CN-122027210-A - Data sharing system and method based on privacy protection technology
Abstract
The invention discloses a data sharing system and a method based on a privacy protection technology, which relate to the technical field of data sharing, wherein a data encryption module is used for encrypting input data of at least one participant by using an encryption algorithm to obtain encrypted data, a secure multiparty calculation protocol module is used for receiving the encrypted data from a plurality of participants and executing secure multiparty calculation on the premise of not decrypting to obtain a joint calculation result, a homomorphic encryption calculation module is used for executing calculation operation on the encrypted data from a single participant in an encryption state to obtain an encryption calculation result, and a user interface module is used for providing a data input function and a calculation result output function. The invention enhances the privacy protection capability, improves the data processing efficiency and simplifies the management flow, and effectively solves the limitation of the traditional scheme in the aspects of data security, computing capability, access control and the like.
Inventors
- SHI MIN
Assignees
- 北京思特奇信息技术股份有限公司
Dates
- Publication Date
- 20260512
- Application Date
- 20251231
Claims (10)
- 1. The data sharing system based on the privacy protection technology is characterized by comprising a data encryption module, a secure multiparty computing protocol module, a homomorphic encryption computing module and a user interface module; The data encryption module is used for encrypting input data of at least one participant by using an encryption algorithm to obtain encrypted data; The secure multiparty computing protocol module is used for receiving encrypted data from a plurality of participants, and executing secure multiparty computing on the premise of not decrypting to obtain a joint computing result; The homomorphic encryption calculation module is used for executing calculation operation on the encrypted data from a single party in an encryption state to obtain an encryption calculation result; the user interface module is used for providing a data input function and a calculation result output function.
- 2. The privacy preserving technology-based data sharing system of claim 1, further comprising a blockchain integration module for recording the combined calculation result and the encrypted calculation result in a distributed ledger in a transaction form and verifying the integrity and origin of the calculation result based on a blockchain consensus mechanism.
- 3. The data sharing system according to claim 2, further comprising an access control module, wherein the access control module is configured to perform fine-grained access control on the calculation result stored by the blockchain integration module according to a preset authority rule.
- 4. A data sharing system based on privacy preserving technology as set forth in any one of claims 1 to 3 further comprising a data preprocessing module for performing cleaning, normalization, desensitization and de-identification processing on all input data and providing the processed data to the data encryption module for encryption to obtain encrypted data.
- 5. The data sharing method based on the privacy protection technology is characterized by comprising the following steps of: Encrypting input data of at least one participant by using an encryption algorithm to obtain encrypted data; receiving encrypted data from a plurality of participants, and executing secure multiparty calculation on the premise of not decrypting to obtain a joint calculation result; performing a calculation operation on the encrypted data from the single party in an encrypted state to obtain an encrypted calculation result; And receiving at least one participant through a data input function for data input, and outputting a joint calculation result and/or an encryption calculation result through a calculation result output function.
- 6. The method for sharing data based on privacy preserving techniques as recited in claim 5, further comprising recording the combined calculation result and the encrypted calculation result in a distributed ledger in a transaction format, and verifying the integrity and origin of the calculation result based on a blockchain consensus mechanism.
- 7. The method for sharing data based on privacy preserving techniques as recited in claim 6, further comprising performing fine-grained access control on the stored computation results according to a preset permission rule.
- 8. The privacy preserving technique-based data sharing method as claimed in any one of claims 5 to 7, further comprising washing, normalizing, and desensitizing and de-identifying all input data before encrypting the input data of at least one of the participants using an encryption algorithm.
- 9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing a data sharing method based on privacy preserving techniques as claimed in any one of claims 5 to 8 when the computer program is executed.
- 10. A computer readable storage medium, characterized in that the computer readable storage medium has stored thereon a computer program which, when executed by a processor, implements a data sharing method based on privacy preserving technology as claimed in any one of claims 5 to 8.
Description
Data sharing system and method based on privacy protection technology Technical Field The present invention relates to the field of data sharing technologies, and in particular, to a data sharing system and method based on a privacy protection technology. Background Modern data-intensive applications, such as across-institution financial management, multi-center medical research, and collaborative legal services, place stringent demands on the efficiency, security, and flexibility of data sharing. These applications expect to strictly protect data privacy and security while fully exploiting the value of data elements and support collaboration of multiple parties on a mutually untrusted basis. However, a series of technical challenges still face in achieving efficient data sharing with privacy preservation. Currently, conventional solutions typically rely on a centralized database system for data management and sharing. In such schemes, the security and privacy protection of data relies heavily on single security measures such as data transmission encryption and network firewalls. The data is centrally stored at a central server to which the participants need to transmit the raw data for calculation or analysis. Access control is typically managed based on roles or simple rules. There are several disadvantages to this conventional approach. Because of the centralized storage of data, once the central database is attacked, the data security of the whole system is widely threatened. In terms of data sharing, conventional schemes have a trust problem in that the control of the data is concentrated in a single entity hand, which limits the breadth and depth of data sharing. In terms of computing power, conventional schemes typically require data to be transferred to a central server or specific local environment for processing, which not only increases the risk of leakage during data transfer, but also limits the flexibility and efficiency of distributed computing. For scenarios requiring multi-party collaboration, traditional schemes tend to be difficult to implement because the sharing and computation of data needs to be done on a fully trusted basis, which is difficult to achieve among competing or privacy concerns. In terms of access control, conventional schemes may lack fine-grained rights management, resulting in inaccurate allocation of data access rights, increasing the risk of internal misuse and leakage of data. In addition, the technical integration level of the traditional scheme is low, and compatibility and collaborative work capacity among different components such as data preprocessing, encryption, calculation and audit are limited, so that the stability and user experience of the whole system are affected. The traditional technical scheme has the limitations in aspects of data sharing, privacy protection, computing power, data security, access control, technical integration and the like, and is difficult to meet the requirements of modern applications. Therefore, there is an urgent need for an innovative technical solution that can technically ensure data privacy while supporting efficient and flexible multiparty and uncompetitive data sharing to address the above challenges. Disclosure of Invention The invention aims to solve the technical problem of overcoming the defects of the prior art, and particularly provides a data sharing system and method based on a privacy protection technology, wherein the data sharing system and method concretely comprise the following steps: 1) In a first aspect, the present invention provides a data sharing system based on privacy protection technology, and the specific technical scheme is as follows: the system comprises a data encryption module, a secure multiparty computing protocol module, a homomorphic encryption computing module and a user interface module; the data encryption module is used for encrypting the input data of at least one participant by using an encryption algorithm to obtain encrypted data; the secure multiparty computing protocol module is used for receiving encrypted data from a plurality of participants, and executing secure multiparty computing on the premise of not decrypting to obtain a joint computing result; The homomorphic encryption calculation module is used for executing calculation operation on the encrypted data from a single party in an encryption state to obtain an encryption calculation result; The user interface module is used for providing a data input function and a calculation result output function. The data sharing system based on the privacy protection technology has the following beneficial effects: The data encryption module encrypts the input data of the participants to obtain encrypted data, so that confidentiality of the data in a subsequent process is ensured from the source, and the large-scale leakage risk caused by centralized storage is reduced. The secure multiparty computation protocol module receives enc