Supercharge Your Innovation With Domain-Expert AI Agents!

Big data security privacy computing control method in super computing and cloud computing environment

A cloud computing environment and control method technology, applied in computer security devices, computing, digital data protection, etc., can solve the lack of integrity verification of data, the inability to obtain original data, and the inability to know whether the data is real or tampered with past and other issues

Active Publication Date: 2022-03-15
国家超级计算天津中心
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] One of the expected data usage methods is to provide a data trading platform. After different data providers encrypt and store the data in a centralized system, the system can provide a certain method to ensure the security and integrity of the data. Ensure that the data is invisible to other participants. Participants can only use the data to perform calculations based on an algorithm under authorized conditions and cannot obtain any original data
[0004] From the perspective of data security and integrity: In the existing technology, the transmission of data is usually encrypted, but the data stored centrally after transmission lacks the integrity verification during use, and the user who uses the data cannot know the data being used whether it is authentic or has been falsified;
[0005] From the perspective of algorithm debugging: the existing technology is usually based on a common platform for algorithm debugging. During the algorithm debugging process, the participants can get the original data through debugging, such as directly outputting the original data in the algorithm. To the command line window or write to a file, etc.; this method cannot guarantee the safety of the original data
[0006] From the perspective of the entire calculation process: the existing technology usually executes the algorithm in a shared environment. If the original data is directly output in the algorithm code, the original data will be leaked; Growth, ordinary computing power is difficult to meet computing needs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Big data security privacy computing control method in super computing and cloud computing environment
  • Big data security privacy computing control method in super computing and cloud computing environment
  • Big data security privacy computing control method in super computing and cloud computing environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0046] Big data security and privacy computing control methods in supercomputing and cloud computing environments, such as figure 1 shown, including the following steps:

[0047] Step 1. The original data provider sets the sample data rules, and the data administrator enters the sample data rules.

[0048] Step 2. The data administrator judges the data protection level of the original data according to the sample data rules.

[0049] Among them, different protection levels are set for the sensitivity of sensitive information in the original data.

[0050]Step 3. According to the data protection level determined in step 1 and according to the sample data generation system, the original data is desensitized and collected, and sample data is generated. Among them, the data protection level can choose a default desensitization method for certain sensitive info...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a big data security privacy computing control method in a super computing and cloud computing environment, which comprises the following steps of: performing data protection level judgment on original data through a sample data rule, performing desensitization acquisition on the judged original data by a generation system, and generating sample data; meanwhile, encrypting and transmitting to a secure storage system; if the data application side needs to use the data, a request needs to be made to a data administrator, and the data administrator needs to approve the request; debugging the approved sample data of the data application party in an algorithm debugging system, and generating an algorithm model; finally, the algorithm model is input into a cloud computing environment of a computing task execution system, trusted computing is carried out, and a data application party obtains computing result data. According to the method, the collected data can be ensured not to be tampered; and through comparison with the data fingerprint information on the block chain, it is ensured that data participating in calculation every time is real data which is not tampered.

Description

technical field [0001] The invention belongs to the field of supercomputer privacy and security control, in particular to a large data security and privacy calculation control method under supercomputing and cloud computing environments. Background technique [0002] With the vigorous development of the information age, informatization has produced more and more various types of data, such as health data collected for patients, browsing data using smart devices, and unknown images of personnel collected by electronic monitoring equipment; At present, these data are stored in the environment of each data collector. Since the data contains a large amount of user privacy information, it cannot be shared or used as a whole, so that the value of the data can be maximized. [0003] One of the expected data usage methods is to provide a data trading platform. After different data providers encrypt and store the data in a centralized system, the system can provide a certain method t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/62G06F21/64
CPCG06F21/604G06F21/64G06F21/6218
Inventor 庞晓磊张婷吴晓菲赵欣婷李长松王普杨晶李学智贾子傲张森乐刘嘉琦
Owner 国家超级计算天津中心
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More