CN102611692A - 多承租人数据中心中的安全计算 - Google Patents
多承租人数据中心中的安全计算 Download PDFInfo
- Publication number
- CN102611692A CN102611692A CN201210011020XA CN201210011020A CN102611692A CN 102611692 A CN102611692 A CN 102611692A CN 201210011020X A CN201210011020X A CN 201210011020XA CN 201210011020 A CN201210011020 A CN 201210011020A CN 102611692 A CN102611692 A CN 102611692A
- Authority
- CN
- China
- Prior art keywords
- input
- function
- share
- computing devices
- physical computing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5061—Partitioning or combining of resources
- G06F9/5072—Grid computing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/46—Secure multiparty computation, e.g. millionaire problem
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Mathematical Physics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (10)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/007,365 | 2011-01-14 | ||
US13/007,365 US8700906B2 (en) | 2011-01-14 | 2011-01-14 | Secure computing in multi-tenant data centers |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102611692A true CN102611692A (zh) | 2012-07-25 |
CN102611692B CN102611692B (zh) | 2014-11-19 |
Family
ID=46491777
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210011020.XA Active CN102611692B (zh) | 2011-01-14 | 2012-01-13 | 多承租人数据中心中的安全计算方法 |
Country Status (5)
Country | Link |
---|---|
US (1) | US8700906B2 (zh) |
EP (1) | EP2663948B1 (zh) |
CN (1) | CN102611692B (zh) |
HK (1) | HK1171877A1 (zh) |
WO (1) | WO2012097110A2 (zh) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108574575A (zh) * | 2017-03-07 | 2018-09-25 | 罗伯特·博世有限公司 | 数据处理方法和数据处理设备 |
CN110601824A (zh) * | 2019-08-26 | 2019-12-20 | 北京思源理想控股集团有限公司 | 信息的传输方法及装置 |
CN111771199A (zh) * | 2017-12-22 | 2020-10-13 | 皇家飞利浦有限公司 | 将第一函数应用于数据集中的每个数据元素的计算机实施的方法以及实施该方法的工作者节点 |
CN112669150A (zh) * | 2020-12-25 | 2021-04-16 | 联想(北京)有限公司 | 基于区块链的数据处理方法、装置及*** |
CN112685793A (zh) * | 2020-12-25 | 2021-04-20 | 联想(北京)有限公司 | 基于区块链的数据处理方法、装置和*** |
CN112751665A (zh) * | 2019-10-30 | 2021-05-04 | 阿里巴巴集团控股有限公司 | 一种安全多方计算方法、设备、***及存储介质 |
WO2021135793A1 (zh) * | 2019-12-30 | 2021-07-08 | 深圳前海微众银行股份有限公司 | 多方秘密分享方法、设备及可读存储介质 |
Families Citing this family (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5821040B2 (ja) * | 2012-03-27 | 2015-11-24 | 株式会社日立ソリューションズ | データ管理装置、データ分割装置およびデータ復元装置 |
US9292673B2 (en) * | 2013-03-15 | 2016-03-22 | International Business Machines Corporation | Virtual key management and isolation of data deployments in multi-tenant environments |
US9846596B1 (en) * | 2013-06-24 | 2017-12-19 | Hrl Laboratories, Llc | System and method for cloud control operations plane based on proactive security algorithms |
US9384362B2 (en) | 2013-10-14 | 2016-07-05 | Intuit Inc. | Method and system for distributing secrets |
US9396338B2 (en) | 2013-10-15 | 2016-07-19 | Intuit Inc. | Method and system for providing a secure secrets proxy |
US9444818B2 (en) | 2013-11-01 | 2016-09-13 | Intuit Inc. | Method and system for automatically managing secure communications in multiple communications jurisdiction zones |
US9894069B2 (en) | 2013-11-01 | 2018-02-13 | Intuit Inc. | Method and system for automatically managing secret application and maintenance |
US9467477B2 (en) | 2013-11-06 | 2016-10-11 | Intuit Inc. | Method and system for automatically managing secrets in multiple data security jurisdiction zones |
US9282122B2 (en) * | 2014-04-30 | 2016-03-08 | Intuit Inc. | Method and apparatus for multi-tenancy secrets management |
WO2016019294A1 (en) | 2014-07-31 | 2016-02-04 | Cornell University | Oblivious parallel random access machine system and methods |
US9967319B2 (en) * | 2014-10-07 | 2018-05-08 | Microsoft Technology Licensing, Llc | Security context management in multi-tenant environments |
WO2016113738A1 (en) * | 2015-01-15 | 2016-07-21 | B. G. Negev Technologies And Applications Ltd., At Ben-Gurion University | Secret shared random access machine |
US9898337B2 (en) | 2015-03-27 | 2018-02-20 | International Business Machines Corporation | Dynamic workload deployment for data integration services |
EP3296980B1 (en) * | 2015-05-14 | 2021-08-04 | Nippon Telegraph and Telephone Corporation | Database system and database processing method |
US10110566B2 (en) | 2015-07-21 | 2018-10-23 | Baffle, Inc. | Systems and processes for executing private programs on untrusted computers |
JP6607257B2 (ja) * | 2015-08-31 | 2019-11-20 | 日本電気株式会社 | 秘密計算システム、秘密計算装置、および、秘密計算方法 |
US10439803B2 (en) | 2016-11-14 | 2019-10-08 | Microsoft Technology Licensing, Llc | Secure key management |
US10936711B2 (en) | 2017-04-18 | 2021-03-02 | Intuit Inc. | Systems and mechanism to control the lifetime of an access token dynamically based on access token use |
EP3662615B1 (en) | 2017-08-03 | 2023-01-11 | HRL Laboratories, LLC | Privacy-preserving multi-client and cloud computation with application to secure navigation |
US10635829B1 (en) | 2017-11-28 | 2020-04-28 | Intuit Inc. | Method and system for granting permissions to parties within an organization |
US10862908B2 (en) | 2018-08-09 | 2020-12-08 | Hrl Laboratories, Llc | System and method for consensus ordering of broadcast messages |
US10887092B2 (en) * | 2018-08-09 | 2021-01-05 | Hrl Laboratories, Llc | Anonymous allocation and majority voting in a compromised environment |
US11120160B2 (en) | 2019-05-31 | 2021-09-14 | Advanced New Technologies Co., Ltd. | Distributed personal data storage and encrypted personal data service based on secure computation |
US11695559B2 (en) * | 2019-09-30 | 2023-07-04 | Salesforce, Inc. | Nested tenancy that permits a hierarchy having a plurality of levels |
US11799643B2 (en) | 2021-01-19 | 2023-10-24 | Bank Of America Corporation | Collaborative architecture for secure data sharing |
CN113672348B (zh) * | 2021-08-10 | 2024-06-18 | 支付宝(杭州)信息技术有限公司 | 基于容器集群对联合计算多方进行服务校验的方法及*** |
GB2617153A (en) * | 2022-03-31 | 2023-10-04 | Nchain Licensing Ag | Threshold-optimal multi-party computation |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5263085A (en) * | 1992-11-13 | 1993-11-16 | Yeda Research & Development Co. Ltd. | Fast signature scheme based on sequentially linearized equations |
CN1531241A (zh) * | 2003-03-13 | 2004-09-22 | ͬ�Ϳ�ҵ��ʽ���� | 密码重构方法、分散密码重构装置及密码重构*** |
CN101569132A (zh) * | 2006-11-07 | 2009-10-28 | 安全第一公司 | 用于分发数据和保护数据安全的***和方法 |
US20100132016A1 (en) * | 2008-11-26 | 2010-05-27 | James Michael Ferris | Methods and systems for securing appliances for use in a cloud computing environment |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7146233B2 (en) * | 2000-02-11 | 2006-12-05 | Sun Microsystems, Inc. | Request queue management |
US6772339B1 (en) | 2000-03-13 | 2004-08-03 | Lucent Technologies Inc. | Mix and match: a new approach to secure multiparty computation |
US7380039B2 (en) * | 2003-12-30 | 2008-05-27 | 3Tera, Inc. | Apparatus, method and system for aggregrating computing resources |
US20050201555A1 (en) | 2004-02-09 | 2005-09-15 | I-Ling Yen | System, method and apparatus for secure computation on encrypted data |
US8069153B2 (en) | 2005-12-02 | 2011-11-29 | Salesforce.Com, Inc. | Systems and methods for securing customer data in a multi-tenant environment |
US8769268B2 (en) * | 2007-07-20 | 2014-07-01 | Check Point Software Technologies, Inc. | System and methods providing secure workspace sessions |
US8861734B2 (en) | 2007-08-22 | 2014-10-14 | Nec Corporation | Secret information distribution system, method, program, and transmission system |
US8010782B2 (en) * | 2008-01-18 | 2011-08-30 | Sap Ag | Method and system for mediated secure computation |
US8874868B2 (en) * | 2010-05-19 | 2014-10-28 | Cleversafe, Inc. | Memory utilization balancing in a dispersed storage network |
US20120002811A1 (en) * | 2010-06-30 | 2012-01-05 | The University Of Bristol | Secure outsourced computation |
AU2011289239B2 (en) * | 2010-08-12 | 2016-02-25 | Security First Corp. | Systems and methods for secure remote storage of data |
-
2011
- 2011-01-14 US US13/007,365 patent/US8700906B2/en active Active
-
2012
- 2012-01-12 WO PCT/US2012/021002 patent/WO2012097110A2/en active Application Filing
- 2012-01-12 EP EP12734355.6A patent/EP2663948B1/en active Active
- 2012-01-13 CN CN201210011020.XA patent/CN102611692B/zh active Active
- 2012-12-04 HK HK12112503.1A patent/HK1171877A1/zh unknown
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5263085A (en) * | 1992-11-13 | 1993-11-16 | Yeda Research & Development Co. Ltd. | Fast signature scheme based on sequentially linearized equations |
CN1531241A (zh) * | 2003-03-13 | 2004-09-22 | ͬ�Ϳ�ҵ��ʽ���� | 密码重构方法、分散密码重构装置及密码重构*** |
CN101569132A (zh) * | 2006-11-07 | 2009-10-28 | 安全第一公司 | 用于分发数据和保护数据安全的***和方法 |
US20100132016A1 (en) * | 2008-11-26 | 2010-05-27 | James Michael Ferris | Methods and systems for securing appliances for use in a cloud computing environment |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108574575A (zh) * | 2017-03-07 | 2018-09-25 | 罗伯特·博世有限公司 | 数据处理方法和数据处理设备 |
CN111771199A (zh) * | 2017-12-22 | 2020-10-13 | 皇家飞利浦有限公司 | 将第一函数应用于数据集中的每个数据元素的计算机实施的方法以及实施该方法的工作者节点 |
CN111771199B (zh) * | 2017-12-22 | 2024-06-04 | 皇家飞利浦有限公司 | 将第一函数应用于数据集中的数据元素的计算机实施的方法以及实施该方法的工作者节点 |
CN110601824A (zh) * | 2019-08-26 | 2019-12-20 | 北京思源理想控股集团有限公司 | 信息的传输方法及装置 |
CN110601824B (zh) * | 2019-08-26 | 2023-06-13 | 北京思源理想控股集团有限公司 | 信息的传输方法及装置 |
CN112751665A (zh) * | 2019-10-30 | 2021-05-04 | 阿里巴巴集团控股有限公司 | 一种安全多方计算方法、设备、***及存储介质 |
WO2021083179A1 (zh) * | 2019-10-30 | 2021-05-06 | 阿里巴巴集团控股有限公司 | 一种安全多方计算方法、设备、***及存储介质 |
WO2021135793A1 (zh) * | 2019-12-30 | 2021-07-08 | 深圳前海微众银行股份有限公司 | 多方秘密分享方法、设备及可读存储介质 |
CN112669150A (zh) * | 2020-12-25 | 2021-04-16 | 联想(北京)有限公司 | 基于区块链的数据处理方法、装置及*** |
CN112685793A (zh) * | 2020-12-25 | 2021-04-20 | 联想(北京)有限公司 | 基于区块链的数据处理方法、装置和*** |
Also Published As
Publication number | Publication date |
---|---|
EP2663948A4 (en) | 2014-08-13 |
HK1171877A1 (zh) | 2013-04-05 |
US20120185946A1 (en) | 2012-07-19 |
EP2663948A2 (en) | 2013-11-20 |
CN102611692B (zh) | 2014-11-19 |
WO2012097110A3 (en) | 2013-01-10 |
WO2012097110A2 (en) | 2012-07-19 |
EP2663948B1 (en) | 2016-04-13 |
US8700906B2 (en) | 2014-04-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102611692B (zh) | 多承租人数据中心中的安全计算方法 | |
US10476662B2 (en) | Method for operating a distributed key-value store | |
Burmester et al. | Lightweight RFID authentication with forward and backward security | |
US9009089B1 (en) | Secure pattern matching | |
US10423459B1 (en) | Resource manager | |
US20170155677A1 (en) | Systems and methods for data driven game theoretic cyber threat mitigation | |
US10474831B1 (en) | Large network attached storage encryption | |
Van Rompay et al. | A leakage-abuse attack against multi-user searchable encryption | |
Suarez-Tangil et al. | Stegomalware: Playing hide and seek with malicious components in smartphone apps | |
US11558403B2 (en) | Quantum computing machine learning for security threats | |
CN107094261A (zh) | 视频播放的权限校验方法及装置 | |
Liu et al. | New provable data transfer from provable data possession and deletion for secure cloud storage | |
CN109891907A (zh) | 使用可信平台模块验证在客户端设备处对视频内容的渲染 | |
Jayaraman et al. | RETRACTED ARTICLE: A novel privacy preserving digital forensic readiness provable data possession technique for health care data in cloud | |
WO2021055046A1 (en) | Privacy enhanced machine learning | |
Liang et al. | Fog-based secure service discovery for internet of multimedia things: a cross-blockchain approach | |
Tufail et al. | Relational database security using digital watermarking and evolutionary techniques | |
Syam Kumar et al. | RSA-based dynamic public audit service for integrity verification of data storage in cloud computing using Sobol sequence | |
Wan et al. | Efficient privacy-preserving third-party auditing for ambient intelligence systems | |
CN113434177B (zh) | 一种基于医疗数据安全的医疗软件更新方法及装置 | |
US11563576B2 (en) | Distributed anonymous scoring technique | |
Shin et al. | Identification of corrupted cloud storage in batch auditing | |
Wang et al. | Cloud data integrity verification algorithm based on data mining and accounting informatization | |
Li et al. | Post‐Quantum Privacy‐Preserving Provable Data Possession Scheme Based on Smart Contracts | |
Chinnici et al. | The network topology of connecting things: defence of IoT graph in the smart city |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1171877 Country of ref document: HK |
|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
ASS | Succession or assignment of patent right |
Owner name: MICROSOFT TECHNOLOGY LICENSING LLC Free format text: FORMER OWNER: MICROSOFT CORP. Effective date: 20150428 |
|
C41 | Transfer of patent application or patent right or utility model | ||
TR01 | Transfer of patent right |
Effective date of registration: 20150428 Address after: Washington State Patentee after: Micro soft technique license Co., Ltd Address before: Washington State Patentee before: Microsoft Corp. |
|
REG | Reference to a national code |
Ref country code: HK Ref legal event code: GR Ref document number: 1171877 Country of ref document: HK |