Anonymization of streaming data
First Claim
1. A method, comprising:
- receiving a data element of a data stream including a plurality of said data elements (pi, si), where pi comprises an identifying portion of an ith data element and si comprises an associated sensitive information portion of said ith data element;
obtaining, by at least one processing device, a partitioned space S including t regions S1, S2, . . . , St;
assigning, by at least one processing device, said identifying portion, pi, to a selected one of said regions;
encrypting, by at least one processing device, said associated sensitive information portion si as e(si); and
storing, by at least one processing device, said encrypted associated sensitive information portion e(si) in a non-transitory electronic memory device in a list associated with said selected region but not storing said associated identifying portion, pi, in said list after using said associated identifying portion, pi, to assign said associated identifying portion, pi, to said selected region.
6 Assignments
0 Petitions
Accused Products
Abstract
Techniques are provided for anonymizing streamed data. In various embodiments, data are anonymized by receiving a data element of a data stream including a plurality of said data elements (pi, si), where pi comprises an identifying portion and si comprises an associated sensitive information portion; obtaining a partitioned space S including t regions; assigning the identifying portion, pi, to a selected region; encrypting the associated sensitive information si as e(si); and storing the encrypted associated sensitive information e(si) in a list associated with the selected region but not storing the associated identifying portion, pi, in the list. The regions have corresponding center points, and a nearest center to pi is optionally determined. The encrypted associated sensitive information e(si) may be stored in a list associated with the nearest center.
-
Citations
22 Claims
-
1. A method, comprising:
-
receiving a data element of a data stream including a plurality of said data elements (pi, si), where pi comprises an identifying portion of an ith data element and si comprises an associated sensitive information portion of said ith data element; obtaining, by at least one processing device, a partitioned space S including t regions S1, S2, . . . , St; assigning, by at least one processing device, said identifying portion, pi, to a selected one of said regions; encrypting, by at least one processing device, said associated sensitive information portion si as e(si); and storing, by at least one processing device, said encrypted associated sensitive information portion e(si) in a non-transitory electronic memory device in a list associated with said selected region but not storing said associated identifying portion, pi, in said list after using said associated identifying portion, pi, to assign said associated identifying portion, pi, to said selected region. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system, comprising:
-
a memory; and at least one hardware processing device, coupled to the memory, operative to; receive a data element of a data stream including a plurality of said data elements (pi, si), where pi comprises an identifying portion of an data element and si comprises an associated sensitive information portion of said ith data element; obtain, by at least one processing device, a partitioned space S including t regions S1, S2, . . . , St; assign, by at least one processing device, said identifying portion, pi, to a selected one of said regions; encrypt, by at least one processing device, said associated sensitive information portion si as e(si); and store, by at least one processing device, said encrypted associated sensitive information portion e(si) in a non-transitory electronic memory device in a list associated with said selected region but not storing said associated identifying portion, pi, in said list after using said associated identifying portion, pi, to assign said associated identifying portion, pi, to said selected region. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A method for configuring a processing system to operate as a streaming data anonymization system, comprising:
-
configuring at least one processing system element to receive a data element of a data stream including a plurality of said data elements (pi, si), where pi comprises an identifying portion of an ith data element and si comprises an associated sensitive information portion of said ith data element; configuring at least one processing system element to obtain a partitioned space S including t regions S1, S2, . . . ,St; configuring at least one processing system element to assign said identifying portion, pi, to a selected one of said regions; configuring at least one processing system element to encrypt said associated sensitive information portion si as e(si); and configuring at least one processing system element to store said encrypted associated sensitive information portion e(si) in a non-transitory electronic memory device in a list associated with said selected region but not storing said associated identifying portion, pi, in said list after using said associated identifying portion, pi, to assign said associated identifying portion, pi, to said selected region. - View Dependent Claims (20, 21, 22)
-
Specification