Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

240results about How to "Protect data privacy" patented technology

IoV (Internet of Vehicles) service cooperative computation method and system based on cloud end, edge end and vehicle end

The invention discloses an IoV (Internet of Vehicles) service cooperative computation method and system based on a cloud end, an edge end and a vehicle end, and belongs to the field of cloud computation and intelligent driving. According to the computation system and the computation method, firstly, a vehicle-mounted terminal responds to an IoV service request proposed by an IoV terminal application system. A cloud computation platform implements cooperative interactive computation with the vehicle-mounted terminal and an edge computation platform, and provides a service computation resource or a cloud service request by a cloud IoV service environment module. The edge computation platform implements cooperative interactive computation with the vehicle-mounted terminal and the cloud computation platform by an edge cooperative computation agent module, and takes charge of integrating feedback results of a delegation computation control environment module and an open computation controlenvironment module. According to the invention, the unilateral problems of insufficient computation ability of the vehicle end, limited computation resources of the edge end and large data delay of the cloud end are solved, computation efficiency is improved, and user experience is optimized.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Secret key updating method for cloud storage and implementation method of cloud data auditing system

The invention discloses a secret key updating method for cloud storage and an implementation method of a cloud data auditing system, and belongs to the technical field of network security. The secret key updating method for cloud storage comprises the steps that when a cloud user needs to update a secret key, a CA server is requested to generate a new secret key, and a new file label and a new data block label are generated based on a file label and a data block label downloaded from a cloud server, the old secret key and the new secret key at present, are uploaded to the cloud server, and are used for replacing the corresponding old file label and the corresponding old data block label in the cloud server. Meanwhile, the invention further discloses the implementation method of the cloud data auditing system on the basis of zero-knowledge verification. When the cloud user needs to update the secret key, the corresponding file label and the corresponding data block label on the cloud server are updated based on the secret key updating method for cloud storage. The secret key updating method for cloud storage and the implementation method of the cloud data auditing system are used in a cloud network, the communication cost, caused by changing of the secret key, between the cloud server and the cloud user can be remarkably reduced, the calculation cost of the operation that the cloud user calculates the labels again is reduced, and the data privacy can be effectively protected in the auditing process.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Identity-based privacy protection integrity detection method and system in cloud storage

ActiveCN107948143AReduce overheadReduce public key certificate management workUser identity/authority verificationThird partyData integrity
The invention discloses an identity-based privacy protection integrity detection method and system in a cloud storage. The method comprises the following steps of (1) a system initialization stage that a trusted third-party PKG generates a main private key and a public parameter; (2) a secret key extraction stage that the trusted third-party PKG generates a private key for a user according to useridentity; (3) a label generation stage that the user generates a data label for each data block by using the private key and uploads data and the corresponding data label to a cloud server; (4) a challenge inquiry stage that a verifier sends a challenge to the cloud server; (5) an evidence generation stage that the cloud server computes an integrity evidence according to challenge information andreturns the integrity evidence to the verifier; and (6) a verification stage that the verifier verifies the data integrity according to the evidence. According to the method and the system, the public key certificate management and calculation cost of the system is reduced based on an identity signature, and meanwhile, the identity privacy and the data privacy of the user are protected in a process of verifying the data integrity, and the safety of the system is improved.
Owner:ANHUI UNIVERSITY

A privacy protection data publishing method based on conditional probability distribution

The invention belongs to the technical field of information security and privacy protection, and is a privacy protection data publishing method based on conditional probability distribution. Accordingto the conditional probability distribution, an attacker's prior knowledge is modeled so that the attacker has different prior knowledge in different transactions. Then using the constructed model and quasi-identifier attribute value, the sensitive attribute value of each record is predicted, and the original value is replaced with the predicted value, and then published. There is no direct correlation between the predicted values of the published sensitive attributes and the original values, which effectively protects the privacy of user data. The predicted distribution of sensitive attribute values is similar to the real distribution, which effectively controls the distribution error and ensures the availability of the published dataset better than that of the generalized and stochasticresponse method. The invention can provide privacy protection mechanism for data release in various social fields such as medical treatment, finance, credit generation, transportation and the like, and provides support for application of data in scientific research and social service while protecting user data privacy.
Owner:FUDAN UNIV

Incentive method and system for hierarchical federated learning under end-side cloud architecture and complete information

The invention discloses an incentive method and system for hierarchical federated learning under an end-side cloud architecture and complete information. The method comprises the following steps: establishing a three-layer game model among terminal equipment, an edge aggregator and a cloud server based on a Stackelberg game; enabling the terminal equipment to download the power data learning model in the cloud server through the edge aggregator; constructing a model evolution function based on a hierarchical federated learning algorithm; solving an optimal strategy of three parties by utilizing Nash equilibrium, so the utility of the terminal equipment, the utility of the edge aggregator and the utility of the cloud server are maximized; enabling the terminal terminal to send the model updated based on the optimal strategy to the edge aggregator, enabling the edge aggregator to carry out excitation issuing on the terminal device based on the optimal strategy and sending the aggregated model to the cloud server; and enabling the cloud server to carry out excitation issuing on the edge aggregator based on the optimal strategy and carry out re-aggregation on the model. According to the invention, rewards can be provided for the terminal equipment and the edge aggregator, and reasonable and fair income distribution is realized.
Owner:TIANJIN UNIV

Hybrid cloud-oriented multi-keyword Top-k ciphertext retrieval method and system of privacy protection

The invention discloses a hybrid cloud-oriented multi-keyword Top-k ciphertext retrieval method and system of privacy protection. The method and system mainly solve the problem that retrieval efficiency is low. A scheme thereof includes: utilizing correlation relationships among keywords by a data providing end to generate a keyword dictionary sequence through clustering technology; and generatinga high-dimensional document vector and low-dimensional document filtering vectors by each document, then outsourcing ciphertext documents and encrypted document vectors to an unauthentic public cloudserver, and storing the plaintext document filtering vectors to an authentic private cloud server. In retrieval, a candidate document set is firstly calculated through the private cloud server, and then retrieval result Top-k document calculation is realized through the public cloud server. Aggregation characteristics of the correlation keywords in the keyword dictionary sequence improve a filtering effect of the private cloud server, and compress a size of the candidate document set. According to the method, a process is simple, security is high, realization is easy, and highly-efficient multi-keyword ciphertext retrieval processing can be realized in a hybrid-cloud environment through lower calculation overheads.
Owner:NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products