Big data security fusion method without revealing privacy

A fusion method and big data technology, applied in the direction of digital data protection, can solve problems such as privacy data leakage, and achieve the effect of ensuring data security, simple implementation, and promoting information sharing

Active Publication Date: 2018-08-10
CHINA UNIONPAY
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, on the one hand, different organizations welcome the sharing of big data. The introduction of fusion of different types of data can produce new analysis results, and the value of data will thus have a multiplier effect; There are concerns about the leakage of private data in the Internet, because the final analysis result is often only a statistical conclusion, but in the process of big data fusion calculation, all the entry details of the data have to be exposed to the other party
This problem has become a major obstacle to big data collaboration and sharing among industries

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Big data security fusion method without revealing privacy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] It should be noted that, according to the embodiments disclosed in the present invention, the first party stores the first data set in the first database, and the second party stores the second data set in the second database.

[0012] The first and second data sets respectively record different information, such as activity information of multiple users on different occasions. The first and second data sets have intersections of information, for example, user identity information, which can be extracted as associated fields.

[0013] The present invention provides various implementation manners for performing big data fusion on the first and second data sets.

[0014] Such as figure 1 As shown, the first embodiment of the present invention provides a big data security fusion method, which includes the following steps:

[0015] Step S10: The first party and the second party negotiate the associated fields, the data items required by each, and the sorting rules.

[0016] Specifi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for safe integration of big data, comprising: a first party and a second party negotiating about associated fields, data items required by the first party and the second party and a sorting rule; screening out, on the basis of the data items required by the first party and the second party, a first to-be-integrated data set and a second to-be-integrated data set respectively from a first data set and a second data set; sorting, according to the sorting rule, respectively the first to-be-integrated data set and the second to-be-integrated data set, and removing, respectively from the first to-be-integrated data set and the second to-be-integrated data set, the data that the associated fields correspond to; submitting the first to-be-integrated data set and the second to-be-integrated data set to a third party computing platform, so as to form an integrated data set; and the third party computing platform generating, by means of analysis and calculation of the integrated data set, a result data set. This invention effectively prevents the private data from being leaked while accomplishing the integration of big data, facilitating share of information on the premise of ensuring the data security.

Description

Technical field [0001] The invention relates to a big data safety fusion method. Background technique [0002] With the introduction of the national "Internet +" strategy, the need for big data integration among various industries has become increasingly urgent. However, on the one hand, different institutions welcome big data sharing. The introduction of the fusion of different types of data can produce new analysis results, and the value of the data will therefore have a multiplier effect; on the other hand, the two parties are more concerned about the process of data fusion. There are concerns about the leakage of private data in China, because the final analysis result is often only a statistical conclusion, and in the process of big data fusion calculation, all the details of the data have to be exposed to the other party. This problem has become a major obstacle to big data collaboration and sharing between industries. [0003] Therefore, those skilled in the art expect to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62
Inventor 周雍恺柴洪峰何朔何东杰刘国宝才华
Owner CHINA UNIONPAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products