Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data storage method and device, computer readable storage medium and electronic equipment

A data storage and data technology, applied in the field of information security, can solve the problems of sensitive data leakage, inability to meet sensitive data table association operations, data irreversibility, etc.

Inactive Publication Date: 2020-07-03
BEIJING SANKUAI ONLINE TECH CO LTD
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the following two methods are mainly used to protect the storage security of sensitive data: (1) Simple data desensitization method, that is, using desensitization rules such as replacement, rearrangement, and encryption for sensitive data to desensitize data, but this method , the data is irreversible, and the uniqueness of the data cannot be guaranteed, so the table association operation based on sensitive data cannot be satisfied; (2) Sensitive data is encrypted symmetrically through a user-defined function (User Define Function, UDF), although this method can Guarantee the reversibility and uniqueness of data, but there is a risk of sensitive data leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data storage method and device, computer readable storage medium and electronic equipment
  • Data storage method and device, computer readable storage medium and electronic equipment
  • Data storage method and device, computer readable storage medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] Specific embodiments of the present disclosure will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present disclosure, and are not intended to limit the present disclosure.

[0053] Before describing the embodiments of the present disclosure, a flow direction of data in a data warehouse (Data Warehouse, DW) is firstly introduced. Such as figure 1 As shown, the data flows from the business database to the data warehouse, and then flows from the data warehouse to the business intelligence (Business Intelligence, BI) database. A data warehouse includes a data storage (Operational DataStore, ODS) layer, a data detail (Data Warehouse Detail, DWD) layer, a data summary (DateWarehouseSummary, DWS) layer, a data application (Data Warehouse Application, DWA) layer and a shared database. Moreover, within the data warehouse, the sequence o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a data storage method and device, a computer readable storage medium and electronic equipment. The method comprises the steps of obtaining original sensitive data in a data warehouse; backing up the original sensitive data to obtain backup sensitive data, independently storing the backup sensitive data into a data warehouse, and enabling the backup sensitive data not to flow in the data warehouse; and performing desensitization operation on the original sensitive data. Therefore, the risk of leakage of the sensitive data in the data warehouse circulation process can bereduced. Besides, the original sensitive data is backed up (namely backup sensitive data) and is independently stored, and the backup sensitive data does not flow in the data warehouse, so that the reversibility and uniqueness of the data can be ensured, and the requirements of a user on reversible operation of the sensitive data and table association operation based on sensitive fields are met.Moreover, the backup sensitive data does not flow in the data warehouse, so that the risk of sensitive data leakage can be reduced, and subsequent auditing of the sensitive data and tracing of the sensitive data leakage are facilitated.

Description

technical field [0001] The present disclosure relates to the field of information security, and in particular, to a data storage method, device, computer-readable storage medium, and electronic equipment. Background technique [0002] Against the backdrop of the promulgation and implementation of the "Network Security Law" and the frequent occurrence of various external data leakage incidents, data storage security has also been raised to a new level, requiring us to conduct in-depth management of big data security, privacy and compliance Analysis in order to better understand the complexity of big data security and privacy issues, so as to solve the problem of sensitive data leakage in data warehouses under the premise of "safe use" of data. [0003] At present, the following two methods are mainly used to protect the storage security of sensitive data: (1) Simple data desensitization method, that is, using desensitization rules such as replacement, rearrangement, and encry...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F11/14G06F21/60G06F21/64
CPCG06F21/6245G06F11/1448G06F21/602G06F21/64
Inventor 王鹏闫新兴
Owner BEIJING SANKUAI ONLINE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products