CODE ANALYSIS FOR PROVIDING DATA PRIVACY IN ETL SYSTEMS
1 Assignment
0 Petitions
Accused Products
Abstract
In an approach for providing data privacy in information integration systems, a method performed during compilation of an information integration job receives information regarding a data flow structure of the job to be executed, said data flow structure comprising at least one source system, one or more target entities, and at least one operator for modifying output data provided by the source system. The method determines data exit points at which output data are provided to the target entities and determines at least one non-trusted target entity. The method determines, for each non-trusted target entity, if at least one data field included in the output data provided to the non-trusted target entity is classified as sensitive information, and, if so, modifies the information integration job by including a masking operator directly before a data exit point associated with the non-trusted target entity in order to mask said sensitive information.
-
Citations
20 Claims
-
1-13. -13. (canceled)
-
14. A data processing system comprising a storage entity and a processing entity, the data processing system being configured to process an information integration job, the data processing system being further configured to:
-
receive, during compilation of said information integration job, information regarding a data flow structure of an information integration job to be executed, said data flow structure comprising at least one source system, one or more target entities, and at least one operator for modifying output data provided by the at least one source system; determine, during compilation of said information integration job, a set of data exit points at which the output data are provided to the one or more target entities; determine, during compilation of said information integration job, at least one non-trusted target entity of the one or more target entities; determine, during compilation of said information integration job, for each non-trusted target entity, if at least one data field included in the output data provided to the non-trusted target entity is classified as sensitive information; and if at least one field included in the output data provided to a non-trusted target entity is classified as sensitive information, modify the information integration job by including a masking operator directly before a data exit point associated with the non-trusted target entity in order to mask said sensitive information. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A computer readable storage medium comprising computer readable instructions which, when executed by a processor of a data processing system, cause the processor to execute a method for providing data privacy in an information integration system, the method performing during compilation of an information integration job the steps of:
-
receiving information regarding a data flow structure of an information integration job to be executed, said data flow structure comprising at least one source system, one or more target entities, and at least one operator for modifying output data provided by the at least one source system; determining a set of data exit points at which the output data are provided to the one or more target entities; determining at least one non-trusted target entity of the one or more target entities; determining, for each non-trusted target entity, if at least one data field included in the output data provided to the non-trusted target entity is classified as sensitive information; and if at least one data field included in the output data provided to the non-trusted target entity is classified as sensitive information, modify the information integration job by including a masking operator directly before a data exit point associated with the non-trusted target entity in order to mask said sensitive information. - View Dependent Claims (20)
-
Specification