Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Big data privacy retrieval method based on edge computing

An edge computing and big data technology, which is applied in the field of big data privacy retrieval based on edge computing, can solve problems such as data-intensive service computing and storage not proposed, inability to apply traditional management models, lack of data security, etc., to achieve Efficient information retrieval, reduced computing scale, and the effects of avoiding potential safety hazards

Active Publication Date: 2019-11-05
HUAQIAO UNIVERSITY
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, some necessary improvements and innovations have not been proposed for future-oriented computation and storage of data-intensive services based on edge and cloud interactions.
The main reason is the following factors: the solution used for cloud computing security may not be directly applicable after the introduction of edge computing. If the characteristics of the edge device close to the underlying network cannot be fully understood, the traditional management model cannot be applied to the new solution.
Secondly, whether it is security testing or information authentication, it is difficult to ensure its security performance if the main environment (that is, the cloud server) is not sure enough to be trusted.
In addition, the above methods still lack the consideration of the security of the data itself for the design of matching edge computing with the traditional sensor cloud network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Big data privacy retrieval method based on edge computing
  • Big data privacy retrieval method based on edge computing
  • Big data privacy retrieval method based on edge computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The present invention will be further described below through specific embodiments.

[0034] In order to ensure that users have complete control and management rights of private data, the method of large data privacy retrieval based on edge computing in the present invention makes full use of the advantages of edge and cloud, and constructs a "local-edge-cloud" layered storage and query system. Preprocess the data to be uploaded, that is, divide the data, decide the amount of data to be retained at each level based on semantic protection, and avoid the risk of content leakage by creating an implicit index structure locally and at the edge. By improving the traditional searchable encryption algorithm, a light-computing hybrid encryption mechanism is designed to be suitable for the cloud and edge collaborative work mode. In the process of retrieving data, the actual data content is hidden from the cloud and edge servers, thereby realizing privacy data protection.

[003...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A big data privacy retrieval method based on edge computing comprises the steps that (1) enabling a user side to calculate information entropy of a to-be-uploaded data file, and carrying out core dataextraction and storage; 2) uploading the non-core data to an edge end and constructing an implicit retrieval index; 3) presetting system parameters at the edge end, and performing structure hiding and re-division on the non-core data to obtain public part data and private part data; 4) encrypting the public part of data and uploading the encrypted public part of data to a cloud, wherein the cloudstores the encrypted public part of data; and 5) enabling the user side to initiate a retrieval application according to the keyword, enabling the edge side to generate a retrieval token according tothe keyword and the implicit retrieval index, enabling the cloud side to perform keyword matching retrieval after acquiring the retrieval token, returning a retrieval result to the edge side, and enabling the edge side to return the retrieval result to the user side. According to the method, the effectiveness, reliability and flexibility of the system in the storage and retrieval process can be ensured, and efficient and private data retrieval is achieved.

Description

technical field [0001] The invention relates to the field of data privacy protection in a big data network, in particular to a big data privacy retrieval method based on edge computing. Background technique [0002] Intelligent network infrastructure and high-capacity storage have been widely deployed in various types of environments, regardless of time and place, which has brought great benefits for users to collect and publish information through multiple platforms (such as smart devices, mobile terminals). convenient. Statistics and forecasts from the International Telecommunication Union Telecommunication Standards Body (ITU-T) show that by 2020, each person will generate 1.7 million pieces of data per second. There is no doubt that this new industrial wave, cloud computing, will help shape a new era of technological development and economic growth. The global expanded network market is expected to reach USD 9,336.2 million by 2050, with approximately 80% of enterprise...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/2457G06F16/2455G06F16/22G06F21/62
CPCG06F16/2457G06F16/2455G06F16/2291G06F21/6245G06F2221/2107
Inventor 王田沈雪微卢煜成曹芷晗柯浩雄
Owner HUAQIAO UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products