Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy protection method based on data confusion between users and terminal data aggregation system

A privacy protection and data aggregation technology, applied in digital transmission systems, transmission systems, user identity/authority verification, etc., can solve problems such as complex implementation process, link failure, high computing overhead and network requirements, and achieve data privacy protection Effect

Active Publication Date: 2019-09-13
XIDIAN UNIV
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] To sum up, the problems existing in the existing technology are: the implementation process of the existing data aggregation process is complicated, the overhead is relatively large, and additional third-party equipment is required to assist, and no good solution has been proposed for the problem of partial link failure.
[0005] The difficulty of solving the above technical problems: the high computational complexity brought by homomorphic encryption technology can be reduced in the scheme based on secure multi-party computing, but there are still some problems that bring high computational overhead and network requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection method based on data confusion between users and terminal data aggregation system
  • Privacy protection method based on data confusion between users and terminal data aggregation system
  • Privacy protection method based on data confusion between users and terminal data aggregation system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0038] The implementation process of the existing data aggregation process is complicated, the cost is large, and additional third-party equipment is required to assist, and there is no good solution to the problem of partial link failure. The data aggregation privacy protection method adopted in the present invention is based on multi-party computing, and in the case that all users are semi-trusted, the idea of ​​mutual restriction is used to protect data privacy by mixing data between users.

[0039] The application principle of the present invention will be described in detail below in conjunction with the accompanying d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of data privacy protection, and discloses a privacy protection method based on data confusion between users and a terminal data aggregation system. Data aggregation is completed by participating in matching and data mixing between users. And the users are paired through an authentication center, and part of information segmented by the users is interacted for mixing and uploaded to an aggregation center for matching and aggregation. Each participant user is semi-trusted, and data aggregation is completed under the condition that individual information is not leaked. Compared with a homomorphic encryption data processing method, the method has the characteristic of simple calculation, the problem of aggregation failure caused by failure of a certain link is solved, and the aggregation of other parts is not influenced by local failure. Compared with a secure multi-party computing method, an additional server is not needed, it can be guaranteedthat an aggregation center is not conspired with users, and information leakage is prevented.

Description

technical field [0001] The invention belongs to the technical field of data privacy protection, and in particular relates to a privacy protection method based on data confusion between users and a terminal data aggregation system. Background technique [0002] At present, the closest existing technology: In the environment of explosive growth of data volume in today's network world, data aggregation is used in various fields. In the financial field, user account statistics and transaction audits require data aggregation. In the medical field, medical data needs In aggregation, in mobile spectrum sensing, cooperative sensing data also needs to use the data aggregation method for joint decision. Especially in wireless sensor networks, various types of data need to be collected at edge nodes and uploaded to the cloud for data aggregation. Sensors are usually power-limited, and nodes are limited by computation, communication, and power. Sensors need to cooperate within the netw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3236H04L63/0442
Inventor 李红宁陈杰雄裴庆祺
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products