Sensitive data protection method of industrial Internet based on cloud-fog collaboration

A technology for industrial Internet and sensitive data, applied in the field of industrial data protection, it can solve the problems of unrecoverable data and high storage pressure.

Active Publication Date: 2021-02-26
BEIJING UNIV OF TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to propose a method for protecting sensitive data in the industrial Internet based on cloud-fog collaboration. The improvement of this method is that distributed storage is used locally, and corresponding restrictions are added to RS, which not only solves the problem of high storage pressure on local devices and local device Faults lead to the problem that data cannot be recovered, and improve the efficiency of encoding and decoding, and reduce computing costs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensitive data protection method of industrial Internet based on cloud-fog collaboration
  • Sensitive data protection method of industrial Internet based on cloud-fog collaboration
  • Sensitive data protection method of industrial Internet based on cloud-fog collaboration

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0037] figure 1 It is a schematic diagram of the fog computing architecture, including the factory terminal equipment layer, the fog computing layer and the cloud computing layer. At the bottom is the factory terminal equipment layer, the main job of this layer is to collect data and upload it to the fog server. As the middle layer of the fog computing model, the fog computing layer plays a vital role in the transmission between the cloud computing layer and the fog device. Fog nodes in the fog computing layer have certain storage capacity and computing power. The introduction of fog computing can ease the cloud computing layer and improve work efficiency. The cloud computing layer has powerful storage capacity and computing power.

[0038] figure 2 It is a schematic diagram of the industrial sensitive data protection model in the present inventio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an industrial Internet sensitive data protection method based on cloud-mist collaboration, and the method designs an industrial sensitive data protection model. For industrial delay-sensitive data, a data protection scheme based on Adaboost and local differential privacy is designed, which protects sensitive data on the basis of ensuring data availability; for industrial non-delay-sensitive, cloud storage-based data, A data protection scheme based on AES encryption and Reed‑Solomon coding is designed. This method adopts distributed storage locally and imposes corresponding restrictions on RS, which not only solves the problem of high storage pressure on local devices and failure of local devices resulting in unrecoverable data, but also improves encoding and decoding efficiency and reduces computing costs.

Description

technical field [0001] The invention relates to a sensitive data protection method based on fog-cloud combination applied in the industrial Internet, and belongs to the technical field of industrial data protection. Background technique [0002] In the process of industrial production, a large amount of sensitive data will be generated, including the manufacturing process of the production line, cost information of products, operation data, operation information and data, marketing strategies, intellectual property rights and customer data. Once these sensitive data are leaked, it may cause a significant loss of business and even damage to a company's reputation. In the context of the Industrial Internet, ensuring that sensitive information is not leaked is a major challenge currently. [0003] In actual industrial scenarios, some sensitive data needs to be processed in real time, such as data for predictive maintenance in current smart factories. If a CNC machine tool fai...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62G06K9/62
CPCG06F21/602G06F21/6218G06F18/214
Inventor 刘静原昌博赖英旭唐通宿骞赵子健薛德凡
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products