Cross-domain data security interconnection method and system based on federated learning

A data security and interconnection system technology, applied in the field of data interaction, can solve the problems of joint combat data islands, difficulty in systematization, and difficulty in data security sharing

Pending Publication Date: 2020-09-15
CHINA ACADEMY OF ELECTRONICS & INFORMATION TECH OF CETC
View PDF2 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, since platforms and systems in different combat domains are mostly developed by different departments or institutions, the security interconnection and deep coordination with other domain operations were not considered in detail at the beginning of the design, resulting in safe data sharing between different combat domains Faced with many difficulties; in addition, in the joint combat scenario, each combat domain is at the forefront of the confrontation between the enemy and the enemy, affected by factors such as the rapidly changing battlefield environment, intermittent communication links, sensitive interactive information and easy to be attacked by the enemy, joint operations still face challenges. There are serious data islands, difficulties in secure interconnection of cross-domain data, and difficulties in systemic performance.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cross-domain data security interconnection method and system based on federated learning
  • Cross-domain data security interconnection method and system based on federated learning
  • Cross-domain data security interconnection method and system based on federated learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to further explain the technical means and functions adopted by the present invention to achieve the intended purpose, the present invention will be described in detail below in conjunction with the accompanying drawings and preferred embodiments.

[0051] In order to solve the problem of data security sharing between different combat domains in a joint combat scenario, the present invention proposes a federated learning-based cross-domain data security interconnection method and system.

[0052] It should be noted that federated learning is a machine learning framework, which means that multiple clients cooperate to train models under the coordination of a central server or service provider, and complete model training without exchanging data between clients. And continuously improve the learning effect.

[0053] The cross-domain data security interaction system based on federated learning according to the embodiment of the present invention includes a third-p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a cross-domain data security interconnection method and system based on federated learning, being characterized in that a federated learning concept is expanded to the field ofcross-domain data sharing in joint operation; under the condition that effective transverse information intercommunication cannot be carried out in each combat domain, through coordination of the third party trusted environment, the cooperative analysis of the combat situation and the execution of related combat tasks are completed by efficiently cooperating with each combat domain, and then the purpose that the original data of each combat domain cannot be locally transmitted is achieved, and the data transmission service and the data security interconnection are minimized, and the attack surface, the exposed surface and the network bandwidth of the combat data are effectively reduced, and the systematic performance of the joint combat is ensured; moreover, the combat domains and the third-party trusted environment only interact with the encrypted and signed models and parameters, so that data security interconnection among the combat domains is realized while data barriers among thecombat domains are broken through, and effective support is provided for cross-domain data security sharing in a joint combat process.

Description

technical field [0001] The present invention relates to the technical field of data interaction, in particular to a federated learning-based cross-domain data security interconnection method and system. Background technique [0002] Joint operations are an important form of future operations. In order to adapt to the increasingly complex combat styles and combat tasks in joint operations scenarios, the demand for data security interconnection and information sharing between different combat domains continues to increase. The data security interconnection channel transforms information advantages into operational advantages to ensure the systematic effectiveness of joint operations. [0003] Aiming at the problem of cross-domain data sharing faced by systematic joint operations, the U.S. Department of Defense and its major military enterprises are actively promoting the implementation of diversified cross-domain security solutions (Cross Domain Solution, CDS) and related prod...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/62G06F21/64G06F21/62
CPCG06F21/6218G06F21/64G06F18/214
Inventor 王蒙蒙王栋马建胡勋朱婉婷李杨罗鑫
Owner CHINA ACADEMY OF ELECTRONICS & INFORMATION TECH OF CETC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products