Anonymization of Streaming Data
First Claim
1. A method, comprising:
- receiving a data element (pi, si) of a data stream, where pi comprises an identifying portion and si comprises associated sensitive information;
assigning said identifying portion, pi, to a region Si of a partitioned space S;
encrypting said associated sensitive information si as e(si); and
storing said encrypted associated sensitive information e(si) in a list associated with said assigned region Si.
6 Assignments
0 Petitions
Accused Products
Abstract
Techniques are provided for anonymizing streamed data. In various embodiments data are anonymized by receiving a data element (pi, si) of a data stream, where pi comprises an identifying portion and si comprises associated sensitive information; assigning the identifying portion, pi, to a region Si of a partitioned space S; encrypting the associated sensitive information si as e(si); and storing the encrypted associated sensitive information e(si) in a list associated with the assigned region Si. Optionally a permutation function π randomizes the order that regions S1, S2, . . . , St in the partitioned space S are stored so that an adversary cannot obtain information by observing the data being stored in particular regions. The regions S1, S2, . . . , St have corresponding center points C1, C2, . . . , Ct, and a nearest center Ci to pi is optionally determined. The encrypted associated sensitive information e(si) may be stored in a list associated with the nearest center Ci.
-
Citations
22 Claims
-
1. A method, comprising:
-
receiving a data element (pi, si) of a data stream, where pi comprises an identifying portion and si comprises associated sensitive information; assigning said identifying portion, pi, to a region Si of a partitioned space S; encrypting said associated sensitive information si as e(si); and storing said encrypted associated sensitive information e(si) in a list associated with said assigned region Si. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system, comprising:
-
a memory; and at least one hardware device, coupled to the memory, operative to; receive a data element (pi, si) of a data stream, where pi comprises an identifying portion and si comprises associated sensitive information; assign said identifying portion, pi, to a region Si of a partitioned space S; encrypt said associated sensitive information si as e(si); and store said encrypted associated sensitive information e(si) in a list associated with said assigned region Si. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22)
-
Specification