Unlock instant, AI-driven research and patent intelligence for your innovation.

A Regulatory Data Privacy Sharing Method Based on Device-Edge-Cloud Collaboration

A data privacy and end-to-end technology, which is applied in the field of edge computing technology and blockchain, can solve problems that are not conducive to data privacy protection, and achieve the effect of protection from being leaked

Active Publication Date: 2021-06-25
ZHEJIANG LAB
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The blockchain is open to the entire network of the account book, and each node can participate in the consensus, which is not conducive to data privacy protection in essence.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Regulatory Data Privacy Sharing Method Based on Device-Edge-Cloud Collaboration
  • A Regulatory Data Privacy Sharing Method Based on Device-Edge-Cloud Collaboration

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0045] Traditional physical storage has problems such as resource dispersal and storage reliability cannot be guaranteed. Storage virtualization refers to the mapping of various scattered and heterogeneous storage devices into a logical storage space with unified and continuous addressing according to certain strategies, called It is a virtual storage pool and provides the access address of the virtual storage pool to the application system. Storage virtualization improves the reliability and availability of data through technologies such as data mirroring, data verification, and multipathing.

[0046] The Ceph cluster is the data storage part in this embodiment...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a supervised data privacy sharing method based on device-edge-cloud collaboration, aiming at data privacy sharing and supervision in a device-edge-cloud scenario, including: data cloud storage and metadata generation based on symmetric key encryption, based on The metadata of the distributed key of the alliance chain is uploaded to the chain, based on searchable and encrypted data supervision. The supervision methods include: envelope supervision and unpacking supervision. Envelope supervision is based on the consensus of all nodes , to confirm whether the user submits the metadata storage certificate within a certain period of time; the unpacking supervision obtains the user's metadata storage certificate, decrypts the stored data and obtains the plaintext of the data; the blockchain system is used to protect the user's private data Store evidence to protect data privacy from being leaked, and at the same time realize the supervision of data privacy sharing conditions.

Description

technical field [0001] The present invention relates to the fields of edge computing technology and block chain technology, in particular to a method for sharing certificate privacy based on terminal-edge-cloud collaboration. Background technique [0002] With the opening of the big data era, various industries and regions have invested a lot of manpower and material resources in the construction of data centers, and the application of big data continues to develop and popularize. The scale of various information systems is becoming more and more complex, the amount of data is increasing, and the types of data are increasing. Data forms are also becoming more and more diverse. In the construction of a big data platform, data resources usually include the data of the department, as well as the data of relevant cooperative departments and the public data of the Internet. With the continuous accumulation and use of data, the value of data is also increasing. How to use data sa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/06H04L29/06H04L9/32H04L29/08G06Q40/04
CPCH04L9/0816H04L9/085H04L9/0643H04L63/0435H04L9/321H04L63/123H04L67/104H04L67/1095G06Q40/04H04L9/50
Inventor 高丰郑欢欢孙爽王晓江郁善金杨涛
Owner ZHEJIANG LAB