Skip to main content
. 2022 Apr 13;10(4):e36481. doi: 10.2196/36481

Table 4.

Data desensitization and encryption policies of big data platform.

Name of strategy Scope of data involved Design of desensitization and encryption policy
Digital data Operating revenue, key quantity... Fuzzy rounding method or fuzzy percentage method
Structured data of fixed length Identification card number, telephone number, name... Replace or encrypt from the starting bit to the end of the specified length range
Text data of varying length Address, electronic medical record, descriptive diagnosis (infectious disease) Locating sensitive content, then replace or encrypt sensitive characters
Image data Radiological, ultrasonic and pathological imaging data In image files, encryption algorithm is used for desensitization and watermarking is configured
File data Genomics, molecular protein data Locating sensitive content and rename sensitive characters