein the privacy labels are correlated with the receipt trees to define respective sets of the records associated with each of the respective multiple users.
5. The apparatus of claim 1 , wherein the user identifier data is out of band data with respect to the query data, wherein the privacy labels and the user identifier data include tokens, and wherein the instructions, when executed, cause the processor to identify the set of the privacy labels by comparing the tokens in the user identifier data with the tokens in the privacy labels stored in the memory.
6. A method of multiple user data storage and separation, comprising:
receiving, by an apparatus, a communication including user identifier data and query data, the apparatus including records defined by correlated tree structures having schema such that the records are unrestricted by relational table structures, the records including user data items associated with multiple different users, the apparatus also including privacy labels correlated with each of the records using privacy label tree structures, wherein the privacy labels distinguish among the users;
identifying a set of the privacy labels based on the user identifier data; identifying a set of the records based on the query data; and returning, in response to the communication, only records from the identified set of records that are associated with the set of the privacy labels.
7. The method of claim 6, wherein the tree structures defining the records include segment trees, the segment trees including nodes corresponding to the user data items, and wherein the tree structures defining the records stored in the memory further include receipt trees, the receipt trees including receipts that define respective sets of segment tree nodes included in each of the respective records stored in the memory, and wherein each of the nodes in the segment trees has a corresponding one of the receipt trees to define a respective set of the records stored in the memory in which that respective segment tree node is included.
8. The method of claim 7, further comprising identifying segment tree nodes associated with the query data, and identifying receipts correlated with the segment tree nodes associated with the query data using the receipt trees in order to identify the set of the records based on the query data.
9. The method of claim 7, wherein the privacy labels are correlated with the receipt trees to define respective sets of the records associated with each of the respective multiple users.
10. The method of claim 6, wherein the user identifier data is out of band data with respect to the query data, and wherein the privacy labels and the user identifier include tokens, the method further comprising comparing the tokens in the user identifier data with the tokens in the privacy labels stored in the memory in order to identify the set of the privacy labels.
11. A multiple user data storage and separation system, comprising:
a processor;
memory in communication with the processor and including records defined by correlated tree structures having schema such that the records are unrestricted by relational table structures, the records including user data items associated with multiple different users, the memory also including privacy labels stored in the memory and correlated with each of the records using privacy label tree structures, wherein the privacy labels distinguish among the users; and
instructions stored in the memory for directing the processor, the instructions including a receiving module to receive a communication including user identifier data and query data;
a label identification module to identify a set of the privacy labels based on the user identifier data;
a query processing module to identify a set of the records based on the query data; and
a privacy module to return, in response to the communication, only records from the identified set of records that are associated with the set of the privacy labels.
12. The system of claim 11, wherein the tree structures defining the records include segment trees, the segment trees including nodes corresponding to the user data items, and wherein the tree structures defining the records stored in the memory further include receipt trees, the receipt trees including receipts that define respective sets of segment tree nodes included in each of the respective records stored in the memory, and wherein each of the nodes in the segment trees has a corresponding one of the receipt trees to define a respective set of the records stored in the memory in which that respective segment tree node is included.
13. The system of claim 12, wherein the query processing module identifies the set of the records based on the query data by identifying segment tree nodes associated with the query data, and by identifying receipts correlated with the segment tree nodes associated with the query data using the receipt trees.
14. The system of claim 12, wherein the privacy labels are correlated with the receipt trees to define respective sets of the records associated with each of the respective multiple users.
15. The printing system of claim 11, wherein the user identifier data is out of band data with respect to the query data, wherein the privacy labels and the user identifier data include tokens, and wherein the label identification module identifies the set of the privacy labels by comparing the tokens in the user identifier data with the tokens in the privacy labels stored in the memory.
PCT/US2015/013987 2015-01-30 2015-01-30 Multiple user data storage and separation WO2016122668A1 (en)

Priority Applications (7)

Application Number Priority Date Filing Date Title
PCT/US2015/013987 WO2016122668A1 (en) 2015-01-30 2015-01-30 Multiple user data storage and separation
PCT/US2015/019786 WO2016122682A1 (en) 2015-01-30 2015-03-10 Resource provisioning for multiple user data storage and separation
PCT/US2015/019794 WO2016122686A1 (en) 2015-01-30 2015-03-10 Authentication for multiple user data storage and separation
PCT/US2015/019792 WO2016122685A1 (en) 2015-01-30 2015-03-10 Authorization for multiple user data storage and separation
PCT/US2015/019788 WO2016122683A1 (en) 2015-01-30 2015-03-10 Workflow management for multiple user data storage and separation
PCT/US2015/019789 WO2016122684A1 (en) 2015-01-30 2015-03-10 Data sandboxing for multiple user data storage and separation
PCT/US2015/025768 WO2016122697A1 (en) 2015-01-30 2015-04-14 Resource brokering for multiple user data storage and separation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2015/013987 WO2016122668A1 (en) 2015-01-30 2015-01-30 Multiple user data storage and separation

Publications (1)

Publication Number Publication Date
WO2016122668A1 true WO2016122668A1 (en) 2016-08-04

Family

ID=56544084

Family Applications (7)

Application Number Title Priority Date Filing Date
PCT/US2015/013987 WO2016122668A1 (en) 2015-01-30 2015-01-30 Multiple user data storage and separation
PCT/US2015/019794 WO2016122686A1 (en) 2015-01-30 2015-03-10 Authentication for multiple user data storage and separation
PCT/US2015/019786 WO2016122682A1 (en) 2015-01-30 2015-03-10 Resource provisioning for multiple user data storage and separation
PCT/US2015/019788 WO2016122683A1 (en) 2015-01-30 2015-03-10 Workflow management for multiple user data storage and separation
PCT/US2015/019792 WO2016122685A1 (en) 2015-01-30 2015-03-10 Authorization for multiple user data storage and separation
PCT/US2015/019789 WO2016122684A1 (en) 2015-01-30 2015-03-10 Data sandboxing for multiple user data storage and separation
PCT/US2015/025768 WO2016122697A1 (en) 2015-01-30 2015-04-14 Resource brokering for multiple user data storage and separation

Family Applications After (6)

Application Number Title Priority Date Filing Date
PCT/US2015/019794 WO2016122686A1 (en) 2015-01-30 2015-03-10 Authentication for multiple user data storage and separation
PCT/US2015/019786 WO2016122682A1 (en) 2015-01-30 2015-03-10 Resource provisioning for multiple user data storage and separation
PCT/US2015/019788 WO2016122683A1 (en) 2015-01-30 2015-03-10 Workflow management for multiple user data storage and separation
PCT/US2015/019792 WO2016122685A1 (en) 2015-01-30 2015-03-10 Authorization for multiple user data storage and separation
PCT/US2015/019789 WO2016122684A1 (en) 2015-01-30 2015-03-10 Data sandboxing for multiple user data storage and separation
PCT/US2015/025768 WO2016122697A1 (en) 2015-01-30 2015-04-14 Resource brokering for multiple user data storage and separation

Country Status (1)

Country Link
WO (7) WO2016122668A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107562521B (en) * 2017-09-27 2021-03-09 苏州浪潮智能科技有限公司 Resource management method and device
US11895120B2 (en) * 2018-05-31 2024-02-06 Vivek Kapoor Multiparty binary access controls
CN109005245B (en) * 2018-09-07 2021-09-14 广州微算互联信息技术有限公司 Cloud mobile phone use management method and system
CN116015814B (en) * 2022-12-19 2024-04-05 武汉大学 K anonymous geographic position privacy protection method, system and electronic equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050198017A1 (en) * 2004-02-11 2005-09-08 Mark Gaponoff Efficient indexing of hierarchical relational database records
US20060005036A1 (en) * 2004-07-02 2006-01-05 Limin Hu Enterprise security management system using hierarchical organization and multiple ownership structure
US20080046440A1 (en) * 2006-08-16 2008-02-21 Estes Philip F Method And System For Enforcing User-Defined Relational Limitations In A Recursive Relational Database Table
US20100262631A1 (en) * 2009-04-14 2010-10-14 Sun Microsystems, Inc. Mapping Information Stored In a LDAP Tree Structure to a Relational Database Structure
US20140089350A1 (en) * 2008-03-31 2014-03-27 Thomson Reuters Global Resources Systems and methods for tables of contents

Family Cites Families (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5295261A (en) * 1990-07-27 1994-03-15 Pacific Bell Corporation Hybrid database structure linking navigational fields having a hierarchial database structure to informational fields having a relational database structure
US7058640B2 (en) * 2003-02-05 2006-06-06 International Business Machines Corporation Systems, methods, and computer program products to efficiently update multidimensional databases
US8572041B2 (en) * 2003-09-12 2013-10-29 Hewlett-Packard Development Company, L.P. Representing records
CN100407146C (en) * 2003-12-18 2008-07-30 国际商业机器公司 Management system and method for distributed resource
JP2008047017A (en) * 2006-08-21 2008-02-28 Sony Corp Information processor, processing method, and program
US20090106815A1 (en) * 2007-10-23 2009-04-23 International Business Machines Corporation Method for mapping privacy policies to classification labels
CN101981570A (en) * 2008-04-01 2011-02-23 雅虎公司 Open framework for integrating, associating and interacting with content objects
US9129052B2 (en) * 2009-12-03 2015-09-08 International Business Machines Corporation Metering resource usage in a cloud computing environment
US9047348B2 (en) * 2010-07-22 2015-06-02 Google Inc. Event correlation in cloud computing
US8959221B2 (en) * 2011-03-01 2015-02-17 Red Hat, Inc. Metering cloud resource consumption using multiple hierarchical subscription periods
US20120317238A1 (en) * 2011-06-09 2012-12-13 Salesforce.Com, Inc. Secure cross-domain communication
US8782762B2 (en) * 2011-08-17 2014-07-15 International Business Machines Corporation Building data security in a networked computing environment
US8683103B2 (en) * 2011-08-19 2014-03-25 International Business Machines Corporation Hierarchical multi-tenancy support for host attachment configuration through resource groups
KR20130046155A (en) * 2011-10-27 2013-05-07 인텔렉추얼디스커버리 주식회사 Access control system for cloud computing service
US8694995B2 (en) * 2011-12-14 2014-04-08 International Business Machines Corporation Application initiated negotiations for resources meeting a performance parameter in a virtualized computing environment
WO2013138603A1 (en) * 2012-03-16 2013-09-19 Google Inc. Providing information prior to downloading resources
US20130263117A1 (en) * 2012-03-28 2013-10-03 International Business Machines Corporation Allocating resources to virtual machines via a weighted cost ratio
WO2014031618A2 (en) * 2012-08-22 2014-02-27 Bitvore Corp. Data relationships storage platform
US9251115B2 (en) * 2013-03-07 2016-02-02 Citrix Systems, Inc. Dynamic configuration in cloud computing environments
US20140282938A1 (en) * 2013-03-15 2014-09-18 Adam Moisa Method and system for integrated cloud storage management
KR20140118030A (en) * 2013-03-28 2014-10-08 인하대학교 산학협력단 Resource trade management apparatus in hierarchical load balancing structure of cloud computing environment and method thereof
US20140358630A1 (en) * 2013-05-31 2014-12-04 Thomson Licensing Apparatus and process for conducting social media analytics

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050198017A1 (en) * 2004-02-11 2005-09-08 Mark Gaponoff Efficient indexing of hierarchical relational database records
US20060005036A1 (en) * 2004-07-02 2006-01-05 Limin Hu Enterprise security management system using hierarchical organization and multiple ownership structure
US20080046440A1 (en) * 2006-08-16 2008-02-21 Estes Philip F Method And System For Enforcing User-Defined Relational Limitations In A Recursive Relational Database Table
US20140089350A1 (en) * 2008-03-31 2014-03-27 Thomson Reuters Global Resources Systems and methods for tables of contents
US20100262631A1 (en) * 2009-04-14 2010-10-14 Sun Microsystems, Inc. Mapping Information Stored In a LDAP Tree Structure to a Relational Database Structure

Also Published As

Publication number Publication date
WO2016122682A1 (en) 2016-08-04
WO2016122684A1 (en) 2016-08-04
WO2016122685A1 (en) 2016-08-04
WO2016122683A1 (en) 2016-08-04
WO2016122686A1 (en) 2016-08-04
WO2016122697A1 (en) 2016-08-04

Similar Documents

Publication Publication Date Title
US10176185B2 (en) Enterprise level data management
US20240073190A1 (en) Secure electronic messaging systems generating alternative queries
US9135560B1 (en) Automatic parser selection and usage
US8983912B1 (en) Data collection and transmission
WO2016122668A1 (en) Multiple user data storage and separation
CN102571720A (en) Method and device for processing heterogeneous information contents
Zhang et al. A MapReduce based approach of scalable multidimensional anonymization for big data privacy preservation on cloud
US8930380B1 (en) Automatic parser generation
US11250166B2 (en) Fingerprint-based configuration typing and classification
CN109783076A (en) Code administration method, apparatus, equipment and storage medium based on git
US10229191B2 (en) Enterprise level data management
KR20190020105A (en) Method and device for distributing streaming data
US20140380498A1 (en) Anonymization device
CN109726579B (en) Resource access authority grouping method and equipment
CN103488677B (en) Project configuration method and apparatus
Kamaludin et al. Clone tag detection in distributed RFID systems
EP2704031A1 (en) Improved schema mapping based on data views and database tables
CN107103011A (en) The implementation method and device of terminal data search
US20150339361A1 (en) Exposing data to query generating applications using usage profiles
CN110851663B (en) Method and device for managing metadata
US20190340391A1 (en) Multiple message retrieval for secure electronic communication
CN108876314B (en) Career professional ability traceable method and platform
US10970417B1 (en) Differential privacy security for benchmarking
CN106778352B (en) Multisource privacy protection method for combined release of set value data and social network data
KR101171551B1 (en) Event history memory device, event history tracking device, event history memory method, computer-readable recording medium recording event history memory program and computer-readable recording medium recording data structure

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15880558

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15880558

Country of ref document: EP

Kind code of ref document: A1