Privacy calculation method based on distributed storage

A technology of distributed storage and computing methods, applied in computing, encryption devices with shift registers/memory, computer security devices, etc., can solve problems such as low transmission efficiency, high storage costs, data leakage, etc., and achieve guaranteed storage Security, ensuring data and code security, and reducing the effect of code and data leakage

Pending Publication Date: 2022-03-08
HANGZHOU VASTCHAIN TECH CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the existing privacy computing technology, for secure multi-party computing, it is necessary to save the data of the participants on the local or centralized server, which has the problems of high storage cost and low transmission efficiency; while for trusted computing, Most of them adopt content-addressable, versioned, peer-to-peer hypermedia distributed storage and transmission protocol blockchain schemes. For the data stored and transmitted on the blockchain, although the data can be prevented from being tampered with, it is also There is a risk of data leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy calculation method based on distributed storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0029] refer to figure 1 , the present invention discloses a privacy calculation method based on distributed storage, comprising the following steps:

[0030] Step 1. The data provider obtains the first encryption key from the key management server, and encrypts the data according to the first encryption key; uploads the encrypted data to the distributed storage blockchain;

[0031] Step 2, when the code provider requests the second encryption ke...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a privacy computing method based on distributed storage, and the method comprises the steps: obtaining a secret key through a KMS server, encrypting data and a code, and then uploading the data and the code to a distributed storage block chain; a data requester requests the encrypted data and codes, and authorization information is recorded after the request is passed; the KMS server receives the task, the calculation party receiving the task confirms the authorization information again to the KMS server, the authorization information is ensured to be accurate, and the calculation party is arranged to prevent the data requester from directly contacting the code and the data and reduce the possibility of leakage of the code and the data; and the data is uploaded to the distributed storage block chain for encrypted storage, so that the storage security of the data and the codes can be ensured, and the data and the codes are prevented from being tampered.

Description

technical field [0001] The invention belongs to the technical field of computers, and in particular relates to a privacy computing method based on distributed storage. Background technique [0002] At present, the main solutions of privacy computing technology can be divided into two categories, one is secure multi-party computing, the data is stored locally in each participant, and the related primitives of cryptography are used for secure computing; the other is trusted computing, which is similar to Trusted third-party computing, by encrypting and transmitting data to a trusted execution environment, decryption and calculations are performed in the trusted execution environment. [0003] In the existing privacy computing technology, for secure multi-party computing, it is necessary to save the data of the participants on the local or centralized server, which has the problems of high storage cost and low transmission efficiency; while for trusted computing, Most of them ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/64H04L9/06H04L9/40
CPCG06F21/602H04L63/0435G06F21/64H04L9/0643
Inventor 滕海明罗骁陈柏臻程希冀周丹丹赵刚
Owner HANGZHOU VASTCHAIN TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products