Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy protection method in edge computing environment

An edge computing and privacy protection technology, applied in the field of privacy protection, can solve problems such as a large amount of communication load and decoding complexity, and achieve the effect of reducing decoding complexity, computing delay, and communication load.

Pending Publication Date: 2020-05-08
SUZHOU UNIV
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most of the literature only considers the security of one party. M. J et al. considered the secure distributed matrix multiplication of confidential input, but did not consider the impact of falling behind. H. Yang et al. considered the use of polynomial codes (Polynomial Codes, PC ) to solve the confidentiality of both input parties and the impact of falling behind, but it brings a lot of communication load and decoding complexity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection method in edge computing environment
  • Privacy protection method in edge computing environment
  • Privacy protection method in edge computing environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0039] Embodiment: Provide a computing framework for secure coding edge computing based on orthogonal vectors. On the basis of ensuring data privacy and completing computing tasks, the method reduces communication load and user input by specially designing a coding scheme for user-side input data. The complexity of device decoding.

[0040] see figure 1 Shown is the flow chart of constructing edge computing based on secure coding.

[0041] Specific methods include:

[0042] A: Obtain the parameters of the network where the secure coding-based edge computing is located,

[0043] The parameters include:

[0044] A1: Edge device set W={w 1 ,w2 ,…,w p};

[0045] A2; Number of edge devices p ;

[0046] A3: Computing Task Scale m , n ;

[0047] A4: The number of partitions of the data matrix k ;

[0048] A5: Data Matrix Block A ;

[0049] A6: Input vector x ;

[0050] A7: User's computing tasks A x;

[0051] A8: Safety adjustment parameters s ;

[0052] A9: fi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a privacy protection method in an edge computing environment, which is realized based on security coding of an orthogonal vector and comprises the following steps: acquiring parameters of a network where security coding edge computing based on the orthogonal vector is located; partitioning input data of one side of a calculation task by using a task allocation algorithm, adding a random block code, and allocating to a corresponding edge node; calculating a base vector of a null space vector of the coding matrix, and sending a base vector of a part of null space to userequipment according to the parameter of the A; after a user inputs data, generating an online calculation demand and after receiving all intermediate results returned by edge nodes, enabling a user todecode the intermediate results by using the coefficient coding matrix to obtain a required result. In edge calculation based on security coding, privacy of both sides of calculation is protected byadopting linear coding and adding random blocks, and meanwhile, the random blocks added by a user side are designed by utilizing orthogonality of a null space vector, so that communication load and decoding complexity are reduced, and low-delay, efficient and safe edge calculation privacy protection is obtained.

Description

technical field [0001] The invention relates to the field of distributed edge computing, in particular to a privacy protection method realized by improving a security coding scheme in an edge computing environment. Background technique [0002] In recent years, with the rapid development of the Internet of Things and the popularization of 4G / 5G networks, the era of Internet of Everything has arrived. The explosive increase of network edge devices has made the traditional cloud-based centralized big data processing unable to efficiently process edge devices. generated data. Therefore, edge-based big data processing with the edge computing model as the core emerges as the times require, and has become a new research hotspot in the next generation network. To put it simply, edge computing is the extension of cloud computing to the edge. Compared with the massive computing power of the "cloud" brought by classic cloud computing, edge computing realizes the sinking of resources ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62
CPCG06F21/6245
Inventor 王进周伟李领治谷飞周经亚
Owner SUZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products