发明名称 Anonymization of data within a streams environment
摘要 Streams applications may decrypt encrypted data even though the decrypted data is not used by an operator. Operator properties are defined to permit decryption of data within the operator based on a number of criteria. By limiting the number of operators that decrypt encrypted data, the anonymous nature of the data is further preserved. Operator properties also indicate whether an operator should send encrypted or decrypted data to a downstream operator.
申请公布号 US8954723(B2) 申请公布日期 2015.02.10
申请号 US201213467593 申请日期 2012.05.09
申请人 International Business Machines Corporation 发明人 Branson Michael J.;Cradick Ryan K.;Santosuosso John M.;Schulz Brandon W.
分类号 H04L29/06;H04L9/00 主分类号 H04L29/06
代理机构 Patterson & Sheridan LLP 代理人 Patterson & Sheridan LLP
主权项 1. A non-transitory computer program product, comprising: a computer-readable storage medium having computer-readable program code embodied therewith, the computer-readable program code comprising: computer-readable program code configured to provide a plurality of processing elements comprising one or more operators, the operators configured to process streaming data tuples by operation of one or more computer processors; computer-readable program code configured to define attributes of the operators, wherein the attributes comprise at least an access indicator defining processing rules for tuples containing encrypted data; computer-readable program code configured to establish an operator graph of a plurality of operators, the operator graph defining at least one execution path in which a first operator of the plurality of operators is configured to receive data tuples from at least one upstream operator and transmit data tuples to at least one downstream operator; computer-readable program code configured to, upon receiving a first data stream having a first tuple containing encrypted data in the first operator, determine, based on the access indicator of the first operator, whether to decrypt the encrypted data in the first operator; computer-readable program code configured to, upon determining that the access indicator of the first operator permits decryption of the encrypted data based on a windowing condition existing within the first operator, decrypt the encrypted data, wherein the windowing condition is defined by the presence of both the first tuple and a predefined set of tuples within a window of the first operator during a predefined period of time; and computer-readable program code configured to transmit the first tuple to a second operator, downstream from the first operator.
地址 Armonk NY US