Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for protecting privacy of cloud computed big data

A big data and cloud protection technology, applied in the field of cloud computing, can solve problems such as reducing system performance, and achieve the effects of improving processing efficiency, availability, and effectiveness

Inactive Publication Date: 2016-05-25
ZHEJIANG UNIV OF TECH
View PDF5 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The paper [WangC,WangQ,RenK,etal.Privacy-preservingpublicauditingfordatastoragesecurityincloudcomputing[C] / / INFOCOM,2014ProceedingsIEEE.IEEE,2014:page 1-9] proposes a privacy security scheme for protecting cloud data through public auditing. The external third party audits the process of data transmission, access and storage to protect the storage privacy of cloud data, which has good fairness. However, due to the addition of third-party audit institutions and the formulation, implementation and revision of audit rules, the system will reduce the performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting privacy of cloud computed big data
  • Method for protecting privacy of cloud computed big data
  • Method for protecting privacy of cloud computed big data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] The present invention is a method for protecting the privacy of cloud computing big data, and its specific implementation plan will combine a certain medical big data containing patient private information Describe in detail, including the following specific steps:

[0029] The first step is to learn from the idea of ​​data packet division in the TCP / IP communication protocol in the Internet, and logically divide the big data of cloud tenants into logical blocks. Each logical block contains the relevant identifiers of big data tenant owners and cloud storage service providers, Identity or address information as well as serial numbers, unique marks, privacy-critical data block marks, shared marks, etc.

[0030] In this example, It is a combination of big data composed of different data types, then choose to divide the data into blocks according to the type of data, that is, divide the logical data blocks according to the extension of the data file, such as pdf, rar, d...

Embodiment 2

[0047] The difference between this embodiment and Embodiment 1 is that in Step 1, another logical block method is adopted, that is, the medical big data in this example It is a certain type of complete data. Use the data block software ArcGIS to block the large data according to the fixed data byte size, such as 4M size.

[0048] The data blocks divided by data size are also identified for each data block. According to actual needs, each data block additionally contains some necessary identification information, such as serial number, identification number ID, logical sequence number , privacy key identifier , encrypted identification Wait.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for protecting the privacy of cloud computed big data. The method comprises the following specific steps of: firstly, blocking big data of a cloud tenant according to a logic sequence number; then encrypting part of key privacy data blocks; next, encrypting path mapping formed after data storage in the second step; and finally, encrypting cloud data storage path mapping in the third step by a data owner. Compared with the prior art, the method is more suitable for protecting the privacy of the cloud big data, and data blocking processing can greatly improve processing efficiency; validity of data safety processing is improved, and the problems of low efficiency and even unavailability, which are generated due to encryption and decryption aiming at the big data are avoided; blocked and distributed storage of privacy data solves the problem that an illegal service provider threatens the tenant due to the case of owning complete data; and blocked storage and data backup improve usability, safety and robustness of the big data in the cloud computing process.

Description

technical field [0001] The invention belongs to the field of cloud computing, relates to content and methods of cloud computing data processing, encryption, storage and privacy protection, and can be used for safe storage and privacy protection of data in cloud computing. Background technique [0002] The security and privacy protection of cloud data, especially cloud big data, has been a frontier research hotspot in the field of cloud computing in recent years. Data privacy and security in cloud computing, especially the security of big data privacy, is a key issue for cloud tenants to consider. Some potential cloud computing tenants, such as scientific research institutions, government agencies and commercial institutions (especially banks and medical institutions that hold Business organizations with sensitive big data) should be vigilant enough when choosing cloud computing services. Once commercial users use cloud computing services provided by private institutions on ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0421H04L63/0428H04L67/1097
Inventor 程宏兵陈彦艇宁一笑钱漫匀
Owner ZHEJIANG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products