Dab tsi yog Data Masking Technology thiab Solution hauv Network Packet Broker?

1. Lub tswv yim ntawm Data Masking

Data masking tseem hu ua data masking.Nws yog ib txoj hauv kev los hloov, hloov kho lossis npog cov ntaub ntawv rhiab xws li xov tooj ntawm tes, tus lej xov tooj hauv txhab nyiaj thiab lwm yam ntaub ntawv thaum peb tau muab cov cai npog ntsej muag thiab cov cai.Cov txheej txheem no feem ntau yog siv los tiv thaiv cov ntaub ntawv rhiab los ntawm kev siv ncaj qha rau hauv qhov chaw tsis muaj kev ntseeg siab.

Cov ntaub ntawv npog lub hauv paus ntsiab lus: Cov ntaub ntawv npog yuav tsum tuav cov ntaub ntawv qub, cov cai ntawm kev lag luam, thiab cov ntaub ntawv ntsig txog kom ntseeg tau tias qhov kev txhim kho tom ntej, kev sim, thiab kev tshuaj xyuas cov ntaub ntawv yuav tsis cuam tshuam los ntawm kev npog ntsej muag.Xyuas kom cov ntaub ntawv sib xws thiab siv tau ua ntej thiab tom qab npog.

2. Kev faib cov ntaub ntawv Masking

Cov ntaub ntawv npog tuaj yeem muab faib ua static data masking (SDM) thiab dynamic data masking (DDM).

Static data masking (SDM): Static data masking yuav tsum tau tsim ib qho chaw tshiab uas tsis yog-tsim ntaub ntawv rau kev cais tawm ntawm qhov chaw tsim khoom.Cov ntaub ntawv rhiab heev yog muab rho tawm los ntawm cov ntaub ntawv tsim khoom thiab tom qab ntawd muab tso rau hauv cov ntaub ntawv tsis tsim khoom.Nyob rau hauv txoj kev no, cov ntaub ntawv desensitized raug cais tawm ntawm qhov chaw tsim khoom, uas ua tau raws li kev lag luam xav tau thiab ua kom muaj kev ruaj ntseg ntawm cov ntaub ntawv ntau lawm.

SDM

Dynamic Data masking (DDM): Nws yog feem ntau siv nyob rau hauv qhov chaw tsim khoom los desensitize rhiab cov ntaub ntawv hauv lub sijhawm.Qee lub sij hawm, sib txawv ntawm daim npog qhov ncauj yuav tsum tau nyeem tib cov ntaub ntawv rhiab nyob rau hauv ntau lub sijhawm.Piv txwv li, lub luag haujlwm sib txawv thiab kev tso cai tuaj yeem siv cov phiaj xwm npog sib txawv.

DDM

Cov ntaub ntawv tshaj tawm thiab cov ntaub ntawv cov khoom siv npog daim ntawv thov

Cov xwm txheej zoo li no feem ntau suav nrog cov ntaub ntawv saib xyuas cov khoom lossis cov ntawv tshaj tawm, cov khoom siv sab nraud cov ntaub ntawv, thiab cov ntawv ceeb toom raws li kev txheeb xyuas cov ntaub ntawv, xws li cov ntaub ntawv kev lag luam thiab kev tshuaj xyuas qhov project.

cov ntaub ntawv tshaj tawm cov khoom npog

3. Cov ntaub ntawv Masking Solution

Feem ntau cov ntaub ntawv npog cov phiaj xwm suav nrog: kev siv tsis raug, tus nqi random, cov ntaub ntawv hloov pauv, symmetric encryption, tus nqi nruab nrab, offset thiab rounding, thiab lwm yam.

Kev tsis lees paub: Invalidation yog hais txog qhov encryption, truncation, los yog nkaum ntawm rhiab cov ntaub ntawv.Cov tswv yim no feem ntau hloov cov ntaub ntawv tiag tiag nrog cov cim tshwj xeeb (xws li *).Kev ua haujlwm yog yooj yim, tab sis cov neeg siv tsis tuaj yeem paub hom ntawv ntawm cov ntaub ntawv qub, uas yuav cuam tshuam rau cov ntaub ntawv txuas ntxiv.

Random nqi: Tus nqi random yog hais txog kev hloov pauv ntawm cov ntaub ntawv rhiab heev (cov lej hloov cov lej, cov ntawv hloov cov ntawv, thiab cov cim hloov cov cim).Txoj kev npog ntsej muag no yuav ua kom cov hom ntawv ntawm cov ntaub ntawv rhiab rau qee yam thiab pab txhawb cov ntaub ntawv txuas ntxiv.Masking phau ntawv txhais lus yuav xav tau rau qee cov lus muaj txiaj ntsig, xws li cov npe ntawm tib neeg thiab chaw.

Hloov cov ntaub ntawv: Cov ntaub ntawv hloov pauv zoo ib yam li daim npog qhov tsis muaj nuj nqis thiab qhov tsis zoo, tshwj tsis yog tias tsis yog siv cov cim tshwj xeeb lossis cov txiaj ntsig random, cov ntaub ntawv npog npog tau hloov nrog tus nqi tshwj xeeb.

Symmetric encryption: Symmetric encryption yog ib qho tshwj xeeb thim rov qab daim npog qhov ncauj.Nws encrypts rhiab cov ntaub ntawv los ntawm encryption keys thiab algorithms.Cov hom ntawv ciphertext zoo ib yam nrog cov ntaub ntawv qub hauv cov kev cai logic.

Nruab nrab: Cov txheej txheem nruab nrab feem ntau siv rau hauv cov xwm txheej xwm txheej.Rau cov ntaub ntawv tus lej, peb ua ntej xam lawv qhov txhais tau li cas, thiab tom qab ntawd mam li faib cov txiaj ntsig desensitized nyob ib ncig ntawm qhov nruab nrab, yog li khaws cov lej ntawm cov ntaub ntawv tas li.

Offset thiab Rounding: Txoj kev no hloov cov ntaub ntawv digital los ntawm kev hloov pauv.Lub offset rounding ua kom qhov kwv yees qhov tseeb ntawm qhov ntau thaum tswj kev ruaj ntseg ntawm cov ntaub ntawv, uas yog ze rau cov ntaub ntawv tiag tiag dua li cov txheej txheem dhau los, thiab muaj qhov tseem ceeb hauv qhov xwm txheej ntawm cov ntaub ntawv loj.

ML-NPB-5660- 数据脱敏

Tus Qauv Qhia "ML-NPB-5660"rau cov ntaub ntawv Masking

4. Feem ntau siv cov ntaub ntawv npog cov txheej txheem

(1).Cov txheej txheem txheeb cais

Cov ntaub ntawv sampling thiab cov ntaub ntawv aggregation

- Cov ntaub ntawv sampling: Kev tshuaj xyuas thiab kev ntsuam xyuas ntawm thawj cov ntaub ntawv teev tseg los ntawm kev xaiv ib tus neeg sawv cev ntawm cov ntaub ntawv teev tseg yog ib txoj hauv kev tseem ceeb los txhim kho kev ua tau zoo ntawm cov txheej txheem de-identification.

- Cov ntaub ntawv sib sau ua ke: Raws li kev sau cov txheej txheem txheeb cais (xws li kev suav, suav, nruab nrab, siab tshaj plaws thiab yam tsawg kawg nkaus) siv rau cov cwj pwm hauv microdata, qhov tshwm sim yog tus sawv cev ntawm txhua cov ntaub ntawv hauv cov ntaub ntawv qub.

(2).Cryptography

Cryptography yog ib txoj hauv kev los desensitize lossis txhim kho cov txiaj ntsig ntawm desensitization.Ntau hom encryption algorithms tuaj yeem ua tiav cov teebmeem desensitization sib txawv.

- Deterministic encryption: Ib qho kev tsis sib haum xeeb encryption.Nws feem ntau ua cov ntaub ntawv ID thiab tuaj yeem decrypt thiab rov qab cov ntawv ciphertext rau tus thawj ID thaum tsim nyog, tab sis tus yuam sij yuav tsum tau tiv thaiv kom raug.

- Irreversible encryption: Lub hash muaj nuj nqi yog siv los ua cov ntaub ntawv, uas feem ntau yog siv rau cov ntaub ntawv ID.Nws tsis tuaj yeem decrypted ncaj qha thiab daim ntawv qhia kev sib raug zoo yuav tsum tau txais kev cawmdim.Tsis tas li ntawd, vim muaj qhov ua haujlwm ntawm hash, cov ntaub ntawv sib tsoo yuav tshwm sim.

- Homomorphic encryption: Lub ciphertext homomorphic algorithm yog siv.Nws cov yam ntxwv yog tias qhov tshwm sim ntawm kev ua haujlwm ciphertext yog tib yam li kev ua haujlwm ntawm cov ntawv dawb tom qab decryption.Yog li ntawd, nws yog feem ntau siv los ua cov zauv teb, tab sis nws tsis yog dav siv rau kev ua tau zoo.

(3).System Technology

Cov cuab yeej siv hluav taws xob tshem tawm lossis thaiv cov ntaub ntawv cov khoom uas tsis ua raws li kev tiv thaiv ntiag tug, tab sis tsis tshaj tawm lawv.

- Masking: nws yog hais txog txoj kev desensitization feem ntau los npog tus cwj pwm tus nqi, xws li tus lej nrog tus neeg sib tw, daim npav ID raug cim nrog lub hnub qub, lossis qhov chaw nyob raug txiav.

- Kev tawm tsam hauv zos: yog hais txog cov txheej txheem ntawm kev tshem tawm cov txiaj ntsig tshwj xeeb (kem), tshem tawm cov ntaub ntawv tsis tseem ceeb;

- Cov ntaub ntawv txwv: yog hais txog cov txheej txheem ntawm kev rho tawm cov ntaub ntawv tshwj xeeb (kab), tshem tawm cov ntaub ntawv tsis tseem ceeb.

(4).Pseudonym Technology

Pseudomanning yog ib qho txheej txheem de-identification uas siv lub npe pseudonym los hloov tus txheeb ze ncaj qha (los yog lwm tus cim rhiab).Pseudonym cov tswv yim tsim cov cim tshwj xeeb rau txhua tus neeg cov ntaub ntawv kawm, tsis yog cov cim ncaj qha lossis cov cim rhiab.

- Nws tuaj yeem tsim cov txiaj ntsig sib txawv ntawm nws tus kheej kom sib haum rau tus thawj ID, txuag lub rooj sib tham, thiab tswj hwm kev nkag mus rau lub rooj sib tham.

- Koj tseem tuaj yeem siv encryption los tsim cov npe pseudonym, tab sis yuav tsum khaws tus yuam sij decryption kom zoo;

Cov thev naus laus zis no tau siv dav hauv cov ntaub ntawv ntawm ntau tus neeg siv cov ntaub ntawv ywj pheej, xws li OpenID hauv qhov kev qhib platform, qhov twg cov neeg tsim khoom sib txawv tau txais qhov sib txawv Openids rau tib tus neeg siv.

(5).Generalization Techniques

Generalization txheej txheem hais txog cov txheej txheem de-identification uas txo cov granularity ntawm cov yam ntxwv xaiv hauv cov ntaub ntawv teev thiab muab cov lus piav qhia dav dav thiab paub daws teeb meem ntawm cov ntaub ntawv.Generalization thev naus laus zis yog qhov yooj yim rau kev siv thiab tuaj yeem tiv thaiv qhov tseeb ntawm cov ntaub ntawv qib siab.Nws yog feem ntau siv hauv cov ntaub ntawv cov khoom lag luam lossis cov ntaub ntawv tshaj tawm.

- Rounding: suav nrog xaiv lub hauv paus puag ncig rau tus cwj pwm xaiv, xws li kev nce toj lossis nqes kev tshawb fawb, cov txiaj ntsig tau 100, 500, 1K, thiab 10K

- Sab saum toj thiab hauv qab coding txheej txheem: Hloov qhov tseem ceeb saum toj no (lossis hauv qab) qhov pib nrog qhov pib sawv cev rau theem saum toj (lossis hauv qab) yielding qhov tshwm sim ntawm "saum X" lossis "hauv qab X"

(6).Cov txheej txheem Randomization

Raws li hom de-identification txheej txheem, randomization technology hais txog kev hloov kho tus nqi ntawm tus cwj pwm los ntawm randomization, kom tus nqi tom qab randomization txawv ntawm tus nqi tiag tiag.Cov txheej txheem no txo ​​cov peev txheej ntawm tus neeg tawm tsam kom tau txais tus nqi ntawm tus cwj pwm los ntawm lwm tus cwj pwm muaj txiaj ntsig hauv tib cov ntaub ntawv cov ntaub ntawv, tab sis cuam tshuam rau qhov tseeb ntawm cov ntaub ntawv uas tau tshwm sim, uas yog ib txwm nrog cov ntaub ntawv xeem ntau lawm.


Post lub sij hawm: Sep-27-2022