International Business Machines Corporation
Maintaining data protection compliance and data inference from data degradation in cross-boundary data transmission using containers
Last updated:
Abstract:
A computer-implemented method includes: receiving, by a computing device, a container from a data requester server for processing data as part of an inference analysis; attaching, by the computing device, an input data volume and an output data volume associated with the container; processing, by the computing device, input data stored in the input data volume to produce output data; attaching, by the computing device, the output data in the output data volume; detaching, by the computing device, the input data volume based on attaching the output data to the output data volume; determining, by the computing device, whether sensitive data exists in the output data volume; and providing, by the computing device, the output data volume to the data requester server based on the determining that sensitive data does not exist in the output data volume.
Utility
5 Oct 2018
17 Aug 2021