CN115021962B - Distributed trusted privacy computing system - Google Patents

Distributed trusted privacy computing system Download PDF

Info

Publication number
CN115021962B
CN115021962B CN202210470744.4A CN202210470744A CN115021962B CN 115021962 B CN115021962 B CN 115021962B CN 202210470744 A CN202210470744 A CN 202210470744A CN 115021962 B CN115021962 B CN 115021962B
Authority
CN
China
Prior art keywords
module
node
distributed
privacy
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210470744.4A
Other languages
Chinese (zh)
Other versions
CN115021962A (en
Inventor
阮安邦
魏明
陈凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Octa Innovations Information Technology Co Ltd
Original Assignee
Beijing Octa Innovations Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Octa Innovations Information Technology Co Ltd filed Critical Beijing Octa Innovations Information Technology Co Ltd
Priority to CN202210470744.4A priority Critical patent/CN115021962B/en
Publication of CN115021962A publication Critical patent/CN115021962A/en
Application granted granted Critical
Publication of CN115021962B publication Critical patent/CN115021962B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/46Secure multiparty computation, e.g. millionaire problem

Abstract

The invention discloses a distributed trusted privacy computing system, which comprises a trusted privacy computing system and a distributed verification system; the distributed verification system comprises a node verification port module, a node identity verification module, an identity information storage module and an access record storage module, wherein the node verification port module is connected with the identity information storage module and the access record storage module through the node identity verification module. The invention relates to a trusted privacy computing system and a distributed verification system comprising a node verification port module, a node identity verification module, an identity information storage module and an access record storage module, wherein before a visitor accesses the distributed verification system, strict supervision records are carried out on the visitor accessing the privacy computing system in the modes of node verification, node identity storage and node access records, so that the safety and the reliability of the distributed trusted privacy computing system are ensured.

Description

Distributed trusted privacy computing system
Technical Field
The invention belongs to the technical field of distributed trusted privacy computing systems, and particularly relates to a distributed trusted privacy computing system.
Background
Privacy computing (Privacy computer) refers to a technical set for realizing data analysis and computation on the premise of protecting data per se from external leakage, so as to achieve the purpose of being 'available and invisible' for the data; on the premise of fully protecting data and privacy safety, the conversion and release of data value are realized. The privacy calculation is a calculation theory and method for protecting the whole life cycle of the privacy information, and is a computable model and a axiom system for privacy measurement, privacy leakage cost, privacy protection and privacy analysis complexity when the ownership, management and use rights of the privacy information are separated; compared with the traditional data using mode, the encryption mechanism of Privacy computer (Privacy computer) can enhance the protection of data and reduce the risk of data leakage. Thus, some countries and regions, including the European Union, consider it as one implementation of "data minimization". Meanwhile, the traditional data security means, such as data desensitization or anonymization processing, are required to be carried out at the expense of partial data dimension, so that data information cannot be effectively utilized, and privacy calculation provides another solution thought, so that the data value is maximized as much as possible on the premise of security. In the prior art, the security of the internal private computing deployment of the technology related to the inside of the trusted private computing system is higher, however, certain supervision problems exist on the access identity and access record of the computing system, and in order to strictly supervise the identity information and access record of the visitor of the trusted private computing system and enhance the data security of the whole computing system, a distributed trusted private computing system is provided for solving the problems existing in the prior art.
Disclosure of Invention
The invention aims to provide a distributed trusted privacy computing system, wherein before a visitor accesses the distributed verification system, strict supervision records are carried out on the visitor accessing the privacy computing system in the modes of node verification, node identity storage and node access records, so that the problems in the prior art are solved.
In order to achieve the above purpose, the invention adopts the following technical scheme:
a distributed trusted privacy computing system comprising a trusted privacy computing system and a distributed verification system;
the distributed verification system comprises a node verification port module, a node identity verification module, an identity information storage module and an access record preservation module, wherein the node verification port module is connected with the identity information storage module and the access record preservation module through the node identity verification module, the node verification port module is used as an access client port of a visitor accessing the trusted privacy computing system, and the node identity verification module is used for carrying out identity verification on the visitor of the trusted privacy computing system;
the trusted privacy computing system comprises a node data acquisition module, a data function processing module, a target function fitting module, a node distribution module, a relay node processing module, a distributed node butting module, a distributed node integration module and a privacy computing result acquisition module, wherein the node data acquisition module, the data function processing module and the target function fitting module are connected with the relay node processing module, the distributed node butting module, the distributed node integration module and the privacy computing result acquisition module through the node distribution module.
Preferably, the identity information storage module is used for storing the identity data input into the node verification port module when the visitor of the trusted privacy computing system accesses the identity information storage module, and only the identity information can be modified and edited by the visitor of the identity information stored in the identity information storage module.
Preferably, the access record keeping module is used for keeping access records of all trusted privacy computing system visitors, and the access records inside the access record keeping module can not be deleted.
Preferably, the access records in the access record storage module are stored in the blockchain network of the node in a distributed mode, and the access records can be read through integration of multiple nodes.
Preferably, the node data acquisition module is used for acquiring the distributed single-node data by a visitor, the single-node data acquired by the node data acquisition module is transmitted to the data function processing module, and the data function processing module is used for processing the data acquired by the node data acquisition module.
Preferably, the objective function fitting module is configured to perform objective function processing on data acquired by a single node, and transmit the data subjected to objective function processing to the relay node processing module through the node allocation module.
Preferably, the node allocation module is configured to allocate data of single nodes, so that a certain number of single nodes correspond to relay nodes, and the relay node processing module is provided with a plurality of relay node processing modules, which are configured to interface with the corresponding number of single nodes and process the data of the nodes, and transmit the processed data to the distributed node interfacing module.
Preferably, the distributed node docking module is configured to dock the plurality of relay node processing modules and obtain data processed by the plurality of relay nodes, the distributed node integration module is configured to integrate the plurality of relay node data obtained by the distributed node docking module and transmit the integrated data to the privacy calculation result obtaining module, and the privacy calculation result obtaining module is configured to directly display the data result of privacy calculation for the visitor.
Preferably, the privacy calculation realizes conversion and release of data value on the premise of fully protecting data and privacy security, and the privacy calculation is a calculation theory and method for protecting the whole life cycle of the privacy information, and is a computable model and a axiom system of privacy measurement, privacy leakage cost, privacy protection and privacy analysis complexity when the ownership, management and use rights of the privacy information are separated.
Preferably, the privacy computing is a cross-fusion technology covering a plurality of disciplines, and currently mainstream privacy computing technologies are mainly divided into three categories: the first is a cryptography-based privacy computing technique represented by multiparty security computing; the second category is a technology of fusion and derivation of artificial intelligence and privacy protection technology represented by federal learning; the third class is a trusted hardware-based privacy computing technique represented by a trusted execution environment; different technologies are often used in combination, so that the calculation and analysis tasks of the data are completed while the safety and privacy of the original data are ensured.
The invention has the technical effects and advantages that: compared with the prior art, the distributed trusted privacy computing system provided by the invention has the following advantages:
the invention relates to a trusted privacy computing system and a distributed verification system comprising a node verification port module, a node identity verification module, an identity information storage module and an access record storage module, wherein before a visitor accesses the distributed verification system, strict supervision records are carried out on the visitor accessing the privacy computing system in the modes of node verification, node identity storage and node access records, so that the safety and the reliability of the distributed trusted privacy computing system are ensured; the distributed trusted privacy computing system disclosed by the invention realizes conversion and release of data value on the premise of fully protecting data and privacy security, and the privacy computing is a computing theory and method for protecting the whole life cycle of the privacy information, and is a computable model and a rationalized system of privacy measurement, privacy leakage cost, privacy protection and privacy analysis complexity when the ownership, management and use rights of the privacy information are separated.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention may be realized and attained by the structure particularly pointed out in the written description and drawings.
Drawings
FIG. 1 is a system block diagram of a distributed trusted privacy computing system of the present invention.
Description of the embodiments
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. The specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The present invention provides an embodiment as shown in fig. 1:
a distributed trusted privacy computing system comprising a trusted privacy computing system and a distributed verification system;
the distributed verification system comprises a node verification port module, a node identity verification module, an identity information storage module and an access record preservation module, wherein the node verification port module is connected with the identity information storage module and the access record preservation module through the node identity verification module, the node verification port module is used as an access client port of a visitor accessing the trusted privacy computing system, and the node identity verification module is used for carrying out identity verification on the visitor of the trusted privacy computing system;
the trusted privacy computing system comprises a node data acquisition module, a data function processing module, a target function fitting module, a node distribution module, a relay node processing module, a distributed node butting module, a distributed node integration module and a privacy computing result acquisition module, wherein the node data acquisition module, the data function processing module and the target function fitting module are connected with the relay node processing module, the distributed node butting module, the distributed node integration module and the privacy computing result acquisition module through the node distribution module.
The node data acquisition module is used for acquiring distributed single-node data by a visitor, the single-node data acquired by the node data acquisition module is transmitted to the data function processing module, and the data function processing module is used for processing the data acquired by the node data acquisition module; the objective function fitting module is used for performing objective function processing on data acquired by a single node, and transmitting the data subjected to objective function processing to the relay node processing module through the node distribution module.
The node distribution module is used for distributing the data of the single nodes to enable a certain number of single nodes to correspond to the relay nodes, the relay node processing module is provided with a plurality of single nodes which are in butt joint with the corresponding number of single nodes and process the data of the nodes, and the processed data are transmitted to the distributed node butt joint module.
The distributed node docking module is used for docking the plurality of relay node processing modules and acquiring data processed by the plurality of relay nodes, the distributed node integration module is used for integrating the plurality of relay node data acquired by the distributed node docking module and transmitting the integrated data to the privacy calculation result acquisition module, and the privacy calculation result acquisition module is used for directly displaying the data result of privacy calculation for visitors.
The identity information storage module is used for storing the identity data of the input node verification port module when a visitor of the trusted privacy computing system accesses the identity information storage module, and only the identity information of the identity information stored in the identity information storage module can be modified and edited by the visitor.
The access record preservation module is used for preserving the access records of all the trusted private computing system visitors, and the access records inside the access record preservation module can not be deleted.
The access records in the access record storage module are stored in the block chain network of the node in a distributed mode, and the access records can be read through integration of multiple nodes.
The privacy calculation realizes conversion and release of data value on the premise of fully protecting data and privacy safety, is a calculation theory and method for protecting the whole life cycle of the privacy information, and is a computable model and a rationalized system of privacy measurement, privacy leakage cost, privacy protection and privacy analysis complexity when the ownership, management and use rights of the privacy information are separated; the privacy computing is a cross fusion technology covering a plurality of subjects, and currently mainstream privacy computing technologies are mainly divided into three categories: the first is a cryptography-based privacy computing technique represented by multiparty security computing; the second category is a technology of fusion and derivation of artificial intelligence and privacy protection technology represented by federal learning; the third class is a trusted hardware-based privacy computing technique represented by a trusted execution environment; different technologies are often used in combination, so that the calculation and analysis tasks of the data are completed while the safety and privacy of the original data are ensured.
In summary, in the trusted private computing system and the distributed verification system comprising the node verification port module, the node identity verification module, the identity information storage module and the access record storage module, before a visitor accesses the distributed verification system, strict supervision records are carried out on the visitor accessing the private computing system in the modes of node verification, node identity storage and node access records, so that the safety and reliability of the distributed trusted private computing system are ensured; the distributed trusted privacy computing system disclosed by the invention realizes conversion and release of data value on the premise of fully protecting data and privacy security, and the privacy computing is a computing theory and method for protecting the whole life cycle of the privacy information, and is a computable model and a rationalized system of privacy measurement, privacy leakage cost, privacy protection and privacy analysis complexity when the ownership, management and use rights of the privacy information are separated.
Finally, it should be noted that: the foregoing description is only illustrative of the preferred embodiments of the present invention, and although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that modifications may be made to the embodiments described, or equivalents may be substituted for elements thereof, and any modifications, equivalents, improvements or changes may be made without departing from the spirit and principles of the present invention.

Claims (8)

1. A distributed trusted private computing system, comprising:
a trusted private computing system and a distributed authentication system;
the distributed verification system comprises a node verification port module, a node identity verification module, an identity information storage module and an access record preservation module, wherein the node verification port module is connected with the identity information storage module and the access record preservation module through the node identity verification module, the node verification port module is used as an access client port of a visitor accessing the trusted privacy computing system, and the node identity verification module is used for carrying out identity verification on the visitor of the trusted privacy computing system;
the trusted privacy computing system comprises a node data acquisition module, a data function processing module, a target function fitting module, a node distribution module, a relay node processing module, a distributed node docking module, a distributed node integration module and a privacy computing result acquisition module, wherein the node data acquisition module, the data function processing module and the target function fitting module are connected with the relay node processing module, the distributed node docking module, the distributed node integration module and the privacy computing result acquisition module through the node distribution module;
the node data acquisition module is used for acquiring distributed single-node data by a visitor, the single-node data acquired by the node data acquisition module is transmitted to the data function processing module, and the data function processing module is used for processing the data acquired by the node data acquisition module.
2. A distributed trusted privacy computing system as defined in claim 1, wherein: the identity information storage module is used for storing the identity data of the input node verification port module when a visitor of the trusted privacy computing system accesses the identity information storage module, and only the identity information of the identity information stored in the identity information storage module can be modified and edited by the visitor.
3. A distributed trusted privacy computing system as defined in claim 1, wherein: the access record preservation module is used for preserving the access records of all the trusted private computing system visitors, and the access records inside the access record preservation module can not be deleted.
4. A distributed trusted privacy computing system as defined in claim 3, wherein: the access records in the access record storage module are stored in the block chain network of the node in a distributed mode, and the access records can be read through integration of multiple nodes.
5. A distributed trusted privacy computing system as defined in claim 1, wherein: the objective function fitting module is used for performing objective function processing on data acquired by a single node, and transmitting the data subjected to objective function processing to the relay node processing module through the node distribution module.
6. A distributed trusted privacy computing system as defined in claim 5, wherein: the node distribution module is used for distributing the data of the single nodes to enable a certain number of single nodes to correspond to the relay nodes, the relay node processing module is provided with a plurality of single nodes which are in butt joint with the corresponding number of single nodes and process the data of the nodes, and the processed data are transmitted to the distributed node butt joint module.
7. A distributed trusted privacy computing system as defined in claim 6, wherein: the distributed node docking module is used for docking the plurality of relay node processing modules and acquiring data processed by the plurality of relay nodes, the distributed node integration module is used for integrating the plurality of relay node data acquired by the distributed node docking module and transmitting the integrated data to the privacy calculation result acquisition module, and the privacy calculation result acquisition module is used for directly displaying the data result of privacy calculation for visitors.
8. A distributed trusted privacy computing system as defined in claim 1, wherein: the privacy calculation realizes conversion and release of data value on the premise of fully protecting data and privacy safety, is a calculation theory and method for protecting the whole life cycle of the privacy information, and is a computable model and a rationalized system of privacy measurement, privacy leakage cost, privacy protection and privacy analysis complexity when the ownership, management and use rights of the privacy information are separated.
CN202210470744.4A 2022-04-28 2022-04-28 Distributed trusted privacy computing system Active CN115021962B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210470744.4A CN115021962B (en) 2022-04-28 2022-04-28 Distributed trusted privacy computing system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210470744.4A CN115021962B (en) 2022-04-28 2022-04-28 Distributed trusted privacy computing system

Publications (2)

Publication Number Publication Date
CN115021962A CN115021962A (en) 2022-09-06
CN115021962B true CN115021962B (en) 2023-08-22

Family

ID=83067940

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210470744.4A Active CN115021962B (en) 2022-04-28 2022-04-28 Distributed trusted privacy computing system

Country Status (1)

Country Link
CN (1) CN115021962B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112380578A (en) * 2020-11-20 2021-02-19 天翼电子商务有限公司 Edge computing framework based on block chain and trusted execution environment
CN114020841A (en) * 2021-11-03 2022-02-08 广州广电运通金融电子股份有限公司 Data sharing system, method, storage medium and equipment
CN114036583A (en) * 2021-10-27 2022-02-11 浙江数秦科技有限公司 Asynchronous privacy calculation method based on intelligent contract

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111770200B (en) * 2020-08-31 2020-12-08 支付宝(杭州)信息技术有限公司 Information sharing method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112380578A (en) * 2020-11-20 2021-02-19 天翼电子商务有限公司 Edge computing framework based on block chain and trusted execution environment
CN114036583A (en) * 2021-10-27 2022-02-11 浙江数秦科技有限公司 Asynchronous privacy calculation method based on intelligent contract
CN114020841A (en) * 2021-11-03 2022-02-08 广州广电运通金融电子股份有限公司 Data sharing system, method, storage medium and equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于区块链的多方可验证隐私保护记录链接机制研究;顾绵雪;《中国优秀硕士学位论文全文数据库 信息科技辑》;全文 *

Also Published As

Publication number Publication date
CN115021962A (en) 2022-09-06

Similar Documents

Publication Publication Date Title
US11790097B1 (en) Systems and methods to track, store, and manage events, rights, and liabilities
CN106209947B (en) Data processing method and system for decentralized autonomous organization
CN108428141B (en) Food traceability information management system based on ERP system and block chain
Raghuvanshi et al. A review of various security and privacy innovations for IoT applications in healthcare
CN105516117A (en) Cloud computing based power data security storage method
Lu et al. A model for multilevel security in computer networks
CN116168820A (en) Medical data interoperation method based on virtual integration and blockchain fusion
CN112532718A (en) Block chain based offshore equipment data sharing system, method and medium
CN109754851A (en) A kind of medical file stores, transfers and exchanges the intelligent medical treatment system of management
El-Din et al. Information integrity for multi-sensors data fusion in smart mobility
CN115021962B (en) Distributed trusted privacy computing system
CN107742141B (en) Intelligent identity information acquisition method and system based on RFID technology
CN110515649A (en) A kind of computer software development management system
CN105678176A (en) Mandatory access control method under virtual environment
CN112528272A (en) Public open data-based security and privacy integrated protection system and method
CN110430207A (en) A kind of smart grid multi-point remote inter-network interaction collaboration authentication method
Shashi Leveraging Blockchain-based electronic health record systems in healthcare 4.0
CN112911002B (en) Block chain data sharing encryption method
Laufer et al. Modelling data protection in fog computing systems using UMLsec and SysML-Sec
RU85707U1 (en) THE MODEL OF SAFE PROCESSING OF INFORMATION OF DIFFERENT LEVELS OF PRIVACY IN INFORMATION-TELECOMMUNICATION SYSTEMS
Lin et al. Blockchain-based Secure Storage System for Medical Image Data
Luthfi et al. Towards Privacy by Design on the Internet of Things (IoT) Use: A Qualitative Descriptive Study
CN208637143U (en) Customer information control system
CN203233445U (en) High security internal network information safety system
Ou Research on university education management system based on big data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant