Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure use method of privacy data in cloud computation

A private data and cloud computing technology, which is applied in computer security devices, computing, electronic digital data processing, etc., can solve the problems of loss of user privacy data, failure to provide settings and management, loss of data consistency between end users and servers, etc. To achieve the effect of preventing illegal use and dissemination

Active Publication Date: 2015-02-25
北京外企人力资源服务有限公司
View PDF3 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

According to the analysis of the US Electronic Privacy Information Center (EPIC), Google's new privacy policy only considers the protection of data, but does not provide settings and management for the use of private data and the exposure of various products, which cannot correctly reflect the user's privacy. privacy needs and may conflict with local laws
In September 2014, Apple's iCloud service lost a large amount of private data of users due to data inconsistency between the end user and the server.
[0004] To sum up, the existing methods are relatively effective for the security of end-to-end information transmission, but in the environment of multi-party service interaction, sharing and evolution, especially in the cloud computing environment, it is impossible to guarantee the security of user privacy information. safe use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure use method of privacy data in cloud computation
  • Secure use method of privacy data in cloud computation
  • Secure use method of privacy data in cloud computation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The specific implementation manners of the present invention will be further described in detail below in conjunction with the drawings and examples.

[0052] A method for safely using private data in cloud computing proposed by the present invention, its specific implementation steps include: classification of user private data, detection of exposure chains and key private data, protection of discrete private data and protection of continuous private data, After the detection of the exposure chain and key privacy data in the first stage and the reorganization of the exposure chain and key privacy data as the root node in the second stage, the continuous privacy data is converted into discrete privacy data to achieve the result of protecting the user's personal privacy information .

[0053] A method for safely using private data in cloud computing proposed by the present invention, the key links and application diagrams in its specific implementation steps are sh...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a secure use method of privacy data in cloud computation. The secure use method is characterized by comprising the basic steps of classification of the privacy data of a user, detection of an exposed chain and the key privacy data, protection of the discrete privacy data and protection of the continuous privacy data. Through detection of the exposed chain and the key privacy data in the first stage and recombination with the exposed chain and the key privacy data as root nodes in the second stage, the continuous privacy data are converted into the discrete privacy data, and then personal privacy information of the user is protected. The requirement of the user is met through decomposition and combination of the privacy data without exposing a discrete privacy data chain of the sensitive privacy information of the user, and therefore the method can effectively guarantee the secure use of the privacy information of the user in a multiparty interactive sharing and evolving system.

Description

technical field [0001] The invention belongs to the technical field of user privacy information protection of interactive sharing and evolution systems, and in particular relates to a method for safely using private data in cloud computing. Background technique [0002] With the emergence of big data, cloud computing, as a computing platform, provides conditions for adapting to the evolving system structure and real-time processing of big data. Fast scaling, charging based on use, and a series of features such as virtualization, distribution, multi-tenancy, and service outsourcing. As a new computing model for serving users, it has become a research hotspot in the industry. However, the cloud architecture is complex and usually requires cross-organizational service composition, and different organizations and heterogeneous service participants bring huge challenges to meet user privacy data security and privacy. The intermediate operation process of the cloud service provid...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L67/10G06F21/6218G06F21/6245H04L67/567
Inventor 柯昌博陈丹伟肖甫王汝传
Owner 北京外企人力资源服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products