Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Supervisable data privacy sharing method based on end-side cloud collaboration

A data privacy, end-to-end technology, applied in the field of edge computing technology and blockchain, can solve problems that are not conducive to data privacy protection, and achieve the effect of protection from being leaked

Active Publication Date: 2021-05-04
ZHEJIANG LAB
View PDF8 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The blockchain is open to the entire network of the account book, and each node can participate in the consensus, which is not conducive to data privacy protection in essence.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Supervisable data privacy sharing method based on end-side cloud collaboration
  • Supervisable data privacy sharing method based on end-side cloud collaboration
  • Supervisable data privacy sharing method based on end-side cloud collaboration

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047]Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0048] Traditional physical storage has problems such as resource dispersal and storage reliability cannot be guaranteed. Storage virtualization refers to the mapping of various scattered and heterogeneous storage devices into a logical storage space with unified and continuous addressing according to certain strategies, called It is a virtual storage pool and provides the access address of the virtual storage pool to the application system. Storage virtualization improves the reliability and availability of data through technologies such as data mirroring, data verification, and multipathing.

[0049] The Ceph cluster is the data storage part in this embodiment,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a supervisible data privacy sharing method based on end-side cloud collaboration, which aims at data privacy sharing and supervision in an end-side cloud scene and comprises the steps of data cloud storage based on symmetric key encryption and generation of metadata, uplink of metadata based on a distributed key of an alliance chain and data supervision based on searchable encryption. Supervision modes include envelope supervision and unsealing supervision, and the envelope supervision confirms whether a user submits a storage voucher of metadata within a certain time or not under the condition of consensus of all nodes; if unsealing supervision is carried out, a metadata storage voucher of a user is obtained, stored data is decrypted, and a data plaintext is obtained; and the block chain system is used for storing private data of the user, protecting data privacy from being leaked, and realizing supervision under a data privacy sharing condition.

Description

technical field [0001] The present invention relates to the fields of edge computing technology and block chain technology, in particular to a method for sharing certificate privacy based on terminal-edge-cloud collaboration. Background technique [0002] With the opening of the big data era, various industries and regions have invested a lot of manpower and material resources in the construction of data centers, and the application of big data continues to develop and popularize. The scale of various information systems is becoming more and more complex, the amount of data is increasing, and the types of data are increasing. Data forms are also becoming more and more diverse. In the construction of a big data platform, data resources usually include the data of the department, as well as the data of relevant cooperative departments and the public data of the Internet. With the continuous accumulation and use of data, the value of data is also increasing. How to use data sa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/06H04L29/06H04L9/32H04L29/08G06Q40/04
CPCH04L9/0816H04L9/085H04L9/0643H04L63/0435H04L9/321H04L63/123H04L67/104H04L67/1095G06Q40/04H04L9/50
Inventor 高丰郑欢欢孙爽王晓江郁善金杨涛
Owner ZHEJIANG LAB
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products