Real-time anonymization
Abstract:
Techniques are described for real time anonymization. In one example, a first a first query associated with a table is received, the table associated with a first anonymization operation satisfying satisfies a privacy requirement. The first anonymization operation is applied at runtime to generate a first anonymized data set against which the first query is executed. At T2 after T1, a subsequent query is received. A determination is made as to whether a change to the table has occurred since T1. If so, a determination is made as to whether the first anonymization operation satisfies the privacy requirement as applied to the current table. If the operation does not satisfy the privacy requirement when applied to the current table, a second anonymization operation satisfying the defined privacy requirement is determined and applied at runtime to generate a second anonymized data set against which the subsequent query can be executed.
Information query
Patent Agency Ranking
0/0