Table 4.
Data desensitization and encryption policies of big data platform.
| Name of strategy | Scope of data involved | Design of desensitization and encryption policy |
| Digital data | Operating revenue, key quantity... | Fuzzy rounding method or fuzzy percentage method |
| Structured data of fixed length | Identification card number, telephone number, name... | Replace or encrypt from the starting bit to the end of the specified length range |
| Text data of varying length | Address, electronic medical record, descriptive diagnosis (infectious disease) | Locating sensitive content, then replace or encrypt sensitive characters |
| Image data | Radiological, ultrasonic and pathological imaging data | In image files, encryption algorithm is used for desensitization and watermarking is configured |
| File data | Genomics, molecular protein data | Locating sensitive content and rename sensitive characters |