CN114662131A - Traditional Chinese medicine big data application open platform established based on privacy security calculation - Google Patents

Traditional Chinese medicine big data application open platform established based on privacy security calculation Download PDF

Info

Publication number
CN114662131A
CN114662131A CN202210370275.9A CN202210370275A CN114662131A CN 114662131 A CN114662131 A CN 114662131A CN 202210370275 A CN202210370275 A CN 202210370275A CN 114662131 A CN114662131 A CN 114662131A
Authority
CN
China
Prior art keywords
data
unit
module
application program
chinese medicine
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210370275.9A
Other languages
Chinese (zh)
Inventor
花海兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangyin Hospital Of Traditional Chinese Medicine
Original Assignee
Jiangyin Hospital Of Traditional Chinese Medicine
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangyin Hospital Of Traditional Chinese Medicine filed Critical Jiangyin Hospital Of Traditional Chinese Medicine
Priority to CN202210370275.9A priority Critical patent/CN114662131A/en
Publication of CN114662131A publication Critical patent/CN114662131A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H50/00ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics
    • G16H50/70ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for mining of medical data, e.g. analysing previous cases of other patients

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • General Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Public Health (AREA)
  • Biomedical Technology (AREA)
  • Pathology (AREA)
  • Epidemiology (AREA)
  • Primary Health Care (AREA)
  • Storage Device Security (AREA)

Abstract

The invention belongs to the technical field of big data, and particularly relates to a traditional Chinese medicine big data application open platform established based on privacy security calculation, which comprises an acquisition module, a decryption module, an operation module, an encryption module, a data processing module and a storage module, wherein application program data is instantiated into a container, an application program is operated in the container, and an input data set is read when the application program operates to obtain an output result; and acquiring an output result, sending the output result to a storage module, and deleting the working space and the container when the output result is acquired. According to the invention, the application program is instantiated into the container, the data is encrypted and decrypted at the same time, and the data privacy of the output result of the application program is protected by using the continuously generated secret key, so that the platform data can be fully utilized by third-party application on the premise of safety, privacy protection and authorized use, the data acquisition and data mining loose coupling mode of the Chinese medicine data in the large data platform is realized, and the high-quality Chinese medicine data asset is formed.

Description

Traditional Chinese medicine big data application open platform established based on privacy security calculation
Technical Field
The invention belongs to the technical field of big data, and particularly relates to a traditional Chinese medicine big data application open platform established based on privacy security calculation.
Background
Big data refers to data which is huge in scale and cannot be captured, managed, processed and arranged into data which can help users make more positive decisions within reasonable time through the conventional mainstream software tools. Important characteristics of big data are large amount, high speed, diversity and authenticity, and the analysis of big data generally adopts a method capable of analyzing all data simultaneously. As can be seen from the characteristics of the big data, the data in the medical field conforms to the characteristics of the big data and is a typical application field of the big data. Artificial intelligence technology is tightly integrated with big data research. Through a corresponding machine learning algorithm, the artificial intelligence technology can learn and manage the big data and form high-quality data assets.
Years of practical experience shows that the traditional Chinese medicine clinical patient data is data of special crowds and is very private personal data. In clinical research, the need to combine the clinical data of a patient with other types of data of an individual is often involved, increasing the data security risk. In addition, clinical research of traditional Chinese medicine involves many different professional knowledge such as medicine and statistics, and requires the participation of different professionals to interpret, analyze and research the data. In the process of applying big data and artificial intelligence, how to make full use of data on the premise of safety, privacy and data authorization is an urgent technical problem to be solved.
Disclosure of Invention
The technical solution of the present invention is proposed in view of the above problems. The invention provides a traditional Chinese medicine big data application open platform established based on privacy security calculation, which is used for solving the technical problem of fully utilizing data on the premise of security, privacy and data authorization in the big data application and artificial intelligence processes.
The invention is realized by adopting the following technical scheme:
a traditional Chinese medicine big data application open platform established based on privacy security calculation comprises:
the system comprises an acquisition module, a storage module and a processing module, wherein the acquisition module is used for acquiring application program data, a specified data set and a key corresponding to the specified data set;
the decryption module is used for decrypting the specified data set according to the secret key to obtain an input data set;
the operation module is used for instantiating the application program data into a container, operating the application program in the container, and reading the input data set when the application program operates to obtain an output result; the system is also used for creating a workspace which is used for storing temporary data generated when the application program runs;
the encryption module is used for generating a new key and encrypting the output result based on the new key to obtain an output data set;
the storage module is used for storing the output result obtained by the operation module and the output data set obtained by the encryption module;
and the data processing module is used for storing the output data set obtained by the encryption module into the storage module, sending the output data set to the storage module for storage, sending the output result to the storage module, and deleting the working space and the container when the output result is obtained.
As a further scheme of the present invention, the system further comprises a login module, wherein the login module is configured to obtain a login request and a login account sent by a user, and verify the login account after receiving the login request.
As a still further aspect of the present invention, the login module includes a receiving unit, a response unit, and a verification unit, wherein:
the receiving unit is used for acquiring a login request and a login account sent by a user, sending the login request to the response unit and the verification unit, and sending the login account to the verification unit;
the response unit is used for generating a verification instruction based on the login request and sending the verification instruction to the verification unit;
and the verification unit is used for receiving the verification instruction, verifying the login account information based on the verification instruction to obtain a verification result, and responding to the login request based on the verification result.
As a further aspect of the present invention, the login module further includes a database, and the database is used for storing the management code and the authorization code corresponding to the input data set.
As still further aspect of the present invention, the operation module includes a container construction unit and a storage allocation unit, wherein:
the system comprises a storage allocation unit, a storage unit and a processing unit, wherein the storage allocation unit is used for allocating system resources to obtain a working space and a calculation space, the working space is used for storing temporary data generated when an application program runs, and the calculation space is used for storing application program data;
and the program running unit is used for instantiating the application program data into a container, running the application program in the container, acquiring an input data set when the application program reads data, and running the application program based on the input data set to obtain an output result.
As a still further aspect of the present invention, the running module further includes a mount unit, where the mount unit is configured to mount the input data set as a virtual local data volume through an XFS CSI driver.
As a still further aspect of the present invention, the storage module includes a local storage unit and a system storage unit, wherein:
a local storage unit for storing the output data set;
and the system storage unit is used for storing the output result.
As a still further solution of the present invention, the storage space of the local storage unit is a storage space allocated by an XFS system of a platform, and the storage space of the local storage unit is a basic physical storage space of the platform.
As a still further aspect of the present invention, the data processing module includes a writing unit, a reading unit, a processing unit, and a deleting unit, wherein:
a write unit for writing the output data set into the storage module;
the reading unit is used for reading an output result generated by the running module running the application program;
the processing unit is used for acquiring an output result and sending the output result to the system storage module; the data processing unit is also used for generating a deleting instruction when the data result is sent and sending the deleting instruction to the deleting unit;
and the deleting unit is used for acquiring a deleting instruction and deleting the work workpiece and the container based on the deleting instruction.
As a further scheme of the present invention, the present invention further includes an output module, the output module is connected to the encryption module and the storage module, and the output module is configured to obtain the new key and the output data set, and output the new key and the output data set.
The technical scheme provided by the invention has the following beneficial effects: according to the invention, the application program is instantiated into the container, the data is encrypted and decrypted at the same time, and the data privacy of the output result of the application program is protected by using the continuously generated secret key, so that the platform data can be fully utilized by third-party application on the premise of safety, privacy protection and authorized use, the data acquisition and data mining loose coupling mode of the Chinese medicine data in the large data platform is realized, and the high-quality Chinese medicine data asset is formed.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
fig. 1 is a structural block diagram of an open platform for big data application of traditional Chinese medicine established based on privacy security calculation.
Fig. 2 is a block diagram of a connection structure between a login module and an acquisition module in an open platform for a big data application of traditional Chinese medicine established based on privacy security calculation.
Fig. 3 is a block diagram of a login module in an open platform for big data applications of traditional Chinese medicine, which is established based on privacy security calculation.
Fig. 4 is a block diagram of a data processing module in an open platform for big data application of traditional Chinese medicine, which is established based on privacy security calculation.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
It is noted that various aspects of the embodiments are described below within the scope of the appended claims. It should be apparent that the aspects described herein may be embodied in a wide variety of forms and that any specific structure and/or function described herein is merely illustrative. Based on the disclosure, one skilled in the art should appreciate that one aspect described herein may be implemented independently of any other aspects and that two or more of these aspects may be combined in various ways. For example, an apparatus may be implemented and/or a method practiced using any number of the aspects set forth herein. Additionally, such an apparatus may be implemented and/or such a method may be practiced using other structure and/or functionality in addition to one or more of the aspects set forth herein.
It should be understood that although the terms first, second, etc. may be used to describe various information in embodiments of the present invention, the information should not be limited by these terms. These terms are only used to distinguish one type of information from another.
Big data refers to data which is huge in scale and cannot be captured, managed, processed and arranged into data which can help users make more positive decisions within reasonable time through the conventional mainstream software tools. Important characteristics of big data are large amount, high speed, diversity and authenticity, and the analysis of big data generally adopts a method capable of analyzing all data simultaneously. As can be seen from the characteristics of the big data, the data in the medical field conforms to the characteristics of the big data, and is a typical application field of the big data. Artificial intelligence technology is tightly integrated with big data research. Through a corresponding machine learning algorithm, the artificial intelligence technology can learn and manage the big data and form high-quality data assets.
Years of practical experience shows that the traditional Chinese medicine clinical patient data is data of special crowds and is very private personal data. In clinical research, there is often a need to combine the clinical data of a patient with other types of data of an individual, increasing the data security risk. In addition, clinical research of traditional Chinese medicine involves many different professional knowledge such as medicine and statistics, and requires the participation of different professionals to interpret, analyze and research the data. In the process of applying big data and artificial intelligence, how to make full use of data on the premise of safety, privacy and data authorization is an urgent technical problem to be solved.
Based on this, please refer to fig. 1, an embodiment of the present application provides an open platform for big data application of traditional Chinese medicine based on privacy security calculation, which includes an obtaining module 100, a decrypting module 200, an operating module 300, an encrypting module 500, a data processing module 400, and a storing module 600, where:
an obtaining module 100, configured to obtain application data, a specified data set, and a key corresponding to the specified data set;
a decryption module 200, configured to decrypt the specified data set according to the key to obtain an input data set;
the running module 300 is configured to instantiate the application data into a container, run the application in the container, and read the input data set when the application runs, so as to obtain an output result; the system is also used for creating a workspace which is used for storing temporary data generated when the application program runs;
an encryption module 500, configured to generate a new key, and encrypt the output result based on the new key to obtain an output data set;
a storage module 600, configured to store the output result obtained by the running module and the output data set obtained by the encryption module;
a data processing module 400, configured to store an output data set into the storage module 600, where the output data set is an output data set obtained when the storing operation is performed; and is further configured to obtain an output result, send the output result to the storage module 600, and delete the workspace and the container when obtaining the output result.
It should be noted that the open platform for big data application of traditional Chinese medicine established based on privacy security calculation adopts a loose coupling mode, and is downward compatible with a data source, a system supported by the data source comprises EMR, traditional Chinese medicine data, HIS, LIS, RIS/PACS, Genomics and the like, realizes data service system docking and data integration, realizes data acquisition, and is upward oriented to traditional Chinese medicine application of a specific scene, specifically comprises application research of a plurality of traditional Chinese medicines, the content of the traditional Chinese medicine application research comprises research of traditional Chinese medicine curative effects, such as different indication researches, different population researches, and traditional Chinese medicine security researches, including drug administration toxicity researches, genetic toxicity researches and the like, and the application adopts schemes of different enterprises or teams to develop analysis and mining of big data of traditional Chinese medicine;
and the application programs comprise the application programs developed by the users and the application programs built in the platform, the built-in applications of the platform and the programs developed by the users are deployed in a containerization mode, the application programs are operated according to the specified input data set input by the users to obtain an output data set, and the output data set is used for application research of traditional Chinese medicines to realize traditional Chinese medicine application facing specific scenes upwards.
Referring to fig. 2-3, in an embodiment of the present invention, in order to improve privacy of platform data, the platform further includes a login module 700, where the login module 700 is connected to the obtaining module 100, the login module 700 is configured to obtain a login request and a login account sent by a user, and authenticate the login account after receiving the login request, and the login module 700 includes a receiving unit 710, a response unit 720, and an authentication unit 730, where:
a receiving unit 710, configured to obtain a login request and a login account sent by a user, send the login request to a response unit 720 and a verification unit 730, and send the login account to the verification unit 730;
a response unit 720, configured to generate an authentication instruction based on the login request, and send the authentication instruction to the authentication unit 730;
the verification unit 730 is configured to receive a verification instruction, verify the login account information based on the verification instruction to obtain a verification result, and respond to the login request based on the verification result.
It should be noted that the login module 700 further includes a database 740, the database 740 is configured to store management codes and authorization codes corresponding to input data sets, where there is only one management code, and at least one authorization code is provided, and the verification method of the verification unit 730 based on the management codes and the authorization codes is as follows:
s101, acquiring login account information and database 740 data information;
s102, verifying login account information based on the data information of the database 740 to obtain a verification result, wherein the verification result comprises that the login account information contains the same information as the management code, the login account information comprises the same information as the authorization code, and the login account information does not comprise the same information as the management code or the authorization code;
s103, responding to the login request based on the verification result, wherein the response result comprises management code login, authorization code login and non-permission login.
It will be understood that each specific input data set has a distinct manager, the platform user must apply for authorization to the manager of the data set before using one data set, after which the data can be used in the platform, the platform providing a key management system KMS, encrypting the different data sets using different keys, only the owner (manager) of the data set and the authorized user having data access keys, using the data in a decrypted manner; the platform user can use data in the platform after being authorized by a data set owner (manager), the platform data authorization process is a process that the data set owner shares a data access key to an authorized user in a secret sharing mode, and the sharing mode can be realized through an information interaction platform, so that the problem that other authorized users or a platform manager transfer data use right without permission is solved, and the privacy security of the data in the platform use process is improved.
In an embodiment of the present invention, the operation module 300 includes a container construction unit and a storage allocation unit, wherein:
the system comprises a storage allocation unit, a storage unit and a processing unit, wherein the storage allocation unit is used for allocating system resources to obtain a working space and a calculation space, the working space is used for storing temporary data generated when an application program runs, and the calculation space is used for storing application program data;
the program running unit is used for instantiating the application program data into a container, running the application program in the container, acquiring an input data set when the application program reads data, and running the application program based on the input data set to obtain an output result;
in addition, the operation module 300 further includes a mounting unit, where the mounting unit is configured to mount an input data set as a virtual local data volume through an XFS CSI driver;
further, the method for instantiating the application data stored in the computation space into the container by the program execution unit includes:
s201, storing the components related to the application program and the dependency information of the components related to the application program into a calculation space;
s202, when an image file corresponding to an application program is to be set, accessing an application computing space, and acquiring a component related to the application program and dependency information of the component related to the application program from the computing space;
and S203, according to the dependency information of the components related to the application program, performing containerization setting on the components related to the application program to obtain the image file corresponding to the application program.
In the method, the dependency information of the related components of the application program comprises dependency relationship information among the related components of the application program and environment information on which the related components of the application program depend, so that platforms with different architectures can directly access an application container by adopting a C/S mode, execute a corresponding image file, realize the function execution of the application program, and do not need to execute a process of loading the application program and then executing the application program, and the execution process is not sensible.
Also in this embodiment of the present invention, the storage module 600 includes a local storage unit and a system storage unit, where:
a local storage unit for storing the output data set;
and the system storage unit is used for storing the output result.
It is noted that the storage space of the local storage unit is the storage space allocated by the XFS system (high performance journaling file system) of the platform, and the local storage unit is the underlying physical storage space of the platform.
Based on the technical scheme, when the traditional Chinese medicine big data application open platform established based on privacy security calculation is used, and a user starts an application program and specifies an input data set, the operation module 300 instantiates the application program into a container, and meanwhile, a persistent working space is created to store output and temporary data in the operation process of the application program; when the running module 300 reads the input data set in the running process of the application program, the decryption module 200 decrypts the key provided for the user in real time as required when the data set is used for authorization; the method comprises the steps that after an application program is operated, an output result is obtained and stored in an XFS again as a new data set, a container and a working space are destroyed, no intermediate data are left, a platform generates a new secret key to encrypt the result data set in the process of storing the result data set in basic physical storage, computing and storage components of the platform are cloud-native, flexible and extensible services under platform management are provided, and the platform provides various characteristic services of cloud computing on the framework, including automatic and flexible hardware configuration, a docker mirror image storage library, network partitioning and access control. The platform encapsulates a bottom API for the application program and provides friendly and easy-to-use functions.
Referring to fig. 4, in the embodiment of the present invention, the data processing module 400 includes a writing unit 410, a reading unit 420, a processing unit 430, and a deleting unit 440, where:
a write unit 410 for writing the output data set to the storage module 600;
a reading unit 420, configured to read an output result generated by the running module 300 running the application;
the processing unit 430 is configured to obtain an output result, and send the output result to the system storage module 600; the data processing unit is further configured to generate a deletion instruction when sending the data result, and send the deletion instruction to the deletion unit 440;
a deletion unit 440 configured to acquire a deletion instruction, and delete the work piece and the container based on the deletion instruction;
as shown in fig. 4, the writing unit 410 is connected to the encryption module 500 and the storage module 600, and the reading unit and deleting unit 440 is connected to the operation module 300; the reading unit 420 is connected to a processing unit 430, and the processing unit 430 is connected to a deleting unit 440.
In addition, the traditional Chinese medicine big data application open platform established based on privacy security calculation further comprises an output module, the output module is connected with the encryption module 500 and the storage module 600, the output module is used for acquiring a new secret key and an output data set and outputting the new secret key and the output data set, it can be understood that the output data set is an encrypted file obtained after an output result is encrypted through the new secret key, the new secret key is held by a data manager, and the platform encrypts the output result obtained by running an application program every time in a mode of continuously generating the secret key, so that the privacy and the security of data are ensured;
the data manager has the highest authority for data processing after logging in the platform through the management code, can use and download data, a user who logs in the platform through the authorization code cannot leave the platform in a downloading mode and the like when using the data, the user can only process the data by using an application built in the platform or a program developed by the user in the platform, the flexibility degree of the data owner in authorizing the data can be increased through two different authorization modes, the compromise between the safety and the usability of different data is realized, and the platform provides multiple data exploration modes to facilitate the platform user to find the data required by scientific research work.
Furthermore, some embodiments may include a storage medium having a program for executing the method set forth in the present specification on a computer, on which at least one instruction, at least one program, code set, or instruction set is stored, the at least one instruction, at least one program, code set, or instruction set being loaded and executed by a processor to implement the steps in the above-described embodiments of the method, examples of the computer-readable recording medium including a hardware device specifically configured for storing and executing program commands, a magnetic medium such as a hard disk, a floppy disk, and a magnetic tape, an optical recording medium such as a CD-ROM, a DVD, a magneto-optical medium such as a floppy disk, and a ROM, RAM, flash memory, and the like. Examples of program commands may include machine language code written by a compiler and high-level language code executed by a computer using an interpreter or the like.
One of ordinary skill in the art will appreciate that all or part of the processes of the methods of the above embodiments may be implemented by at least one instruction, at least one program, code set, or instruction set, which may be stored in a non-volatile computer-readable storage medium, and the at least one instruction, at least one program, code set, or instruction set may include the processes of the embodiments of the methods described above when executed. Any reference to memory, storage, database 740, or other medium used in the embodiments provided herein may include at least one of non-volatile and volatile memory.
In summary, the application program is instantiated into the container, the data is encrypted and decrypted at the same time, the data privacy of the output result of the application program is protected by the continuously generated secret key, the platform data can be fully utilized by third-party application on the premise of safety, privacy protection and authorized use, the data acquisition and data mining loose coupling mode of the medical data in the large data platform is realized, and the high-quality medical data asset is formed.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention are intended to be included within the scope of the present invention.

Claims (10)

1. A traditional Chinese medicine big data application open platform established based on privacy security calculation is characterized by comprising the following steps:
the decryption module is used for decrypting the specified data set according to the secret key to obtain an input data set;
the operation module is used for instantiating the application program data into a container, operating the application program in the container, and reading the input data set when the application program operates to obtain an output result; the system is also used for creating a workspace which is used for storing temporary data generated when the application program runs;
the encryption module is used for generating a new key and encrypting the output result based on the new key to obtain an output data set;
the storage module is used for storing the output result obtained by the operation module and the output data set obtained by the encryption module;
the data processing module is used for sending the output data set obtained by the encryption module to the storage module for storage; and the system is also used for acquiring an output result, sending the output result to the storage module, and deleting the working space and the container when the output result is acquired.
2. The open platform for big data application of traditional Chinese medicine established based on privacy-safe computing according to claim 1, wherein: the system also comprises a login module, wherein the login module is used for acquiring a login request and a login account sent by a user, and verifying the login account after receiving the login request.
3. The open platform for big data application of traditional Chinese medicine established based on privacy-safe computing according to claim 2, wherein: the login module comprises a receiving unit, a response unit and a verification unit, wherein:
the receiving unit is used for acquiring a login request and a login account sent by a user, sending the login request to the response unit and the verification unit, and sending the login account to the verification unit;
the response unit is used for generating a verification instruction based on the login request and sending the verification instruction to the verification unit;
and the verification unit is used for receiving the verification instruction, verifying the login account information based on the verification instruction to obtain a verification result, and responding the login request based on the verification result.
4. The open platform for big data application of traditional Chinese medicine established based on privacy-safe computation of claim 3, wherein: the login module further comprises a database, and the database is used for storing the management code and the authorization code corresponding to the input data set.
5. The open platform for big data application of traditional Chinese medicine established based on privacy-safe computing according to claim 1, wherein: the operating module comprises a container construction unit and a storage allocation unit, wherein:
the system comprises a storage allocation unit, a storage unit and a processing unit, wherein the storage allocation unit is used for allocating system resources to obtain a working space and a calculation space, the working space is used for storing temporary data generated when an application program runs, and the calculation space is used for storing application program data;
and the program running unit is used for instantiating the application program data into a container, running the application program in the container, acquiring an input data set when the application program reads data, and running the application program based on the input data set to obtain an output result.
6. The open platform for big data application of traditional Chinese medicine established based on privacy-safe computing according to claim 5, wherein: the operation module further comprises a mounting unit, and the mounting unit is used for mounting the input data set into a virtual local data volume through an XFS CSI driver.
7. The open platform for big data application of traditional Chinese medicine established based on privacy-safe computing according to claim 1, wherein: the storage module comprises a local storage unit and a system storage unit, wherein:
a local storage unit for storing the output data set;
and the system storage unit is used for storing the output result.
8. The open platform for big data application of traditional Chinese medicine established based on privacy-safe computing according to claim 7, wherein: the storage space of the local storage unit is the storage space allocated by the XFS system of the platform, and the storage space of the local storage unit is the basic physical storage space of the platform.
9. The open platform for big data application of traditional Chinese medicine established based on privacy-safe computing according to claim 1, wherein: the data processing module comprises a writing unit, a reading unit, a processing unit and a deleting unit, wherein:
a write unit for writing the output data set into the storage module;
the reading unit is used for reading an output result generated by the running module running the application program;
the processing unit is used for acquiring an output result and sending the output result to the system storage module; the data processing unit is also used for generating a deleting instruction when the data result is sent and sending the deleting instruction to the deleting unit;
and the deleting unit is used for acquiring a deleting instruction and deleting the work workpiece and the container based on the deleting instruction.
10. The open platform for big data application of traditional Chinese medicine established based on privacy-safe computing according to claim 1, wherein: the system also comprises an output module, wherein the output module is connected with the encryption module and the storage module and is used for acquiring the new key and the output data set and outputting the new key and the output data set.
CN202210370275.9A 2022-04-09 2022-04-09 Traditional Chinese medicine big data application open platform established based on privacy security calculation Pending CN114662131A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210370275.9A CN114662131A (en) 2022-04-09 2022-04-09 Traditional Chinese medicine big data application open platform established based on privacy security calculation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210370275.9A CN114662131A (en) 2022-04-09 2022-04-09 Traditional Chinese medicine big data application open platform established based on privacy security calculation

Publications (1)

Publication Number Publication Date
CN114662131A true CN114662131A (en) 2022-06-24

Family

ID=82035269

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210370275.9A Pending CN114662131A (en) 2022-04-09 2022-04-09 Traditional Chinese medicine big data application open platform established based on privacy security calculation

Country Status (1)

Country Link
CN (1) CN114662131A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103106372A (en) * 2013-01-17 2013-05-15 上海交通大学 Lightweight class privacy data encryption method and system for Android system
CN109284603A (en) * 2017-07-20 2019-01-29 腾讯科技(深圳)有限公司 A kind of configuration data processing method, device and storage medium
US20190258813A1 (en) * 2018-02-20 2019-08-22 International Business Machines Corporation Implementing policy-based container-level encryption
CN110213231A (en) * 2019-04-26 2019-09-06 西安电子科技大学 A kind of the outsourcing data access control method and control system of the lightweight towards SGX
CN113256290A (en) * 2021-05-14 2021-08-13 杭州链网科技有限公司 Decentralized encrypted communication and transaction system
WO2021219042A1 (en) * 2020-04-30 2021-11-04 华为技术有限公司 Cloud application instance-based payment method, system and related device
US20220067215A1 (en) * 2020-08-27 2022-03-03 Kyndryl, Inc. Media exfiltration prevention system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103106372A (en) * 2013-01-17 2013-05-15 上海交通大学 Lightweight class privacy data encryption method and system for Android system
CN109284603A (en) * 2017-07-20 2019-01-29 腾讯科技(深圳)有限公司 A kind of configuration data processing method, device and storage medium
US20190258813A1 (en) * 2018-02-20 2019-08-22 International Business Machines Corporation Implementing policy-based container-level encryption
CN110213231A (en) * 2019-04-26 2019-09-06 西安电子科技大学 A kind of the outsourcing data access control method and control system of the lightweight towards SGX
WO2021219042A1 (en) * 2020-04-30 2021-11-04 华为技术有限公司 Cloud application instance-based payment method, system and related device
US20220067215A1 (en) * 2020-08-27 2022-03-03 Kyndryl, Inc. Media exfiltration prevention system
CN113256290A (en) * 2021-05-14 2021-08-13 杭州链网科技有限公司 Decentralized encrypted communication and transaction system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
崔连和 *

Similar Documents

Publication Publication Date Title
US10409990B2 (en) Encryption and decryption method and apparatus in virtualization system, and system
US11341281B2 (en) Providing differential privacy in an untrusted environment
CN106063185B (en) Method and apparatus for safely shared data
JP7388803B2 (en) Tying the secure guest's secure key to the hardware security module
US7908476B2 (en) Virtualization of file system encryption
US20080114990A1 (en) Usable and secure portable storage
US20210141940A1 (en) Method and system for enhancing the integrity of computing with shared data and algorithms
US8572372B2 (en) Method for selectively enabling access to file systems of mobile terminals
US11676011B2 (en) Private transfer learning
TW200837602A (en) Cryptographic key containers on a USB token
CN105408912A (en) Process authentication and resource permissions
CN106575342A (en) Kernel program including relational data base, and method and device for executing said program
JP2008522279A (en) Security transmission system for online data between virtual disks whose access is controlled, and security transmission method through the same
TW200833061A (en) Secure PIN transmission
JP7445358B2 (en) Secure Execution Guest Owner Control for Secure Interface Control
US20180232524A1 (en) Virtualized volume level security
EP3376426B1 (en) Information management terminal device
Onik et al. A secured cloud based health care data management system
WO2018020451A1 (en) Method and system for encrypting files and storing the encrypted files in a storage file system
US20220414223A1 (en) Training data protection for artificial intelligence model in partitioned execution environment
US7725739B2 (en) Securing sensitive data in memory
KR102446985B1 (en) Key management mechanism for cryptocurrency wallet
CN113742657A (en) Software protection method and system
CN114662131A (en) Traditional Chinese medicine big data application open platform established based on privacy security calculation
CN114238938B (en) PCIE password card virtualization configuration management method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination