Method for protecting privacy in convex quadratic programming outsourcing on basis of affine transformation

Active Publication Date: 2014-09-17
BEIJING UNIV OF POSTS & TELECOMM
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditional outsourcing computing protects the security of plaintext information through administrative means such as strict control of information dissemination channels and confidentiality agreements, and does not perform corresponding confidentiality processing during data transmission. This privacy protection method is not suitable for emerging platforms such as public cloud platforms. outsourced computing platform

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting privacy in convex quadratic programming outsourcing on basis of affine transformation
  • Method for protecting privacy in convex quadratic programming outsourcing on basis of affine transformation
  • Method for protecting privacy in convex quadratic programming outsourcing on basis of affine transformation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Below in conjunction with accompanying drawing, the present invention is described in further detail:

[0027] At present, when users solve scientific computing problems such as convex quadratic programming, due to the complexity of the real problems, the scale is usually large, which exceeds the processing capacity of the PC, and requires users to spend a lot of money to build computing clusters and require dedicated personnel to maintain equipment. With the popularization of public cloud platforms and the concept of pay-as-you-go, the outsourcing of scientific computing tasks has great market potential, and the privacy and security of users is one of the many problems that need to be solved. The protection method of the present invention based on the affine transformation of the convex quadratic programming outsourcing calculation provides such a safety protection mechanism, the coordinate system of the original problem is converted to another domain through the affine...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for protecting privacy in convex quadratic programming outsourcing on the basis of affine transformation and belongs to the field of calculation outsourcing. The method includes that steps that (1) a user side inputs calculation parameters; (2) encrypted calculation parameters are formed by randomly generating a matrix and hiding parameter information through affine transformation; (3) the encrypted calculation parameters are transmitted to an outsourcing side; (4) the outsourcing side receives the encrypted calculation parameters transmitted by the user side, a solver is selected for calculation, and a calculation result is returned to the user side; (5) the user side receives the calculation result returned by the outsourcing side; (6) an optimal solution is obtained by decrypting the calculation result, and calculation is finished.

Description

technical field [0001] The invention belongs to the field of computing outsourcing, and in particular relates to a method for protecting privacy in convex quadratic programming outsourcing based on affine transformation, which ensures the security of user privacy information in outsourcing computing tasks. Background technique [0002] With the rapid development of public cloud platform technology, public cloud can provide users with massive computing power and storage space. At the same time, its advanced virtualization technology and elastic computing power can effectively reduce user construction costs and operation and maintenance costs, providing a A complete pay-as-you-go operating model. More and more users choose to transfer locally running programs and stored information from the local to the public cloud platform, which effectively reduces business costs and greatly improves user work efficiency. [0003] However, the most important factor affecting the widespread...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 苏森双锴桂俪文王皘徐鹏王玉龙
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products