Big data security and privacy computing control method in supercomputing and cloud computing environment

A cloud computing environment and control method technology, applied in computer security devices, computing, digital data protection, etc., can solve the problem of original data leakage, difficulty in meeting computing needs, and inability to know whether the data is real or tampered, etc. question

Active Publication Date: 2022-05-13
国家超级计算天津中心
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] One of the expected data usage methods is to provide a data trading platform. After different data providers encrypt and store the data in a centralized system, the system can provide a certain method to ensure the security and integrity of the data. Ensure that the data is invisible to other participants. Participants can only use the data to perform calculations based on an algorithm under authorized conditions and cannot obtain any original data
[0004] From the perspective of data security and integrity: In the existing technology, the transmission of data is usually encrypted, but the data stored centrally after transmission lacks the integrity verification during use, and the user who uses the data cannot know the data being used whether it is authentic or has been falsified;
[0005] From the perspective of algorithm debugging: the existing technology is usually based on a common platform for algorithm debugging. During the algorithm debugging process, the participants can get the original data through debugging, such as directly outputting the original data in the algorithm. To the command line window or write to a file, etc.; this method cannot guarantee the safety of the original data
[0006] From the perspective of the entire calculation process: the existing technology usually executes the algorithm in a shared environment. If the original data is directly output in the algorithm code, the original data will be leaked; Growth, ordinary computing power is difficult to meet computing needs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Big data security and privacy computing control method in supercomputing and cloud computing environment
  • Big data security and privacy computing control method in supercomputing and cloud computing environment
  • Big data security and privacy computing control method in supercomputing and cloud computing environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0046] Big data security and privacy computing control methods in supercomputing and cloud computing environments, such as figure 1 shown, including the following steps:

[0047] Step 1. The original data provider sets the sample data rules, and the data administrator enters the sample data rules.

[0048] Step 2. The data administrator judges the data protection level of the original data according to the sample data rules.

[0049] Among them, different protection levels are set for the sensitivity of sensitive information in the original data.

[0050]Step 3. According to the data protection level determined in step 1 and according to the sample data generation system, the original data is desensitized and collected, and sample data is generated. Among them, the data protection level can choose a default desensitization method for certain sensitive info...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a big data security and privacy computing control method in a supercomputing and cloud computing environment. The data protection level is determined for the original data through the sample data rules, and the determined original data generation system performs desensitization and collection on it, and generates a sample. At the same time, it is encrypted and transmitted to the safe storage system; if the data application party needs to use the data, it needs to make a request to the data administrator, and the data administrator needs to approve the request; after the approval, the sample data of the data application party is stored in the algorithm debugging system Debug in and generate an algorithm model; finally, input the algorithm model into the cloud computing environment of the computing task execution system to perform trusted computing, and the data application party obtains the calculation result data. The invention can ensure that the collected data will not be tampered with: by comparing with the data fingerprint information on the block chain, it can be ensured that the data participating in each calculation is real and untampered data.

Description

technical field [0001] The invention belongs to the field of supercomputer privacy and security control, in particular to a large data security and privacy calculation control method under supercomputing and cloud computing environments. Background technique [0002] With the vigorous development of the information age, informatization has produced more and more various types of data, such as health data collected for patients, browsing data using smart devices, and unknown images of personnel collected by electronic monitoring equipment; At present, these data are stored in the environment of each data collector. Since the data contains a large amount of user privacy information, it cannot be shared or used as a whole, so that the value of the data can be maximized. [0003] One of the expected data usage methods is to provide a data trading platform. After different data providers encrypt and store the data in a centralized system, the system can provide a certain method t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62G06F21/64
CPCG06F21/604G06F21/64G06F21/6218
Inventor 庞晓磊张婷吴晓菲赵欣婷李长松王普杨晶李学智贾子傲张森乐刘嘉琦
Owner 国家超级计算天津中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products