CN114817982A - Multi-party computing control method, device and equipment for providing privacy protection - Google Patents
Multi-party computing control method, device and equipment for providing privacy protection Download PDFInfo
- Publication number
- CN114817982A CN114817982A CN202210394942.7A CN202210394942A CN114817982A CN 114817982 A CN114817982 A CN 114817982A CN 202210394942 A CN202210394942 A CN 202210394942A CN 114817982 A CN114817982 A CN 114817982A
- Authority
- CN
- China
- Prior art keywords
- data
- calculation
- streaming
- application
- desensitization
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Medical Informatics (AREA)
- Storage Device Security (AREA)
Abstract
Description
技术领域technical field
本说明书涉及互联网技术领域,尤其涉及一种提供隐私保护的多方计算控制方法、装置以及设备。This specification relates to the field of Internet technologies, and in particular, to a multi-party computing control method, device, and device that provide privacy protection.
背景技术Background technique
随着计算机和互联网技术的发展,越来越多的数据出现在互联网的各领域中。数据作为一种新能源,流动起来才能产生更高的价值,然而由于多种原因,数据所有者有时并不想公开自身所拥有的相关数据,从而产生了数据孤岛现象。With the development of computer and Internet technology, more and more data appear in various fields of the Internet. As a new energy, data can only generate higher value when it flows. However, due to various reasons, data owners sometimes do not want to disclose the relevant data they own, resulting in the phenomenon of data silos.
为此,提出了多方安全计算(Secure Muti-party Computation,MPC)概念,其旨在不暴露各数据所有者隐私的前提下,实现数据的流动。其允许多个数据所有者在互不信任的情况下进行协同计算,输出计算结果,并保证任何一方均无法得到除应得的计算结果之外的其他任何信息。To this end, the concept of Secure Multi-party Computation (MPC) is proposed, which aims to realize the flow of data without exposing the privacy of each data owner. It allows multiple data owners to perform collaborative calculations without trusting each other, output calculation results, and ensure that no party can obtain any information other than the due calculation results.
传统的多方安全计算中,默认提供协同服务的服务方是安全的,各数据所有者需要在本地进行相关内容的编排部署,一旦内容发生修改,需要重新部署。但是,这些部署过程和后续计算过程往往被动地受到各数据所有者的控制和管理,影响了合作效率,不仅如此,在计算过程中,数据所有者所拥有的数据仍然可能通过提供协同服务的服务方泄露出去。In traditional multi-party secure computing, the service provider that provides collaborative services is secure by default. Each data owner needs to arrange and deploy relevant content locally. Once the content is modified, it needs to be redeployed. However, these deployment processes and subsequent computing processes are often passively controlled and managed by various data owners, which affects the efficiency of cooperation. Not only that, during the computing process, the data owned by the data owners may still pass through the services that provide collaborative services. Fang leaked out.
基于此,需要能够提供隐私保护的更为高效实用的多方计算控制方案。Based on this, a more efficient and practical multi-party computing control scheme that can provide privacy protection is required.
发明内容SUMMARY OF THE INVENTION
本说明书一个或多个实施例提供一种提供隐私保护的多方计算控制方法、装置、设备以及存储介质,用以解决如下技术问题:需要能够提供隐私保护的更为高效实用的多方计算控制方案。One or more embodiments of this specification provide a multi-party computing control method, apparatus, device, and storage medium that provide privacy protection, to solve the following technical problem: a more efficient and practical multi-party computing control scheme that can provide privacy protection is required.
为解决上述技术问题,本说明书一个或多个实施例是这样实现的:To solve the above technical problems, one or more embodiments of the present specification are implemented as follows:
本说明书一个或多个实施例提供的一种提供隐私保护的多方计算控制方法,包括:One or more embodiments of this specification provide a multi-party computing control method for providing privacy protection, including:
确定部署有集群系统的中心节点的服务提供方,以及部署有所述集群系统的工作节点的客户参与方;Determine the service provider that deploys the central node of the cluster system, and the client participant that deploys the worker nodes of the cluster system;
确定部署于所述工作节点上的流式计算引擎应用和应用监控服务;Determine the stream computing engine application and application monitoring service deployed on the worker node;
根据指定的流处理规则,在所述中心节点发起集群任务,通过所述集群任务向所述流式计算引擎应用发送指令,以指示所述流式计算引擎应用在其本地获取所述客户参与方的私有数据,并按照所述流处理规则对所述私有数据进行脱敏计算,得到脱敏数据;According to the specified stream processing rule, a cluster task is initiated at the central node, and an instruction is sent to the streaming computing engine application through the cluster task to instruct the streaming computing engine application to obtain the client participant locally. private data, and perform desensitization calculation on the private data according to the stream processing rules to obtain desensitized data;
在所述中心节点与所述应用监控服务进行通讯,得到对所述流式计算引擎应用的计算状态监控数据和所述脱敏数据;Communicate with the application monitoring service at the central node to obtain the computing state monitoring data and the desensitization data applied to the streaming computing engine;
根据所述计算状态监控数据和所述脱敏数据,完成所述客户参与方的多方安全计算,以便所述服务提供方根据所述多方安全计算的结果提供服务。According to the computing state monitoring data and the desensitization data, the multi-party security calculation of the customer participant is completed, so that the service provider provides services according to the result of the multi-party security calculation.
本说明书一个或多个实施例提供的一种提供隐私保护的多方计算控制装置,包括:One or more embodiments of this specification provide a multi-party computing control device that provides privacy protection, including:
第一部署模块,确定部署有集群系统的中心节点的服务提供方,以及部署有所述集群系统的工作节点的客户参与方;a first deployment module, which determines the service provider deployed with the central node of the cluster system, and the client participant deployed with the working nodes of the cluster system;
第二部署模块,确定部署于所述工作节点上的流式计算引擎应用和应用监控服务;The second deployment module determines the streaming computing engine application and application monitoring service deployed on the worker node;
任务发起模块,根据指定的流处理规则,在所述中心节点发起集群任务,通过所述集群任务向所述流式计算引擎应用发送指令,以指示所述流式计算引擎应用在其本地获取所述客户参与方的私有数据,并按照所述流处理规则对所述私有数据进行脱敏计算,得到脱敏数据;The task initiating module, according to the specified stream processing rule, initiates a cluster task at the central node, and sends an instruction to the streaming computing engine application through the cluster task to instruct the streaming computing engine application to obtain all the data locally. the private data of the customer participant, and perform desensitization calculation on the private data according to the stream processing rules to obtain desensitized data;
数据获取模块,在所述中心节点与所述应用监控服务进行通讯,得到对所述流式计算引擎应用的计算状态监控数据和所述脱敏数据;a data acquisition module, which communicates with the application monitoring service at the central node, and obtains the computing state monitoring data and the desensitization data applied to the streaming computing engine;
服务提供模块,根据所述计算状态监控数据和所述脱敏数据,完成所述客户参与方的多方安全计算,以便所述服务提供方根据所述多方安全计算的结果提供服务。The service providing module, according to the calculation state monitoring data and the desensitization data, completes the multi-party security calculation of the customer participant, so that the service provider provides services according to the result of the multi-party security calculation.
本说明书一个或多个实施例提供的一种提供隐私保护的多方计算控制设备,包括:One or more embodiments of this specification provide a multi-party computing control device that provides privacy protection, including:
至少一个处理器;以及,at least one processor; and,
与所述至少一个处理器通信连接的存储器;其中,a memory communicatively coupled to the at least one processor; wherein,
所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够:The memory stores instructions executable by the at least one processor, the instructions being executed by the at least one processor to enable the at least one processor to:
确定部署有集群系统的中心节点的服务提供方,以及部署有所述集群系统的工作节点的客户参与方;Determine the service provider that deploys the central node of the cluster system, and the client participant that deploys the worker nodes of the cluster system;
确定部署于所述工作节点上的流式计算引擎应用和应用监控服务;Determine the stream computing engine application and application monitoring service deployed on the worker node;
根据指定的流处理规则,在所述中心节点发起集群任务,通过所述集群任务向所述流式计算引擎应用发送指令,以指示所述流式计算引擎应用在其本地获取所述客户参与方的私有数据,并按照所述流处理规则对所述私有数据进行脱敏计算,得到脱敏数据;According to the specified stream processing rule, a cluster task is initiated at the central node, and an instruction is sent to the streaming computing engine application through the cluster task to instruct the streaming computing engine application to obtain the client participant locally. private data, and perform desensitization calculation on the private data according to the stream processing rules to obtain desensitized data;
在所述中心节点与所述应用监控服务进行通讯,得到对所述流式计算引擎应用的计算状态监控数据和所述脱敏数据;Communicate with the application monitoring service at the central node to obtain the computing state monitoring data and the desensitization data applied to the streaming computing engine;
根据所述计算状态监控数据和所述脱敏数据,完成所述客户参与方的多方安全计算,以便所述服务提供方根据所述多方安全计算的结果提供服务。According to the computing state monitoring data and the desensitization data, the multi-party security calculation of the customer participant is completed, so that the service provider provides services according to the result of the multi-party security calculation.
本说明书一个或多个实施例提供的一种非易失性计算机存储介质,存储有计算机可执行指令,所述计算机可执行指令设置为:A non-volatile computer storage medium provided by one or more embodiments of this specification stores computer-executable instructions, and the computer-executable instructions are set to:
确定部署有集群系统的中心节点的服务提供方,以及部署有所述集群系统的工作节点的客户参与方;Determine the service provider that deploys the central node of the cluster system, and the client participant that deploys the worker nodes of the cluster system;
确定部署于所述工作节点上的流式计算引擎应用和应用监控服务;Determine the stream computing engine application and application monitoring service deployed on the worker node;
根据指定的流处理规则,在所述中心节点发起集群任务,通过所述集群任务向所述流式计算引擎应用发送指令,以指示所述流式计算引擎应用在其本地获取所述客户参与方的私有数据,并按照所述流处理规则对所述私有数据进行脱敏计算,得到脱敏数据;According to the specified stream processing rule, a cluster task is initiated at the central node, and an instruction is sent to the streaming computing engine application through the cluster task to instruct the streaming computing engine application to obtain the client participant locally. private data, and perform desensitization calculation on the private data according to the stream processing rules to obtain desensitized data;
在所述中心节点与所述应用监控服务进行通讯,得到对所述流式计算引擎应用的计算状态监控数据和所述脱敏数据;Communicate with the application monitoring service at the central node to obtain the computing state monitoring data and the desensitization data applied to the streaming computing engine;
根据所述计算状态监控数据和所述脱敏数据,完成所述客户参与方的多方安全计算,以便所述服务提供方根据所述多方安全计算的结果提供服务。According to the computing state monitoring data and the desensitization data, the multi-party security calculation of the customer participant is completed, so that the service provider provides services according to the result of the multi-party security calculation.
本说明书一个或多个实施例采用的上述至少一个技术方案能够达到以下有益效果:The above-mentioned at least one technical solution adopted by one or more embodiments of this specification can achieve the following beneficial effects:
根据服务提供方和客户参与方分别部署中心节点以及工作节点,构建了集群系统。利用该集群系统上的流式计算引擎应用和应用监控服务,能够快速部署和下发集群任务,以及实现任务监控上传,使系统能够快速迭代统计逻辑,通用化服务各种监控场景。并且只需通过集群任务中的指令,即可实现对流式计算引擎应用的计算规则的修改,无需重新部署,减少了开发维护成本,提高了计算效率,加强了中心化控制,提高了主动性。并且系统运算处理逻辑在客户参与方完成,只将脱敏数据和流式计算处理后的计算结果回转到服务提供方,避免了原始的私有数据出域导致的隐私泄露与监管风险,从而在保证了提供隐私保护的基础上,实现了多方计算控制。According to the service provider and customer participants, the central node and the worker node are respectively deployed, and the cluster system is constructed. Using the streaming computing engine application and application monitoring service on the cluster system, cluster tasks can be quickly deployed and delivered, and task monitoring and uploading can be implemented, enabling the system to quickly iterate statistical logic and generalize services for various monitoring scenarios. And only through the instructions in the cluster task, the calculation rules of the stream computing engine application can be modified without redeployment, which reduces the development and maintenance cost, improves the computing efficiency, strengthens the centralized control, and improves the initiative. In addition, the system operation processing logic is completed at the customer participant, and only the desensitized data and the calculation results after stream computing are returned to the service provider, avoiding the privacy leakage and supervision risks caused by the original private data going out of the domain, thus ensuring On the basis of providing privacy protection, multi-party computing control is realized.
附图说明Description of drawings
为了更清楚地说明本说明书实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本说明书中记载的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the technical solutions in the embodiments of the present specification or the prior art, the following briefly introduces the accompanying drawings required in the description of the embodiments or the prior art. Obviously, the accompanying drawings in the following description are only These are some embodiments described in this specification. For those of ordinary skill in the art, other drawings can also be obtained according to these drawings without creative labor.
图1为本说明书一个或多个实施例提供的一种提供隐私保护的多方计算控制方法的流程示意图;1 is a schematic flowchart of a multi-party computing control method for providing privacy protection provided by one or more embodiments of this specification;
图2为本说明书一个或多个实施例提供的,一种应用场景下的流式计算引擎应用的示意图;FIG. 2 is a schematic diagram of a stream computing engine application in an application scenario provided by one or more embodiments of this specification;
图3为本说明书一个或多个实施例提供的,一种应用场景下的业务执行流程示意图;FIG. 3 is a schematic diagram of a business execution flow in an application scenario provided by one or more embodiments of this specification;
图4为本说明书一个或多个实施例提供的一种提供隐私保护的多方计算控制装置的结构示意图;4 is a schematic structural diagram of a multi-party computing control device that provides privacy protection according to one or more embodiments of this specification;
图5为本说明书一个或多个实施例提供的一种提供隐私保护的多方计算控制设备的结构示意图。FIG. 5 is a schematic structural diagram of a multi-party computing control device that provides privacy protection according to one or more embodiments of this specification.
具体实施方式Detailed ways
本说明书实施例提供一种提供隐私保护的多方计算控制方法、装置、设备以及存储介质。The embodiments of this specification provide a multi-party computing control method, apparatus, device, and storage medium that provide privacy protection.
为了使本技术领域的人员更好地理解本说明书中的技术方案,下面将结合本说明书实施例中的附图,对本说明书实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本说明书实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都应当属于本申请保护的范围。In order to make those skilled in the art better understand the technical solutions in this specification, the technical solutions in the embodiments of this specification will be clearly and completely described below with reference to the accompanying drawings in the embodiments of this specification. Obviously, the described The embodiments are only a part of the embodiments of the present application, but not all of the embodiments. Based on the embodiments of the present specification, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of the present application.
图1为本说明书一个或多个实施例提供的一种提供隐私保护的多方计算控制方法的流程示意图。该方法可以应用于不同的业务领域,比如,互联网金融业务领域、电商业务领域、即时通讯业务领域、游戏业务领域、公务业务领域等。该流程可以由相应领域的计算设备执行,流程中的某些输入参数或者中间结果允许人工干预调节,以帮助提高准确性。FIG. 1 is a schematic flowchart of a multi-party computing control method for providing privacy protection according to one or more embodiments of this specification. The method can be applied to different business fields, for example, the Internet financial business field, the e-commerce business field, the instant messaging business field, the game business field, the official business field, and the like. The process can be performed by computing devices in the corresponding field, and certain input parameters or intermediate results in the process allow manual intervention adjustments to help improve accuracy.
图1中的流程可以包括以下步骤:The flow in Figure 1 can include the following steps:
S102:确定部署有集群系统的中心节点的服务提供方,以及部署有所述集群系统的工作节点的客户参与方。S102: Determine the service provider on which the central node of the cluster system is deployed, and the client participant on which the worker nodes of the cluster system are deployed.
集群指的是一组节点,这些节点可以是物理服务器或者虚拟机,节点中至少包含有中心节点和工作节点。A cluster refers to a group of nodes, which can be physical servers or virtual machines, at least including a central node and a worker node.
工作节点属于客户参与方,客户参与方为数据所有者,其拥有用于多方计算的相关数据,并能够针对该数据进行相应的工作(比如,对数据进行计算、传输、存储等)。中心节点属于服务提供方,该服务提供方指的是为其他节点提供服务的一方,比如,为工作节点提供管理服务、配置服务等,或者,为实际用户(实际用户指的是,在客户参与方或服务提供方办理业务的用户)提供业务服务。当然,该业务服务通常与多方计算得到的结果相关。The worker node belongs to the client participant, and the client participant is the data owner, which owns the relevant data for multi-party computation, and can perform corresponding work on the data (for example, computing, transmitting, storing the data, etc.). The central node belongs to the service provider, the service provider refers to the party that provides services for other nodes, such as providing management services, configuration services, etc. for the working nodes, or, for actual users (actual users refer to the (users who handle the business of the party or service provider) to provide business services. Of course, this business service is usually related to the result of a multi-party computation.
S104:确定部署于所述工作节点上的流式计算引擎应用(以下简称引擎应用)和应用监控服务。S104: Determine the stream computing engine application (hereinafter referred to as the engine application) and the application monitoring service deployed on the worker node.
流数据是指在时间分布和数量上无限的一系列动态数据集合体,数据的价值随着时间的流逝而降低,因此必须实时计算给出快速响应。流式计算就是对流数据进行实时计算处理的计算模式,引擎应用则用于执行流式计算的应用。Streaming data refers to a series of dynamic data aggregates that are infinite in time distribution and quantity. The value of the data decreases with the passage of time, so it must be calculated in real time to give a fast response. Stream computing is a computing mode that performs real-time computing processing on stream data, and engine applications are used to perform stream computing applications.
引擎应用部署在工作节点上,其能够在工作节点对待计算的数据执行流式计算。工作节点上还部署有应用监控服务,用于对该引擎应用的工作状态、所处理的数据进行监控,比如,其可以确定该引擎应用的工作状态是否异常、获取数据的计算结果等。在此可以采用二进制Binary形式打包为标准框架应用,得到引擎应用,在需要流式计算的工作节点,由集群系统框架启动该引擎应用以及应用监控服务。The engine application is deployed on the worker nodes, which can perform streaming computations on the data to be computed on the worker nodes. An application monitoring service is also deployed on the worker node to monitor the working status of the engine application and the processed data. For example, it can determine whether the working status of the engine application is abnormal, and obtain the calculation results of the data. Here, it can be packaged as a standard framework application in the form of binary binary to obtain an engine application, and the cluster system framework starts the engine application and application monitoring service on the worker nodes that need streaming computing.
S106:根据指定的流处理规则,在所述中心节点发起集群任务,通过所述集群任务向所述流式计算引擎应用发送指令,以指示所述流式计算引擎应用在其本地获取所述客户参与方的私有数据,并按照所述流处理规则对所述私有数据进行脱敏计算,得到脱敏数据。S106: Initiate a cluster task at the central node according to the specified stream processing rule, and send an instruction to the streaming computing engine application through the cluster task to instruct the streaming computing engine application to obtain the client locally The private data of the participant is obtained, and desensitization calculation is performed on the private data according to the stream processing rules to obtain desensitized data.
集群任务由中心节点生成发起,集群任务中携带有相应的参数,其主要作用是针对多方计算进行相关的控制。比如,根据该集群任务,向各引擎应用发送指令,以控制引擎应用的开启、关闭、对数据进行计算、向中心节点返回计算结果等。The cluster task is generated and initiated by the central node, and the cluster task carries the corresponding parameters. Its main function is to control the multi-party computation. For example, according to the cluster task, instructions are sent to each engine application to control the opening and closing of the engine application, calculate the data, and return the calculation result to the central node.
私有数据指的是客户参与方所拥有的数据,通常来说,客户参与方想要将该数据用于多方计算,但是其中通常包含有一些隐私数据(比如,客户参与方自身的业务数据、其对应的实际用户的用户数据等),客户参与方并不想公开这些数据,将其用于多方计算。Private data refers to the data owned by the customer participant. Generally speaking, the customer participant wants to use the data for multi-party computation, but it usually contains some private data (for example, the customer participant's own business data, other The user data of the corresponding actual users, etc.), the customer participants do not want to disclose these data and use it for multi-party computing.
基于此,引擎应用在工作节点本地获取了客户参与方的私有数据后,按照流处理规则对私有数据进行脱敏计算,通过对其中涉及隐私的部分数据进行处理后,使其他人无法获取到隐私。比如,对于图像数据,可以将其中的部分区域进行模糊处理;对于文本数据,可以将其中部分数据进行无效化处理(用“*”等符号代替字符)、转换为随机值、进行数据加密等;对于音频数据,可以将其中的部分内容进行消音处理。Based on this, after the engine application obtains the private data of the client participant locally on the worker node, it desensitizes the private data according to the stream processing rules, and processes some of the data involving privacy, so that others cannot obtain the privacy. . For example, for image data, part of the area can be blurred; for text data, part of the data can be invalidated (replacing characters with symbols such as "*"), converted to random values, data encryption, etc.; For audio data, part of the content can be muted.
S108:在所述中心节点与所述应用监控服务进行通讯,得到对所述流式计算引擎应用的计算状态监控数据和所述脱敏数据。S108: Communicate with the application monitoring service at the central node to obtain computing state monitoring data and the desensitization data for the streaming computing engine application.
计算状态监控数据通常具有持续性,中心节点需要实时采集该计算状态监控数据,以确保引擎应用的工作状态是否出现异常,若出现异常,则可以进行快速应对。而脱敏数据则通常并不具有持续性,其是基于实际用户的需求来得到的。比如,实际用户在服务提供方处发起业务需求,服务提供方通过该业务需求发起集群任务,向各工作节点中的引擎应用发送指令,此时,引擎应用获取私有数据,通过脱敏计算后,向中心节点返回脱敏数据。由于业务需求并非是持续存在的,因此,该脱敏数据的获取通常也并非是持续的。The computing status monitoring data is usually continuous. The central node needs to collect the computing status monitoring data in real time to ensure whether the working status of the engine application is abnormal. If there is an abnormality, it can respond quickly. The desensitized data is usually not persistent, and is obtained based on the needs of actual users. For example, an actual user initiates a business requirement at the service provider, and the service provider initiates a cluster task through the business requirement, and sends instructions to the engine application in each worker node. At this time, the engine application obtains private data, and after desensitization calculation, Return desensitized data to the central node. Since business requirements are not continuous, the acquisition of the desensitized data is usually not continuous.
S110:根据所述计算状态监控数据和所述脱敏数据,完成所述客户参与方的多方安全计算,以便所述服务提供方根据所述多方安全计算的结果提供服务。S110: According to the calculation state monitoring data and the desensitization data, complete the multi-party security calculation of the customer participant, so that the service provider provides a service according to the result of the multi-party security calculation.
中心节点此时帮助各工作节点完成了多方安全计算,比如,提供了引擎应用的部署和监控服务、对脱敏数据进行获取整理等,在此可以看作其已经为多方安全计算提供了服务。当然,在后续的业务执行过程中,服务提供方还可以基于多方安全计算的计算结果,继续为执行业务的实际用户提供相关服务。At this time, the central node helps each worker node to complete multi-party security computing, for example, provides the deployment and monitoring services of engine applications, and obtains and organizes desensitized data. Here, it can be considered that it has provided services for multi-party security computing. Of course, in the subsequent service execution process, the service provider can also continue to provide relevant services for actual users who execute the service based on the calculation result of the multi-party secure calculation.
系统运算处理逻辑在客户参与方完成,只将脱敏数据和流式计算处理后的计算结果回转到服务提供方,避免了原始的私有数据出域导致的隐私泄露与监管风险。The system operation and processing logic is completed at the customer participant, and only the desensitized data and the calculation results after stream computing are returned to the service provider, avoiding the privacy leakage and supervision risks caused by the original private data going out of the domain.
基于图1的方法,本说明书还提供了该方法的一些具体实施方案和扩展方案,下面继续进行说明。Based on the method of FIG. 1 , the present specification also provides some specific embodiments and expansion schemes of the method, and the description will continue below.
在本说明书一个或多个实施例中,为保证引擎应用部署过程中的效率,集群可以是一个自动化容器操作的平台,比如,kubernetes集群(也称作k8s集群)。kubernetes集群能够部署、复制、调度节点,还能够随时扩展或收缩容器规模,并且将容器组织成组,提供容器间的负载均衡,提供容器弹性,以及进行节点集群间扩展,这对于部署过程十分便利。In one or more embodiments of this specification, in order to ensure the efficiency of the engine application deployment process, the cluster may be a platform for automating container operations, for example, a kubernetes cluster (also referred to as a k8s cluster). The kubernetes cluster can deploy, replicate, schedule nodes, and expand or shrink the container size at any time, organize containers into groups, provide load balancing between containers, provide container elasticity, and expand between node clusters, which is very convenient for the deployment process. .
基于此,获取引擎应用的命令行CLI接口,根据指定的流处理规则,在中心节点发起集群任务(kubernetes job),并通过kubernetes job向CLI接口发送指令,引擎应用在接收到该指令后开启,并根据指令中携带的流式计算任务参数启动对私有数据的流式计算。其中,流式计算任务参数主要用于指导引擎应用如何进行数据计算,比如,对哪些数据进行求和、求积分、求模等。Based on this, obtain the command line CLI interface of the engine application, initiate a cluster task (kubernetes job) on the central node according to the specified stream processing rules, and send an instruction to the CLI interface through the kubernetes job. The engine application starts after receiving the instruction. And start the stream computation of the private data according to the stream computation task parameters carried in the instruction. Among them, the stream computing task parameters are mainly used to guide the engine application how to perform data computation, such as which data to sum, integrate, and modulate.
进一步地,中心节点发送指令后,引擎应用启动开始进行流式计算。此时,同步启动应用监控服务,对应用的流式计算过程进行监控,比如,监控引擎应用的工作状态是否出现异常,引擎应用的是否按照指令中携带的流式计算任务参数进行计算等。若出现异常,则可以上报至中心节点,由中心节点进行及时处理。Further, after the central node sends the instruction, the engine application starts to perform stream computing. At this time, the application monitoring service is started synchronously to monitor the stream computing process of the application, for example, to monitor whether the working status of the engine application is abnormal, and whether the engine application is calculated according to the stream computing task parameters carried in the instruction. If there is an abnormality, it can be reported to the central node, and the central node will handle it in time.
此时,中心节点通过网关(比如gateway,其是一个基于http协议的restful的API网关,可以作为统一的API接入层)接收应用监控服务上报的引擎应用的计算状态监控数据和脱敏数据,然后上传至系统框架API服务,以供框架API控制引擎应用。其中,框架API服务指的是,基于相应的框架,对接口进行自定义得到的。At this time, the central node receives the computing status monitoring data and desensitization data of the engine application reported by the application monitoring service through a gateway (such as a gateway, which is a restful API gateway based on the http protocol and can be used as a unified API access layer). Then upload it to the system framework API service for the framework API control engine application. Among them, the framework API service refers to the interface obtained by customizing the interface based on the corresponding framework.
在本说明书一个或多个实施例中,上文中已经提到,通过引擎应用进行脱敏计算,从而对客户参与方的数据进行隐私保护。然而实际上,此处的保护只限于保护隐私数据不会由于多方计算外泄,若是由于引擎应用本地的安全问题,导致了隐私数据的外泄,脱敏计算是难以起到隐私保护效果的。In one or more embodiments of this specification, as mentioned above, desensitization calculation is performed through an engine application, so as to perform privacy protection on the data of customer participants. However, in fact, the protection here is limited to protecting private data from leakage due to multi-party computing. If the leakage of private data is caused by the local security problem of the engine application, desensitization calculation is difficult to achieve privacy protection effect.
基于此,框架API服务在接收到脱敏数据后,不会立即通过该脱敏数据进行多方安全计算,而是通过该脱敏数据为客户参与方来生成模拟数据。模拟数据指的是,通过该模拟数据进行脱敏计算后,能够得到与模拟数据相似甚至相同的数据,相似指的是该数据与脱敏数据之间的差异程度低于预设阈值。比如,原本的私有数据为身份证号“123456789”,经过脱敏计算后得到的脱敏数据为“123***789”,此时,生成的模拟数据为“123000789”,经过脱敏计算后得到的数据为“123***789”,其与之前的脱敏数据相同,当然,如果该数据与脱敏数据虽不相同,但是相似,也能起到一定的效果。需要说明的是,此处举例的数据仅是为了便于解释说明,并不代表实际的身份证号真如上所示。Based on this, after receiving the desensitized data, the framework API service will not use the desensitized data to perform multi-party security calculations immediately, but instead generate simulated data for customer participants through the desensitized data. The simulated data means that after desensitization calculation is performed on the simulated data, data similar to or even the same as the simulated data can be obtained, and the similarity means that the degree of difference between the data and the desensitized data is lower than a preset threshold. For example, the original private data is the ID number "123456789", and the desensitized data obtained after desensitization calculation is "123***789". At this time, the generated simulated data is "123000789". After desensitization calculation The obtained data is "123***789", which is the same as the previous desensitization data. Of course, if the data is different from the desensitization data, but similar, it can also have a certain effect. It should be noted that the data exemplified here is only for the convenience of explanation, and does not mean that the actual ID number is as shown above.
其中,模拟数据可以根据能够获取到的私有数据进行一定程度的变换后得到,但是,客户参与方通常不会将私有数据直接传输至服务提供方,此时,可以通过对脱敏数据进行反向编译的方式,来得到模拟数据。比如,仍以上文中的身份证号为例,服务提供方只能得到脱敏数据“123***789”,对其进行反向编译后,能够得到多种可能性,这多种可能性都能够通过脱敏计算得到该脱敏数据,此时,从中选取一个或多个可能性,作为模拟数据。Among them, the simulated data can be obtained after a certain degree of transformation according to the private data that can be obtained. However, the customer participant usually does not directly transmit the private data to the service provider. In this case, the desensitization data can be reversed The way to compile, to get the simulation data. For example, still taking the ID number in the above as an example, the service provider can only get the desensitized data "123***789", and after decompiling it, it can get a variety of possibilities. The desensitization data can be obtained through desensitization calculation, and at this time, one or more possibilities are selected from them as simulation data.
在得到了模拟数据后,当计算状态监控数据符合预定情况时,将模拟数据注入引擎应用中,引擎应用将模拟数据作为私有数据的输入流中的一部分数据进行处理。在私有数据中掺杂一部分模拟数据,即使私有数据真的在引擎应用中泄露,也会由于该部分模拟数据的存在,导致数据非法获取方难以根据其获取的私有数据进行非法活动。并且,由于模拟数据经过脱敏计算的计算结果与脱敏数据相似,也不会对最终的多方安全计算的计算结果产生太大影响。当然,为保证计算结果的准确性,模拟数据可以具有一定的使用时长期限,比如,一个模拟数据只能够使用一天。After the simulation data is obtained, when the calculation state monitoring data conforms to the predetermined condition, the simulation data is injected into the engine application, and the engine application processes the simulation data as part of the input stream of private data. A part of the simulated data is mixed with the private data. Even if the private data is really leaked in the engine application, the existence of this part of the simulated data will make it difficult for the illegal data acquirer to carry out illegal activities based on the private data obtained. In addition, since the calculation result of the desensitization calculation of the simulated data is similar to the desensitization data, it will not have much influence on the calculation result of the final multi-party security calculation. Of course, in order to ensure the accuracy of the calculation results, the simulated data can be used for a certain period of time. For example, one simulated data can only be used for one day.
其中,预定情况是根据计算状态监控数据判断得到的。计算状态监控数据主要用于监控引擎应用的计算是否出现异常,如果出现异常,则可以生成模拟数据。比如,当引擎应用被攻击时,可能会有部分数据产生一定程度的波动(比如,部分数据在短时间内被频繁访问获取),此时,可以将该波动作为预定情况,为该波动对应的部分数据生成相似的模拟数据。当然,也可以根据计算状态监控数据,对当前的计算状态进行评估,若评估结果认为存在出现异常的风险,则也可以将其作为预定情况。比如,当私有数据中的某类型数据为稀疏分布,其在所处的空间中样本比较稀少,那么一旦被攻击,该类型数据中的指定数据更容易被直接获取,也更容易被攻击方根据样本数量快速甄别;或者,该类型数据处于被长时间访问的状态下,那么其被攻击的概率也会随之增加。Wherein, the predetermined situation is determined according to the calculation state monitoring data. The calculation status monitoring data is mainly used to monitor whether the calculation of the engine application is abnormal. If there is an abnormality, simulation data can be generated. For example, when an engine application is attacked, some data may fluctuate to a certain degree (for example, some data are frequently accessed and acquired in a short period of time). Part of the data generates similar simulated data. Of course, the current computing state can also be evaluated according to the computing state monitoring data, and if the evaluation result considers that there is a risk of abnormality, it can also be regarded as a predetermined situation. For example, when a certain type of data in the private data is sparsely distributed and its samples are relatively scarce in the space where it is located, once it is attacked, the specified data in this type of data is more likely to be obtained directly, and it is also easier for the attacker to obtain the specified data directly. The number of samples is quickly screened; or, if this type of data is accessed for a long time, the probability of being attacked will also increase.
进一步地,在向引擎应用发送指令,添加模拟数据后,可以继续向引擎应用发送指令,若引擎应用检验本地已存在私有数据对应的模拟数据,则将该私有数据替换为该模拟数据。相比于掺杂的方式,直接将模拟数据替换私有数据,能够起到更好的隐私防泄露的效果,但是随之带来的是计算结果准确度的下降,因此,并非每轮多方安全计算过程中,都需要进行数据替换。比如,可以基于当前预定情况的风险等级(比如,若已出现异常,则为最高等级的风险等级,若未出现异常,则根据实际情况划分风险等级),来确定是否需要进行数据替换,以此尽可能保证最终计算结果的准确度。Further, after sending an instruction to the engine application to add the simulated data, it can continue to send the instruction to the engine application. If the engine application verifies that the simulated data corresponding to the private data already exists locally, the private data is replaced with the simulated data. Compared with the doping method, directly replacing the private data with the simulated data can achieve a better effect of preventing leakage of privacy, but it will bring about a decrease in the accuracy of the calculation results. During the process, data replacement is required. For example, it can be determined whether data replacement is required based on the risk level of the current predetermined situation (for example, if an abnormality has occurred, it is the highest risk level; if there is no abnormality, the risk level is divided according to the actual situation). As much as possible to ensure the accuracy of the final calculation results.
在本说明书一个或多个实施例中,在向工作节点部署引擎应用之前,首先需要对其进行构建,上文已经说过,可以通过kubernetes来进行构建。In one or more embodiments of this specification, before deploying an engine application to a worker node, it needs to be constructed first, which can be constructed through kubernetes as mentioned above.
具体地,图2为本说明书一个或多个实施例提供的,一种应用场景下的流式计算引擎应用的示意图。获取SQL解析器和计算规则解析器,以构建中心节点的指令解析层(SQL/Rule Parser)。其中,SQL解析器用于确定需要在哪些客户参与方中获取哪些数据,计算规则解析器用于确定如何对这些数据进行计算处理。获取SQL处理器(SQL processor),以构建执行计划生成层。获取流运行时(Streaming runtime)和SQL运行时(SQL runtime),以构建计划执行层。此时,通过kubernetes集群的容器化应用部署能力,在工作节点上将指令解析层、执行计划生成层、计划执行层进行打包,即可得到引擎应用。当然,引擎应用中还可以包括数据存储层(storage)、数据来源层(sources)、数据下沉层(sinks)等。其中,数据来源层的数据来源可以通过消息队列MQ、消息队列MQTT获取数据,数据下沉层的数据可以通过消息队列MQTT、HTTP、File等方式下沉数据。提供了完善的权限审核与存证方案,有效防止了安全风险。Specifically, FIG. 2 is a schematic diagram of a stream computing engine application in an application scenario provided by one or more embodiments of this specification. Get the SQL parser and calculation rule parser to build the instruction parsing layer (SQL/Rule Parser) of the central node. Among them, the SQL parser is used to determine which data needs to be obtained from which customer participants, and the calculation rule parser is used to determine how to perform calculation processing on these data. Get the SQL processor to build the execution plan generation layer. Get the Streaming runtime and SQL runtime to build the plan execution layer. At this time, through the containerized application deployment capability of the kubernetes cluster, the instruction parsing layer, the execution plan generation layer, and the plan execution layer are packaged on the worker nodes, and the engine application can be obtained. Of course, the engine application may also include a data storage layer (storage), a data source layer (sources), a data sink layer (sinks), and the like. Among them, the data source of the data source layer can obtain data through message queue MQ and message queue MQTT, and the data of the data sink layer can sink data through message queue MQTT, HTTP, File and other methods. It provides a complete authority audit and certificate storage scheme, which effectively prevents security risks.
基于此,在发送指令的过程中,通过kubernetes job向CLI接口发送SQL查询指令,指示开启通过SQL查询指令查询得到的私有数据的流式计算。其中,若是SQL查询指令中未包含流式计算任务参数,则生成描述文件,该描述文件中包含有该流式计算任务参数,并向CLI接口发送该描述文件。若是在后续的流式计算任务参数发生变化时,借助类kubernetes的系统框架,通过发起kubernetes job(需要说明的是,该kubernetes job可以与本实施例中发送SQL查询指令的kubernetes job为同一个,也可以是新生成的)修改描述文件,即可完成流式计算任务参数的更改,实现快速部署迭代处理逻辑,使系统解耦,增强系统健壮性的同时减少部署成本。Based on this, in the process of sending the command, a SQL query command is sent to the CLI interface through the kubernetes job, instructing to enable streaming computing of the private data queried through the SQL query command. Wherein, if the stream computing task parameter is not included in the SQL query instruction, a description file is generated, the description file includes the stream computing task parameter, and the description file is sent to the CLI interface. If the parameters of the subsequent streaming computing tasks change, with the help of the kubernetes-like system framework, by initiating a kubernetes job (it should be noted that the kubernetes job can be the same as the kubernetes job that sends the SQL query command in this embodiment, It can also be newly generated) modify the description file to complete the change of the parameters of the streaming computing task, realize the rapid deployment of iterative processing logic, decouple the system, enhance the robustness of the system and reduce the deployment cost.
图3为本说明书一个或多个实施例提供的,一种应用场景下的业务执行流程示意图。在此针对一种常见的业务场景对本文中的方案进行解释说明。在该业务场景中,客户参与方的私有数据为客户参与方所服务的实际用户的业务数据,脱敏数据用于确定实际用户的信用状况,比如,客户参与方为银行,服务提供方为信用查询平台。FIG. 3 is a schematic diagram of a service execution flow in an application scenario provided by one or more embodiments of this specification. Here, the solution in this article is explained for a common business scenario. In this business scenario, the private data of the customer participant is the business data of the actual user served by the customer participant, and the desensitized data is used to determine the credit status of the actual user. For example, the customer participant is the bank, and the service provider is the credit Query platform.
实际用户想要查询自身的信用状况,在信用查询平台上发起业务需求,触发框架API服务,框架API服务生成并向引擎应用发送SQL查询指令。引擎应用在接收到后,通过指令解析层解析指令,并根据从日志文件获取的私有数据(比如,通过数据流模块fluent模块从日志文件获取流数据),进行脱敏计算以及流式计算,将计算结果上传至中心节点的网关,并在计算过程中,通过应用监控服务对运行状态上报至中心节点的网关。网关将自身的运行状态上报至框架API服务的同时,将获取的数据进行统计上报,进行后续处理,为该实际用户求得信用状况,向该实际用户进行展示。Actual users want to query their own credit status, initiate business requirements on the credit query platform, trigger the framework API service, and the framework API service generates and sends SQL query commands to the engine application. After the engine application receives it, it parses the instruction through the instruction parsing layer, and performs desensitization calculation and streaming calculation according to the private data obtained from the log file (for example, the stream data obtained from the log file through the data flow module fluent module). The calculation results are uploaded to the gateway of the central node, and during the calculation process, the running status is reported to the gateway of the central node through the application monitoring service. When the gateway reports its own running status to the framework API service, it reports the obtained data statistics and performs subsequent processing, obtains the credit status for the actual user, and displays it to the actual user.
在该业务场景下,用户的信用分通常不会在短时间内发生剧烈变化,其具有一定的滞后性(比如,用户在欠款后,并不会立即发生信用分的变化,而是在欠款一定时长未归还后,才会产生信用分的变化),因此,该业务场景尤其适用于上文中描述的,通过生成模拟数据,将其与私有数据进行掺杂或替换的方式,来进行进一步地隐私保护。In this business scenario, the user's credit score usually does not change drastically in a short period of time, which has a certain hysteresis (for example, after the user owes money, the credit score does not change immediately, but when the user owes money The change in credit score will only occur after the payment has not been returned for a certain period of time). Therefore, this business scenario is especially suitable for the above-mentioned method of generating simulated data and mixing or replacing it with private data. privacy protection.
基于同样的思路,本说明书一个或多个实施例还提供了上述方法对应的装置和设备,如图4、图5所示。Based on the same idea, one or more embodiments of the present specification also provide apparatuses and devices corresponding to the above methods, as shown in FIG. 4 and FIG. 5 .
图4为本说明书一个或多个实施例提供的一种提供隐私保护的多方计算控制装置的结构示意图,所述装置包括:FIG. 4 is a schematic structural diagram of a multi-party computing control device for providing privacy protection according to one or more embodiments of the present specification, and the device includes:
第一部署模块402,确定部署有集群系统的中心节点的服务提供方,以及部署有所述集群系统的工作节点的客户参与方;The
第二部署模块404,确定部署于所述工作节点上的流式计算引擎应用和应用监控服务;The
任务发起模块406,根据指定的流处理规则,在所述中心节点发起集群任务,通过所述集群任务向所述流式计算引擎应用发送指令,以指示所述流式计算引擎应用在其本地获取所述客户参与方的私有数据,并按照所述流处理规则对所述私有数据进行脱敏计算,得到脱敏数据;The
数据获取模块408,在所述中心节点与所述应用监控服务进行通讯,得到对所述流式计算引擎应用的计算状态监控数据和所述脱敏数据;A
服务提供模块410,根据所述计算状态监控数据和所述脱敏数据,完成所述客户参与方的多方安全计算,以便所述服务提供方根据所述多方安全计算的结果提供服务。The
可选地,所述集群为kubernetes集群;Optionally, the cluster is a kubernetes cluster;
所述任务发起模块406,获取所述流式计算引擎应用的命令行CLI接口;The
根据指定的流处理规则,在所述中心节点发起kubernetes job,通过所述kubernetes job向所述CLI接口发送开启流式计算的指令以及流式计算任务参数,以使所述流式计算引擎应用按照所述流式计算任务参数启动对所述私有数据的流式计算。According to the specified stream processing rule, a kubernetes job is initiated at the central node, and the instruction for enabling streaming computing and the streaming computing task parameters are sent to the CLI interface through the kubernetes job, so that the streaming computing engine application can follow the The streaming computing task parameter initiates streaming computing on the private data.
可选地,还包括同步监控模块412,在所述发送开启流式计算的指令时,同步启动所述应用监控服务,以使所述应用监控服务对所述流式计算的过程进行监控;Optionally, a
所述数据获取模块408,通过所述中心节点的网关接收所述应用监控服务上报的对所述流式计算引擎应用的计算状态监控数据和所述脱敏数据;The
通过所述中心节点的框架API服务接收所述网关上报的所述计算状态监控数据,以便所述框架API服务控制所述流式计算引擎应用。The computing state monitoring data reported by the gateway is received through the framework API service of the central node, so that the framework API service controls the streaming computing engine application.
可选地,所述数据获取模块408,所述框架API服务根据所述脱敏数据,为所述客户参与方生成模拟数据,以使所述模拟数据通过所述脱敏计算能够得到与所述脱敏数据相似的数据;Optionally, in the
在所述计算状态监控数据符合预定条件时,将所述模拟数据注入所述流式计算引擎应用,以使所述流式计算引擎应用将所述模拟数据作为输入流中的一部分数据进行处理,所述输入流中包含对应的客户参与方的私有数据。When the computing state monitoring data meets a predetermined condition, inject the simulated data into the streaming computing engine application, so that the streaming computing engine application processes the simulated data as a part of the data in the input stream, The input stream contains the private data of the corresponding client participant.
可选地,还包括模拟数据替换模块414,通过所述集群任务向所述流式计算引擎应用发送指令,以指示所述流式计算引擎应用校验本地是否已存在与所述私有数据对应的模拟数据;Optionally, it also includes a simulated
若是,则用所述模拟数据替换所述私有数据,用于为所述私有数据对应的实际用户生成脱敏数据。If so, replace the private data with the simulated data, so as to generate desensitized data for the actual user corresponding to the private data.
可选地,还包括集群构建模块416,获取SQL解析器和计算规则解析器,用于构建中心节点指令解析层;Optionally, a
获取SQL处理器,用于构建执行计划生成层;Get the SQL processor for building the execution plan generation layer;
获取流运行时和SQL运行时,用于构建计划执行层;Get the stream runtime and SQL runtime for building the plan execution layer;
通过所述kubernetes集群的容器化应用部署能力,在所述工作节点上对所述指令解析层、所述执行计划生成层、所述计划执行层进行打包,得到所述流式计算引擎应用。Through the containerized application deployment capability of the kubernetes cluster, the instruction parsing layer, the execution plan generation layer, and the plan execution layer are packaged on the worker node to obtain the stream computing engine application.
可选地,所述集群构建模块416,通过所述kubernetes job向所述CLI接口发送SQL查询指令,以指示开启对通过所述SQL查询指令查询得到的私有数据的流式计算;Optionally, the
若所述SQL查询指令中不包含所述流式计算对应的流式计算任务参数,则生成包含所述流式计算任务参数的描述文件,并向所述CLI接口发送所述描述文件,在所述流式计算任务参数发生变化时,通过kubernetes job修改所述描述文件。If the SQL query instruction does not contain the streaming computing task parameters corresponding to the streaming computing, a description file containing the streaming computing task parameters is generated, and the description file is sent to the CLI interface. When the parameters of the streaming computing task change, modify the description file through the kubernetes job.
可选地,所述客户参与方的私有数据为所述客户参与方所服务的实际用户的业务数据,所述脱敏数据用于确定所述实际用户的信用状况。Optionally, the private data of the customer participant is business data of an actual user served by the customer participant, and the desensitization data is used to determine the credit status of the actual user.
图5为本说明书一个或多个实施例提供的一种提供隐私保护的多方计算控制设备的结构示意图,所述设备包括:FIG. 5 is a schematic structural diagram of a multi-party computing control device that provides privacy protection according to one or more embodiments of this specification, and the device includes:
至少一个处理器;以及,at least one processor; and,
与所述至少一个处理器通信连接的存储器;其中,a memory communicatively coupled to the at least one processor; wherein,
所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够:The memory stores instructions executable by the at least one processor, the instructions being executed by the at least one processor to enable the at least one processor to:
确定部署有集群系统的中心节点的服务提供方,以及部署有所述集群系统的工作节点的客户参与方;Determine the service provider that deploys the central node of the cluster system, and the client participant that deploys the worker nodes of the cluster system;
确定部署于所述工作节点上的流式计算引擎应用和应用监控服务;Determine the stream computing engine application and application monitoring service deployed on the worker node;
根据指定的流处理规则,在所述中心节点发起集群任务,通过所述集群任务向所述流式计算引擎应用发送指令,以指示所述流式计算引擎应用在其本地获取所述客户参与方的私有数据,并按照所述流处理规则对所述私有数据进行脱敏计算,得到脱敏数据;According to the specified stream processing rule, a cluster task is initiated at the central node, and an instruction is sent to the streaming computing engine application through the cluster task to instruct the streaming computing engine application to obtain the client participant locally. private data, and perform desensitization calculation on the private data according to the stream processing rules to obtain desensitized data;
在所述中心节点与所述应用监控服务进行通讯,得到对所述流式计算引擎应用的计算状态监控数据和所述脱敏数据;Communicate with the application monitoring service at the central node to obtain the computing state monitoring data and the desensitization data applied to the streaming computing engine;
根据所述计算状态监控数据和所述脱敏数据,完成所述客户参与方的多方安全计算,以便所述服务提供方根据所述多方安全计算的结果提供服务。According to the computing state monitoring data and the desensitization data, the multi-party security calculation of the customer participant is completed, so that the service provider provides services according to the result of the multi-party security calculation.
基于同样的思路,本说明书一个或多个实施例还提供了对应于上述方法的一种非易失性计算机存储介质,存储有计算机可执行指令,所述计算机可执行指令设置为:Based on the same idea, one or more embodiments of this specification also provide a non-volatile computer storage medium corresponding to the above method, storing computer-executable instructions, and the computer-executable instructions are set to:
确定部署有集群系统的中心节点的服务提供方,以及部署有所述集群系统的工作节点的客户参与方;Determine the service provider that deploys the central node of the cluster system, and the client participant that deploys the worker nodes of the cluster system;
确定部署于所述工作节点上的流式计算引擎应用和应用监控服务;Determine the stream computing engine application and application monitoring service deployed on the worker node;
根据指定的流处理规则,在所述中心节点发起集群任务,通过所述集群任务向所述流式计算引擎应用发送指令,以指示所述流式计算引擎应用在其本地获取所述客户参与方的私有数据,并按照所述流处理规则对所述私有数据进行脱敏计算,得到脱敏数据;According to the specified stream processing rule, a cluster task is initiated at the central node, and an instruction is sent to the streaming computing engine application through the cluster task to instruct the streaming computing engine application to obtain the client participant locally. private data, and perform desensitization calculation on the private data according to the stream processing rules to obtain desensitized data;
在所述中心节点与所述应用监控服务进行通讯,得到对所述流式计算引擎应用的计算状态监控数据和所述脱敏数据;Communicate with the application monitoring service at the central node to obtain the computing state monitoring data and the desensitization data applied to the streaming computing engine;
根据所述计算状态监控数据和所述脱敏数据,完成所述客户参与方的多方安全计算,以便所述服务提供方根据所述多方安全计算的结果提供服务。According to the computing state monitoring data and the desensitization data, the multi-party security calculation of the customer participant is completed, so that the service provider provides services according to the result of the multi-party security calculation.
在20世纪90年代,对于一个技术的改进可以很明显地区分是硬件上的改进(例如,对二极管、晶体管、开关等电路结构的改进)还是软件上的改进(对于方法流程的改进)。然而,随着技术的发展,当今的很多方法流程的改进已经可以视为硬件电路结构的直接改进。设计人员几乎都通过将改进的方法流程编程到硬件电路中来得到相应的硬件电路结构。因此,不能说一个方法流程的改进就不能用硬件实体模块来实现。例如,可编程逻辑器件(Programmable Logic Device,PLD)(例如现场可编程门阵列(Field Programmable GateArray,FPGA))就是这样一种集成电路,其逻辑功能由用户对器件编程来确定。由设计人员自行编程来把一个数字系统“集成”在一片PLD上,而不需要请芯片制造厂商来设计和制作专用的集成电路芯片。而且,如今,取代手工地制作集成电路芯片,这种编程也多半改用“逻辑编译器(logic compiler)”软件来实现,它与程序开发撰写时所用的软件编译器相类似,而要编译之前的原始代码也得用特定的编程语言来撰写,此称之为硬件描述语言(Hardware Description Language,HDL),而HDL也并非仅有一种,而是有许多种,如ABEL(Advanced Boolean Expression Language)、AHDL(Altera Hardware DescriptionLanguage)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(RubyHardware Description Language)等,目前最普遍使用的是VHDL(Very-High-SpeedIntegrated Circuit Hardware Description Language)与Verilog。本领域技术人员也应该清楚,只需要将方法流程用上述几种硬件描述语言稍作逻辑编程并编程到集成电路中,就可以很容易得到实现该逻辑方法流程的硬件电路。In the 1990s, improvements in a technology could be clearly differentiated between improvements in hardware (for example, improvements in circuit structures such as diodes, transistors, switches, etc.) or improvements in software (improvements in method flow). However, with the development of technology, the improvement of many methods and processes today can be regarded as a direct improvement of the hardware circuit structure. Designers almost get the corresponding hardware circuit structure by programming the improved method flow into the hardware circuit. Therefore, it cannot be said that the improvement of a method flow cannot be realized by hardware entity modules. For example, a Programmable Logic Device (PLD) (eg, Field Programmable Gate Array (FPGA)) is an integrated circuit whose logic function is determined by user programming of the device. It is programmed by the designer to "integrate" a digital system on a PLD without having to ask a chip manufacturer to design and manufacture a dedicated integrated circuit chip. And, instead of making integrated circuit chips by hand, these days, much of this programming is done using software called a "logic compiler", which is similar to the software compiler used in program development and writing, but before compiling The original code of the device must also be written in a specific programming language, which is called Hardware Description Language (HDL), and there is not only one HDL, but many kinds, such as ABEL (Advanced Boolean Expression Language) , AHDL (Altera Hardware Description Language), Confluence, CUPL (Cornell University Programming Language), HDCal, JHDL (Java Hardware Description Language), Lava, Lola, MyHDL, PALASM, RHDL (RubyHardware Description Language), etc. The most commonly used are VHDL (Very-High-Speed Integrated Circuit Hardware Description Language) and Verilog. It should also be clear to those skilled in the art that a hardware circuit for implementing the logic method process can be easily obtained by simply programming the method process in the above-mentioned several hardware description languages and programming it into the integrated circuit.
控制器可以按任何适当的方式实现,例如,控制器可以采取例如微处理器或处理器以及存储可由该(微)处理器执行的计算机可读程序代码(例如软件或固件)的计算机可读介质、逻辑门、开关、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程逻辑控制器和嵌入微控制器的形式,控制器的例子包括但不限于以下微控制器:ARC625D、Atmel AT91SAM、Microchip PIC18F26K20以及Silicone Labs C8051F320,存储器控制器还可以被实现为存储器的控制逻辑的一部分。本领域技术人员也知道,除了以纯计算机可读程序代码方式实现控制器以外,完全可以通过将方法步骤进行逻辑编程来使得控制器以逻辑门、开关、专用集成电路、可编程逻辑控制器和嵌入微控制器等的形式来实现相同功能。因此这种控制器可以被认为是一种硬件部件,而对其内包括的用于实现各种功能的装置也可以视为硬件部件内的结构。或者甚至,可以将用于实现各种功能的装置视为既可以是实现方法的软件模块又可以是硬件部件内的结构。The controller may be implemented in any suitable manner, for example, the controller may take the form of eg a microprocessor or processor and a computer readable medium storing computer readable program code (eg software or firmware) executable by the (micro)processor , logic gates, switches, application specific integrated circuits (ASICs), programmable logic controllers and embedded microcontrollers, examples of controllers include but are not limited to the following microcontrollers: ARC625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicon Labs C8051F320, the memory controller can also be implemented as part of the control logic of the memory. Those skilled in the art also know that, in addition to implementing the controller in the form of pure computer-readable program code, the controller can be implemented as logic gates, switches, application-specific integrated circuits, programmable logic controllers and embedded devices by logically programming the method steps. The same function can be realized in the form of a microcontroller, etc. Therefore, such a controller can be regarded as a hardware component, and the devices included therein for realizing various functions can also be regarded as a structure within the hardware component. Or even, the means for implementing various functions can be regarded as both a software module implementing a method and a structure within a hardware component.
上述实施例阐明的系统、装置、模块或单元,具体可以由计算机芯片或实体实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机。具体的,计算机例如可以为个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任何设备的组合。The systems, devices, modules or units described in the above embodiments may be specifically implemented by computer chips or entities, or by products with certain functions. A typical implementation device is a computer. Specifically, the computer can be, for example, a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or A combination of any of these devices.
为了描述的方便,描述以上装置时以功能分为各种单元分别描述。当然,在实施本说明书时可以把各单元的功能在同一个或多个软件和/或硬件中实现。For the convenience of description, when describing the above device, the functions are divided into various units and described respectively. Of course, when implementing this specification, the functions of each unit may be implemented in one or more software and/or hardware.
本领域内的技术人员应明白,本说明书实施例可提供为方法、系统、或计算机程序产品。因此,本说明书实施例可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本说明书实施例可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。As will be appreciated by one skilled in the art, the embodiments of the present specification may be provided as a method, a system, or a computer program product. Accordingly, embodiments of this specification may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present specification may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
本说明书是参照根据本说明书实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。The specification is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the specification. It will be understood that each flow and/or block in the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to the processor of a general purpose computer, special purpose computer, embedded processor or other programmable data processing device to produce a machine such that the instructions executed by the processor of the computer or other programmable data processing device produce Means for implementing the functions specified in a flow or flow of a flowchart and/or a block or blocks of a block diagram.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory result in an article of manufacture comprising instruction means, the instructions The apparatus implements the functions specified in the flow or flow of the flowcharts and/or the block or blocks of the block diagrams.
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions can also be loaded on a computer or other programmable data processing device to cause a series of operational steps to be performed on the computer or other programmable device to produce a computer-implemented process such that The instructions provide steps for implementing the functions specified in the flow or blocks of the flowcharts and/or the block or blocks of the block diagrams.
在一个典型的配置中,计算设备包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。Memory may include non-persistent memory in computer readable media, random access memory (RAM) and/or non-volatile memory in the form of, for example, read only memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。Computer-readable media includes both persistent and non-permanent, removable and non-removable media, and storage of information may be implemented by any method or technology. Information may be computer readable instructions, data structures, modules of programs, or other data. Examples of computer storage media include, but are not limited to, phase-change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), Flash Memory or other memory technology, Compact Disc Read Only Memory (CD-ROM), Digital Versatile Disc (DVD) or other optical storage, Magnetic tape cassettes, magnetic tape magnetic disk storage or other magnetic storage devices or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer-readable media does not include transitory computer-readable media, such as modulated data signals and carrier waves.
还需要说明的是,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、商品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、商品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、商品或者设备中还存在另外的相同要素。It should also be noted that the terms "comprising", "comprising" or any other variation thereof are intended to encompass a non-exclusive inclusion such that a process, method, article or device comprising a series of elements includes not only those elements, but also Other elements not expressly listed, or which are inherent to such a process, method, article of manufacture, or apparatus are also included. Without further limitation, an element qualified by the phrase "comprising a..." does not preclude the presence of additional identical elements in the process, method, article of manufacture, or device that includes the element.
本说明书可以在由计算机执行的计算机可执行指令的一般上下文中描述,例如程序模块。一般地,程序模块包括执行特定任务或实现特定抽象数据类型的例程、程序、对象、组件、数据结构等等。也可以在分布式计算环境中实践本说明书,在这些分布式计算环境中,由通过通信网络而被连接的远程处理设备来执行任务。在分布式计算环境中,程序模块可以位于包括存储设备在内的本地和远程计算机存储介质中。This specification may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The specification can also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including storage devices.
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于装置、设备、非易失性计算机存储介质实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。Each embodiment in this specification is described in a progressive manner, and the same and similar parts between the various embodiments may be referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, for the apparatus, equipment, and non-volatile computer storage medium embodiments, since they are basically similar to the method embodiments, the description is relatively simple, and reference may be made to some descriptions of the method embodiments for related parts.
上述对本说明书特定实施例进行了描述。其它实施例在所附权利要求书的范围内。在一些情况下,在权利要求书中记载的动作或步骤可以按照不同于实施例中的顺序来执行并且仍然可以实现期望的结果。另外,在附图中描绘的过程不一定要求示出的特定顺序或者连续顺序才能实现期望的结果。在某些实施方式中,多任务处理和并行处理也是可以的或者可能是有利的。The foregoing describes specific embodiments of the present specification. Other embodiments are within the scope of the appended claims. In some cases, the actions or steps recited in the claims can be performed in an order different from that in the embodiments and still achieve desirable results. Additionally, the processes depicted in the figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
以上所述仅为本说明书的一个或多个实施例而已,并不用于限制本说明书。对于本领域技术人员来说,本说明书的一个或多个实施例可以有各种更改和变化。凡在本说明书的一个或多个实施例的精神和原理之内所作的任何修改、等同替换、改进等,均应包含在本说明书的权利要求范围之内。The above descriptions are merely one or more embodiments of the present specification, and are not intended to limit the present specification. Various modifications and variations of the one or more embodiments of this specification are possible for those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of one or more embodiments of this specification should be included within the scope of the claims of this specification.
Claims (17)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210394942.7A CN114817982B (en) | 2022-04-15 | 2022-04-15 | A multi-party computing control method, device and equipment providing privacy protection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210394942.7A CN114817982B (en) | 2022-04-15 | 2022-04-15 | A multi-party computing control method, device and equipment providing privacy protection |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114817982A true CN114817982A (en) | 2022-07-29 |
CN114817982B CN114817982B (en) | 2025-05-09 |
Family
ID=82537126
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210394942.7A Active CN114817982B (en) | 2022-04-15 | 2022-04-15 | A multi-party computing control method, device and equipment providing privacy protection |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114817982B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114996694A (en) * | 2022-08-01 | 2022-09-02 | 阿里云计算有限公司 | Data fusion method, device, system and storage medium |
CN116226928A (en) * | 2023-05-09 | 2023-06-06 | 京东科技控股股份有限公司 | Combined computing method, device, equipment and medium for multiparty business privacy data |
CN118520438A (en) * | 2024-07-19 | 2024-08-20 | 浙江网商银行股份有限公司 | Data processing method and device |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102394784A (en) * | 2011-11-21 | 2012-03-28 | 北京邮电大学 | Distributed Top-k query method based on privacy maintenance |
CN108509805A (en) * | 2018-03-21 | 2018-09-07 | 深圳天源迪科信息技术股份有限公司 | Data encrypting and deciphering and desensitization runtime engine and its working method |
WO2019114766A1 (en) * | 2017-12-14 | 2019-06-20 | 中兴通讯股份有限公司 | Data desensitising method, server, terminal, and computer-readable storage medium |
CN111898137A (en) * | 2020-06-30 | 2020-11-06 | 深圳致星科技有限公司 | Private data processing method, equipment and system for federated learning |
US20200387627A1 (en) * | 2019-06-04 | 2020-12-10 | Digital Asset Holdings, LLC | Multi-user database system and method |
CN113157399A (en) * | 2021-05-17 | 2021-07-23 | 北京冲量在线科技有限公司 | Unsupervised joint modeling method based on ARM architecture chip |
CN113157400A (en) * | 2021-05-17 | 2021-07-23 | 北京冲量在线科技有限公司 | Multi-party unsupervised learning joint modeling method based on X86 computing chip |
CN113722754A (en) * | 2021-08-25 | 2021-11-30 | 上海阵方科技有限公司 | Generation method and device of privacy executable file and server |
-
2022
- 2022-04-15 CN CN202210394942.7A patent/CN114817982B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102394784A (en) * | 2011-11-21 | 2012-03-28 | 北京邮电大学 | Distributed Top-k query method based on privacy maintenance |
WO2019114766A1 (en) * | 2017-12-14 | 2019-06-20 | 中兴通讯股份有限公司 | Data desensitising method, server, terminal, and computer-readable storage medium |
CN108509805A (en) * | 2018-03-21 | 2018-09-07 | 深圳天源迪科信息技术股份有限公司 | Data encrypting and deciphering and desensitization runtime engine and its working method |
US20200387627A1 (en) * | 2019-06-04 | 2020-12-10 | Digital Asset Holdings, LLC | Multi-user database system and method |
CN111898137A (en) * | 2020-06-30 | 2020-11-06 | 深圳致星科技有限公司 | Private data processing method, equipment and system for federated learning |
CN113157399A (en) * | 2021-05-17 | 2021-07-23 | 北京冲量在线科技有限公司 | Unsupervised joint modeling method based on ARM architecture chip |
CN113157400A (en) * | 2021-05-17 | 2021-07-23 | 北京冲量在线科技有限公司 | Multi-party unsupervised learning joint modeling method based on X86 computing chip |
CN113722754A (en) * | 2021-08-25 | 2021-11-30 | 上海阵方科技有限公司 | Generation method and device of privacy executable file and server |
Non-Patent Citations (3)
Title |
---|
MANAS A. PATHAK: "Multiparty Differential Privacy via Aggregation of Locally Trained Classifiers", 《ADVANCES IN NEUR INFORMATIONPROCESSIR SYSTEMS 23(NIPS 2010)》, 31 December 2010 (2010-12-31), pages 1 - 9 * |
吕军;杨超;王跃东;刘林;王新宁;: "基于多业务场景的大数据脱敏技术研究及其在电力用户隐私信息保护中的应用", 电力大数据, no. 07, 21 July 2018 (2018-07-21) * |
梁文娟;陈红;吴云乘;赵丹;李翠平;: "持续监控下差分隐私保护", 软件学报, no. 06, 8 June 2020 (2020-06-08) * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114996694A (en) * | 2022-08-01 | 2022-09-02 | 阿里云计算有限公司 | Data fusion method, device, system and storage medium |
CN116226928A (en) * | 2023-05-09 | 2023-06-06 | 京东科技控股股份有限公司 | Combined computing method, device, equipment and medium for multiparty business privacy data |
CN116226928B (en) * | 2023-05-09 | 2024-04-16 | 京东科技控股股份有限公司 | Combined computing method, device, equipment and medium for multiparty business privacy data |
CN118520438A (en) * | 2024-07-19 | 2024-08-20 | 浙江网商银行股份有限公司 | Data processing method and device |
CN118520438B (en) * | 2024-07-19 | 2024-11-29 | 浙江网商银行股份有限公司 | Data processing method and device |
Also Published As
Publication number | Publication date |
---|---|
CN114817982B (en) | 2025-05-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN114817982A (en) | Multi-party computing control method, device and equipment for providing privacy protection | |
TWI727115B (en) | A transaction processing method and equipment based on blockchain | |
Hu et al. | A review on cloud computing: Design challenges in architecture and security | |
CN107196900B (en) | Consensus checking method and device | |
CN112948900A (en) | Method and device for acquiring data under link applied to block chain system | |
US11017387B2 (en) | Cryptographically assured zero-knowledge cloud services for elemental transactions | |
US20200218829A1 (en) | Push down policy enforcement | |
US20170154192A1 (en) | Method and apparatus for specifying time-varying intelligent service-oriented model | |
WO2020220744A1 (en) | Blockchain-based data processing method and apparatus, and blockchain node | |
TWI737164B (en) | Data interaction method, device, server and electronic equipment | |
JP2005259126A (en) | Metered execution of code | |
US11487851B2 (en) | Using blockchain for flexible application licensing | |
US12294505B2 (en) | Cell-based architecture for an extensibility platform | |
US20180316572A1 (en) | Cloud lifecycle managment | |
US20200274758A1 (en) | Provisioning hybrid cloud resources in an operating environment | |
WO2021239087A1 (en) | Data processing method, apparatus and device, and medium | |
WO2002005074A2 (en) | Cryptographic services in a distributed application | |
CN115150117A (en) | Maintain confidentiality in a decentralized strategy | |
CN115567596B (en) | Cloud service resource deployment method, device, equipment and storage medium | |
Thoma et al. | Automated operator placement in distributed data stream management systems subject to user constraints | |
WO2024066973A1 (en) | Operating system based on dual system paradigm | |
CN115795553B (en) | Data processing method, system, equipment and storage medium | |
US12254099B2 (en) | Autoencryption system for data in a container | |
CN118614034A (en) | Chained lists for key management and authentication | |
CN107169761B (en) | Method and device for generating IC (integrated circuit) card security data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |