Unlock instant, AI-driven research and patent intelligence for your innovation.

Practical cloud privacy protection outsourcing computing system and computing method thereof

A privacy protection and computing system technology, applied in transmission systems, digital transmission systems, and key distribution, which can solve the problems of unilateral information leakage to adversaries and vulnerability to unilateral channel attacks.

Active Publication Date: 2019-10-15
FUZHOU UNIV
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

TEE is vulnerable to unilateral channel attacks and the possibility of unilateral information leakage to adversaries in the security domain

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Practical cloud privacy protection outsourcing computing system and computing method thereof
  • Practical cloud privacy protection outsourcing computing system and computing method thereof
  • Practical cloud privacy protection outsourcing computing system and computing method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0039] It should be pointed out that the following detailed description is exemplary and intended to provide further explanation to the present application. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs.

[0040] It should be noted that the terminology used here is only for describing specific implementations, and is not intended to limit the exemplary implementations according to the present application. As used herein, unless the context clearly dictates otherwise, the singular is intended to include the plural, and it should also be understood that when the terms "comprising" and / or "comprising" are used in this specification, they mean There are features, steps, operations, means, components and / or combinatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a practical cloud privacy protection outsourcing computing system (ATOM) and a computing method thereof. A user can safely acquire outsourcing storage data on a single cloud server and quickly perform safe data processing operation. Specifically, the invention provides an ATOM computing system on the premise that a cloud server is provided with a plurality of trusted units(TPU) for the first time, but the TPU faces the harm of side channel attacks. In an ATOM system, the present invention designs two special fast processing kits that allow a user to obtain both secureinteger calculations and secure floating-point calculations to combat the harm of TPU side-channel attacks. In addition, the ATOM system ensures that the access mode is not leaked while performing data processing and acquiring the private information of the user.

Description

technical field [0001] The invention relates to the field of network security, in particular to a practical cloud privacy protection outsourcing computing system and a computing method thereof. Background technique [0002] IoT devices embedded in electronics, network links and other hardware such as sensors are able to connect to the network and recognize other devices. As the number of IoT devices continues to increase, a large amount of data generated needs to be stored in the corresponding devices. According to IDC research, the number of Internet of Things devices connected to the network will reach 80 billion by 2025, and will help generate 180 terabytes of new data every year. Of this, nearly a quarter of the data will be created in real-time, and 95 percent will be real-time data from the Internet of Things. With the generation of a large amount of real-time data, it is impossible to store and analyze the relevant properties of data in time for IoT devices with lim...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L9/08
CPCH04L9/0838H04L9/085H04L9/0869H04L63/0407H04L67/10H04L2212/00
Inventor 刘西蒙李家印郭文忠杨旸刘耿耿
Owner FUZHOU UNIV