CN111639343A - Passenger flow analysis method and system based on trusted execution environment - Google Patents

Passenger flow analysis method and system based on trusted execution environment Download PDF

Info

Publication number
CN111639343A
CN111639343A CN202010488620.XA CN202010488620A CN111639343A CN 111639343 A CN111639343 A CN 111639343A CN 202010488620 A CN202010488620 A CN 202010488620A CN 111639343 A CN111639343 A CN 111639343A
Authority
CN
China
Prior art keywords
analysis program
execution environment
trusted execution
participant
vote
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010488620.XA
Other languages
Chinese (zh)
Inventor
马金凤
马凤娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Zhizhiyanqi Technology Co ltd
Original Assignee
Chongqing Zhizhiyanqi Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Zhizhiyanqi Technology Co ltd filed Critical Chongqing Zhizhiyanqi Technology Co ltd
Priority to CN202010488620.XA priority Critical patent/CN111639343A/en
Publication of CN111639343A publication Critical patent/CN111639343A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/25Fusion techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/25Fusion techniques
    • G06F18/259Fusion by voting

Abstract

The invention relates to the field of online service, in particular to a passenger flow analysis method and a passenger flow analysis system based on a trusted execution environment, wherein the passenger flow analysis method comprises the steps of establishing the trusted execution environment and running an analysis program in the trusted execution environment; each participant respectively verifies whether the analysis program is credible; each participant votes for a verification result; when the credible vote of the analysis program is larger than the incredible vote, the participant who carries out the incredible vote quits; and the rest participants encrypt the data and send the data to the analysis program.

Description

Passenger flow analysis method and system based on trusted execution environment
Technical Field
The invention relates to the field of information security, in particular to a passenger flow analysis method and system based on a trusted execution environment.
Background
When each merchant replies for user analysis and marketing, it is often desirable to obtain peer data for analysis together to maximize the effect. But the user data or the own passenger flow data belong to secrets. Merchants tend to forego analysis to ensure that secrets are not compromised.
Therefore, a system is needed in which each merchant provides data for summary analysis, and only the analysis result is disclosed, and each data is not leaked to other merchants, so as to improve the business effect.
Disclosure of Invention
The invention provides a passenger flow analysis method and system based on a trusted execution environment.
Some embodiments of the invention are implemented as follows:
a method of trusted execution environment based passenger flow analysis, comprising:
creating a trusted execution environment and running an analysis program within the trusted execution environment;
each participant respectively verifies whether the analysis program is credible;
each participant votes for a verification result; when the credible vote of the analysis program is larger than the incredible vote, the participant who carries out the incredible vote quits;
and the rest participants encrypt the data and send the data to the analysis program.
In one embodiment of the invention:
when the votes that the analysis program can trust are less than or equal to the untrustworthy votes;
all participants exit or shut down the analysis program.
In one embodiment of the invention:
the encryption is one of a multiplicative homomorphic encryption algorithm, an additive homomorphic algorithm, or a fully homomorphic algorithm.
In one embodiment of the invention:
the analysis program obtains passenger flow analysis results based on secure multiparty computation.
Some embodiments of the invention are implemented as follows:
a trusted execution environment based passenger flow analysis system, comprising:
the running module is used for creating a trusted execution environment and running an analysis program in the trusted execution environment;
the verification module is used for verifying whether the analysis program is credible or not by each participant;
the judgment module is used for voting for the verification result by each participant; when the credible vote of the analysis program is larger than the incredible vote, the participant who carries out the incredible vote quits;
and the sending module is used for encrypting the data by the rest participants and then sending the encrypted data to the analysis program. The technical scheme of the invention at least has the following beneficial effects:
the trusted execution environment is utilized, so that the high cost of searching for a trusted third party is avoided, and the trusted execution environment can easily acquire the technical support of a hardware party; after each party is authenticated for the second time, voting is carried out, so that the safety is further ensured, and simultaneously, an exit mechanism is provided, and the principles of fairness and volunteering are ensured; data are transmitted by adopting a ciphertext, so that the possibility of leakage is reduced to the maximum extent.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 illustrates a trusted execution environment based passenger flow analysis system according to some embodiments of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
It should be understood that "system", "device", "unit" and/or "module" as used herein is a method for distinguishing different components, elements, parts, portions or assemblies at different levels. However, other words may be substituted by other expressions if they accomplish the same purpose.
Flow charts are used in this description to illustrate operations performed by a system according to embodiments of the present description. It should be understood that the preceding or following operations are not necessarily performed in the exact order in which they are performed. Rather, the various steps may be processed in reverse order or simultaneously. Meanwhile, other operations may be added to the processes, or a certain step or several steps of operations may be removed from the processes.
Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Examples
Fig. 1 illustrates a trusted execution environment based passenger flow analysis system according to some embodiments of the present application.
The figure includes a plurality of participants 111(113, 135), a network 120, and a server 130 for running a trusted execution environment.
The participating party 111(113, 135) may refer to a node comprising a user terminal of a party or a cluster of user terminal devices belonging to a party and being connected to the access network via a network interface. Further, the participant may also be a single server or computer having computing resources, etc.
The network 120 may be a wired network, a wireless network, a mobile network, or the like.
The server 130 may include one or more sub-processing devices (e.g., CPUs).
In practical application, in order to reduce the distrust among all the participants, a safe third party can be used for analysis to obtain the passenger flow analysis result, but the trust is relative, and the sufficient security may also pay high cost. In the application, a scheme, namely a trusted execution environment, which is easy to implement and can be conveniently supported by a common user, is adopted.
A Trusted Execution Environment (TEE) is a secure area within a host processor. It runs in a separate environment and in parallel with the operating system. It ensures that the confidentiality and integrity of the code and data loaded in the TEE are protected. Trusted applications running in the TEE can access all functions of the device main processor and memory, while hardware isolation protects these components from user-installed applications running in the main operating system. Software and cryptographic isolation in the TEE protects different trusted applications from each other.
A trusted execution environment based passenger flow analysis system capable of running a trusted execution environment based passenger flow analysis method, the method comprising:
s1: creating a trusted execution environment and running an analysis program within the trusted execution environment; this step may be performed by the execution module.
A trusted execution environment is established in the CPU, for example, an SGX environment is established in the CPU of INTEL, and an analysis program is run in the SGX, specifically, the program is run in Enclave (memory protected area) in the SGX environment, and any secure or non-secure code cannot access data and code in Enclave, and can only be accessed by the processor itself, so as to ensure security.
The analysis program may include a set of algorithms to derive a passenger flow analysis based on the party data.
S2: each participant respectively verifies whether the analysis program is credible; this step may be performed by the verification module.
After the environment is determined to be safe, the program may also be specially compiled, resulting in data outflow. Therefore, each party verifies whether the analysis program is credible, in the verification mode, in this embodiment, a hash value can be calculated for the analysis program, the hash value is verified through the agreement achieved before analysis, and if the hash values are consistent, the analysis program can be considered credible; if not, the program may be subject to tampering.
S3: each participant votes for a verification result; this step may be performed by a decision module.
After verifying the hash value, the participant needs to vote on the result. When the credible vote of the analysis program is larger than the incredible vote, the participant who carries out the incredible vote quits; since a small percentage of participants think the program cannot be trusted, but the analysis is going to continue, the untrusted participant may opt out.
In some embodiments, rendering may also occur with a confidence not greater than the untrusted, so the vote that the parser is trustworthy is less than or equal to the untrusted vote; all participants exit or shut down the analysis program. Thereby protecting the security of each party's data.
S4: the rest participants encrypt the data and send the data to the analysis program; this step may be performed by the sending module.
When the environment and the program confirm no errors, the data can be shared for analysis.
It should be noted that, in order to further ensure data security, the data of the participating party is sent after being encrypted, and asymmetric encryption (like dynamic encryption) is generally used.
Further, the encryption is one of a multiplicative homomorphic encryption algorithm (e.g., ElGamal algorithm), an additive homomorphic algorithm (e.g., Paillier algorithm, Benaloh algorithm), or a fully homomorphic algorithm (e.g., Gentry algorithm). Wherein if f (a) + f (B) ═ f (a + B) is satisfied, we call this cryptographic function as additive homomorphism; if f (a) xf (B) f (a × B) is satisfied, we call this encryption function multiplication homomorphism. If an encryption function f only satisfies the addition homomorphism, only addition and subtraction operation can be carried out; if an encryption function f only satisfies the multiplication homomorphism, only multiplication and division operation can be carried out; if an encryption function satisfies both additive and multiplicative homologies, it is called fully homomorphic encryption. By utilizing the particularity of the encryption method, data analysis is carried out on the premise of not revealing data security.
S5: the analysis program obtains passenger flow analysis results based on secure multiparty computation.
The secure multi-party computing features include input privacy, computation correctness, and decentralization. Input privacy: the research of safe multi-party calculation is how each participant protects the private data of each participant during cooperative calculation, and the problem of privacy safety among all participants is mainly concerned, namely, in the process of safe multi-party calculation, the independent private input of each participant must be ensured, and no local data is leaked during calculation. And calculating correctness: and the multi-party calculation participating parties carry out cooperative calculation on a certain agreed calculation task through an agreed MPC protocol, and after the calculation is finished, the parties obtain correct data feedback. Decentralization: in the traditional distributed computing, a central node coordinates computing processes of users and collects input information of the users, in the safe multi-party computing, the positions of participants are equal, no privileged participant or third party exists, and a decentralized computing mode is provided.
The specific algorithm in the secure multiparty computation is also different according to the data condition, and the use mode can be easily obtained, which is not described in detail again.
The application has at least the following beneficial effects:
the trusted execution environment is utilized, so that the high cost of searching for a trusted third party is avoided, and the trusted execution environment can easily acquire the technical support of a hardware party; after each party is authenticated for the second time, voting is carried out, so that the safety is further ensured, and simultaneously, an exit mechanism is provided, and the principles of fairness and volunteering are ensured; data are transmitted by adopting a ciphertext, so that the possibility of leakage is reduced to the maximum extent.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
It is to be noted that different embodiments may produce different advantages, and in different embodiments, any one or combination of the above advantages may be produced, or any other advantages may be obtained.
Having thus described the basic concept, it will be apparent to those skilled in the art that the foregoing detailed disclosure is to be regarded as illustrative only and not as limiting the present specification. Various modifications, improvements and adaptations to the present description may occur to those skilled in the art, although not explicitly described herein. Such modifications, improvements and adaptations are proposed in the present specification and thus fall within the spirit and scope of the exemplary embodiments of the present specification.
Also, the description uses specific words to describe embodiments of the description. Reference throughout this specification to "one embodiment," "an embodiment," and/or "some embodiments" means that a particular feature, structure, or characteristic described in connection with at least one embodiment of the specification is included. Therefore, it is emphasized and should be appreciated that two or more references to "an embodiment" or "one embodiment" or "an alternative embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, some features, structures, or characteristics of one or more embodiments of the specification may be combined as appropriate.
Moreover, those skilled in the art will appreciate that aspects of the present description may be illustrated and described in terms of several patentable species or situations, including any new and useful combination of processes, machines, manufacture, or materials, or any new and useful improvement thereof. Accordingly, aspects of this description may be performed entirely by hardware, entirely by software (including firmware, resident software, micro-code, etc.), or by a combination of hardware and software. The above hardware or software may be referred to as "data block," module, "" engine, "" unit, "" component, "or" system. Furthermore, aspects of the present description may be represented as a computer product, including computer readable program code, embodied in one or more computer readable media.

Claims (9)

1. A passenger flow analysis method based on a trusted execution environment is characterized by comprising the following steps:
creating a trusted execution environment and running an analysis program within the trusted execution environment;
each participant respectively verifies whether the analysis program is credible;
each participant votes for a verification result; when the credible vote of the analysis program is larger than the incredible vote, the participant who carries out the incredible vote quits;
and the rest participants encrypt the data and send the data to the analysis program.
2. A method according to claim 1, characterized by:
when the votes that the analysis program can trust are less than or equal to the untrustworthy votes;
all participants exit or shut down the analysis program.
3. A method according to claim 1, characterized by:
the encryption is one of a multiplicative homomorphic encryption algorithm, an additive homomorphic algorithm, or a fully homomorphic algorithm.
4. A method according to claim 1, characterized by:
the analysis program obtains passenger flow analysis results based on secure multiparty computation.
5. A trusted execution environment based passenger flow analysis system, comprising:
the running module is used for creating a trusted execution environment and running an analysis program in the trusted execution environment;
the verification module is used for verifying whether the analysis program is credible or not by each participant;
the judgment module is used for voting for the verification result by each participant; when the credible vote of the analysis program is larger than the incredible vote, the participant who carries out the incredible vote quits;
and the sending module is used for encrypting the data by the rest participants and then sending the encrypted data to the analysis program.
6. The system of claim 1, wherein the decision module further comprises:
when the votes that the parser is trusted are less than or equal to the votes that are not trusted;
all participants exit or shut down the analysis program.
7. A system according to claim 1, characterized in that:
the encryption is one of a multiplicative homomorphic encryption algorithm, an additive homomorphic algorithm, or a fully homomorphic algorithm.
8. A system according to claim 1, characterized in that:
the analysis program obtains passenger flow analysis results based on secure multiparty computation.
9. A passenger flow analysis apparatus comprising a processor and a storage medium, the storage medium storing computer instructions, the processor being configured to execute at least a portion of the computer instructions to implement the method of any one of claims 1-4.
CN202010488620.XA 2020-06-02 2020-06-02 Passenger flow analysis method and system based on trusted execution environment Pending CN111639343A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010488620.XA CN111639343A (en) 2020-06-02 2020-06-02 Passenger flow analysis method and system based on trusted execution environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010488620.XA CN111639343A (en) 2020-06-02 2020-06-02 Passenger flow analysis method and system based on trusted execution environment

Publications (1)

Publication Number Publication Date
CN111639343A true CN111639343A (en) 2020-09-08

Family

ID=72329607

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010488620.XA Pending CN111639343A (en) 2020-06-02 2020-06-02 Passenger flow analysis method and system based on trusted execution environment

Country Status (1)

Country Link
CN (1) CN111639343A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103152434A (en) * 2013-03-27 2013-06-12 江苏辰云信息科技有限公司 Leader node replacing method of distributed cloud system
CN104156671A (en) * 2013-05-13 2014-11-19 清华大学 Non-center dot product computing method achieving privacy protection
CN109101822A (en) * 2018-07-10 2018-12-28 西安交通大学 A method of solving data-privacy leakage problem in multi-party calculate
CN111049825A (en) * 2019-12-12 2020-04-21 支付宝(杭州)信息技术有限公司 Secure multi-party computing method and system based on trusted execution environment
CN111130800A (en) * 2019-12-25 2020-05-08 上海沄界信息科技有限公司 Trusted prediction machine implementation method and device based on TEE

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103152434A (en) * 2013-03-27 2013-06-12 江苏辰云信息科技有限公司 Leader node replacing method of distributed cloud system
CN104156671A (en) * 2013-05-13 2014-11-19 清华大学 Non-center dot product computing method achieving privacy protection
CN109101822A (en) * 2018-07-10 2018-12-28 西安交通大学 A method of solving data-privacy leakage problem in multi-party calculate
CN111049825A (en) * 2019-12-12 2020-04-21 支付宝(杭州)信息技术有限公司 Secure multi-party computing method and system based on trusted execution environment
CN111130800A (en) * 2019-12-25 2020-05-08 上海沄界信息科技有限公司 Trusted prediction machine implementation method and device based on TEE

Similar Documents

Publication Publication Date Title
CN111563261A (en) Privacy protection multi-party computing method and system based on trusted execution environment
Khaliq et al. A secure and privacy preserved parking recommender system using elliptic curve cryptography and local differential privacy
CN109688119B (en) Anonymous traceability identity authentication method in cloud computing
Attarian et al. An anonymity communication protocol for security and privacy of clients in IoT-based mobile health transactions
Veerabathiran et al. Improving secured ID-based authentication for cloud computing through novel hybrid fuzzy-based homomorphic proxy re-encryption
Zhang et al. Blockchain-based asymmetric group key agreement protocol for internet of vehicles
Feng et al. Anonymous authentication on trust in pervasive social networking based on group signature
Tang et al. Achieve privacy-preserving truth discovery in crowdsensing systems
CN114546527B (en) Longitudinal multiparty data aggregation calculation solution system
Shahraki et al. Attribute-based data access control for multi-authority system
CN112287364A (en) Data sharing method, device, system, medium and electronic equipment
Will A privacy-preserving data aggregation scheme for fog/cloud-enhanced iot applications using a trusted execution environment
Diaz et al. A formal methodology for integral security design and verification of network protocols
Huang et al. ZT-Access: A combining zero trust access control with attribute-based encryption scheme against compromised devices in power IoT environments
CN113067822B (en) Information processing method, device, equipment, medium and product based on block chain
CN113836587A (en) Financial institution joint wind control method and system for protecting data privacy
US20190034618A1 (en) System and method for securing a communication channel
CN111371785A (en) Block chain privacy transaction method and device and electronic equipment
CN111639343A (en) Passenger flow analysis method and system based on trusted execution environment
CN115883207A (en) Multi-party security computing method and device
CN111723381A (en) TEE-based voting method and system
CN115603890A (en) Privacy calculation device and privacy calculation method
Wang et al. Attribute-based user revocable data integrity audit for internet-of-things devices in cloud storage
Liu et al. Privacy-preserving D2D cooperative location verification
CN113328860A (en) Block chain-based user privacy data security providing method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20200908