Security data storage and computing method based on Internet of Things fog computing-edge computing

An edge computing and secure data technology, applied to secure communication devices and key distribution, can solve problems such as inability to guarantee data security, slow computing task processing speed, and large data volume

Active Publication Date: 2019-09-06
XIDIAN UNIV +1
View PDF15 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] The existing edge computing task assignment process cannot protect privacy and the randomness of computing task arrival; cannot guarantee data security during data transmission
At the same time, computing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security data storage and computing method based on Internet of Things fog computing-edge computing
  • Security data storage and computing method based on Internet of Things fog computing-edge computing
  • Security data storage and computing method based on Internet of Things fog computing-edge computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0095] In order to further understand the content, features and effects of the present invention, the following examples are given, and detailed descriptions are given below with reference to the accompanying drawings.

[0096] The structure of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0097] Such as figure 1 As shown, the method for secure data storage and computing based on fog computing-edge computing provided by the present invention comprises the following steps:

[0098] S101, collect the required data through the data collection module, and perturb the acquired data through a random perturbation function to realize localized differential privacy, and realize data security in the local area by encrypting at the fog node;

[0099] S102, the main control module uses the fog server to store the aggregated data through the data storage module;

[0100] S103, using the encrypted retrieval application to access ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of data storage and computing, and discloses a security data storage and computing method based on Internet of Things fog computing-edge computing. Localized Epsilon differential privacy is achieved through the data collection module, data encryption is achieved at fog nodes, and the safety of local area data is protected; the data storage module is used for storing encrypted data and protecting the privacy of the data on the fog server; the data access module is used for realizing data security decryption and protecting data information security sharing; the distribution module uploads own distribution task to the scheduler, so that the privacy of the computing terminal can be effectively protected; meanwhile, the computing tasks are decomposedthrough the task processing module, and parallel computing is conducted on the multiple decomposed computing subtasks. According to the invention, while the processing speed of the computing task isimproved, the data security and data privacy of the whole system are ensured.

Description

technical field [0001] The invention belongs to the technical field of data storage and computing, and in particular relates to a secure data storage and computing method based on fog computing-edge computing of the Internet of Things. Background technique [0002] The Internet of Things is an important part of the new generation of information technology. It uses radio frequency identification (RFID), infrared sensors, global positioning systems, laser scanners and other information sensing devices to connect any item to the Internet according to the agreed protocol. , A network for information exchange and communication to realize intelligent identification, positioning, tracking, monitoring and management of items. [0003] At present, the Internet of Things industry has achieved remarkable results in core technology research and development and industrialization, key standard research and formulation, industrial chain establishment and improvement, major application demo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04L9/08H04L29/08
CPCH04L9/008H04L9/0869H04L67/1097H04L67/12
Inventor 陈艳格平源兰雷张永马慧李萌
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products