Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data security sharing method and system in untrusted environment

A data security and sharing system technology, applied in digital transmission systems, transmission systems, secure communication devices, etc., can solve the problems of lack of multi-data subject fusion technology pilot verification, difficulty in privacy leakage, and difficulty in taking into account the availability of data features, etc., to achieve protection Data privacy, avoiding risk of leakage, and solving the effect of data silos

Pending Publication Date: 2022-02-18
STATE GRID JIANGSU ELECTRIC POWER CO LTD MARKETING SERVICE CENT +1
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The encryption-based data security transmission method adopted in the power system is difficult to prevent such privacy leakage, and it is even more difficult to take into account the availability of data characteristics, and there is also a lack of pilot verification for multi-data subject fusion technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security sharing method and system in untrusted environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to make the object, technical solution and advantages of the present invention clearer, the technical solution of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. The embodiments described in this application are only some embodiments of the present invention, not all embodiments. Based on the spirit of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts all belong to the protection scope of the present invention.

[0033] Such as figure 1 As shown, the present invention proposes a data security sharing system in an untrusted environment, and the system mainly includes two parts: a central platform system and a front-end computer system.

[0034] The central platform system is deployed in a third-party trusted cloud. Front-end systems are deployed in the internal security areas of their res...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data security sharing system and method in an untrusted environment. The system comprises a central platform system and a front-end processor system; the central platform system is arranged in a third-party credible cloud, and the front-end processor systems are arranged in internal safe areas of all data owners; and the central platform system is responsible for performing communication and data transfer processing with each front-end processor system, and the front-end processor system is used as a connection intermediary system of the central platform system and the client system. Various privacy protection mechanisms including homomorphic encryption, secret sharing, differential privacy, a trusted execution environment and the like are provided, the risk of single-point privacy disclosure can be avoided through a centralized architecture, the multi-subject data analysis and mining process based on service requirements is met, under the non-trusted environment, safe and reliable fusion and data application of multi-party data are achieved, it is ensured that data provided by all parties are not leaked, and it is ensured that the data after safety protection can meet the service application requirements of all parties to the maximum extent.

Description

Technical field: [0001] The present invention relates to the field of data security sharing, in particular to a data security sharing method and system in an untrusted environment. Background technique: [0002] At present, multiple data subjects mainly include: State Grid Corporation, government agencies, and enterprises. The data of China Network Corporation is currently in its own internal network, and the data of government agencies and sensitive privacy-related data are also in In the government affairs or in the internal network built by the organization; the enterprise data is mainly in the enterprise, and the sensitive and privacy-related data are strictly stored in the enterprise. [0003] Even if multiple data subjects do not exchange specific data records, but only exchange the data statistical characteristics of each party, there is still a risk of leaking the data privacy of each party. Based on business needs, in the process of data analysis and mining, it is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/60G06F21/64G06F21/53H04L9/40H04L9/32H04L67/02
CPCG06F21/6245G06F21/602G06F21/64G06F21/53H04L63/20H04L63/0869H04L63/0807H04L63/045H04L9/3213H04L67/02G06F2221/2151
Inventor 祝宇楠范环宇单超邹云峰朱峰刘云鹏
Owner STATE GRID JIANGSU ELECTRIC POWER CO LTD MARKETING SERVICE CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products