CN119483978A - Privacy enhancement method, device, equipment and medium based on trusted execution environment - Google Patents
Privacy enhancement method, device, equipment and medium based on trusted execution environment Download PDFInfo
- Publication number
- CN119483978A CN119483978A CN202411667220.XA CN202411667220A CN119483978A CN 119483978 A CN119483978 A CN 119483978A CN 202411667220 A CN202411667220 A CN 202411667220A CN 119483978 A CN119483978 A CN 119483978A
- Authority
- CN
- China
- Prior art keywords
- task
- target
- environment
- information
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 50
- 238000012795 verification Methods 0.000 claims abstract description 132
- 238000012545 processing Methods 0.000 claims abstract description 63
- 238000013475 authorization Methods 0.000 claims abstract description 41
- 230000007246 mechanism Effects 0.000 claims abstract description 29
- 238000005259 measurement Methods 0.000 claims description 37
- 238000004590 computer program Methods 0.000 claims description 16
- 230000007613 environmental effect Effects 0.000 claims description 5
- 230000001960 triggered effect Effects 0.000 claims description 3
- 238000007689 inspection Methods 0.000 claims description 2
- 230000008569 process Effects 0.000 description 15
- 238000004891 communication Methods 0.000 description 6
- 230000005540 biological transmission Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 5
- 238000004458 analytical method Methods 0.000 description 4
- 230000002708 enhancing effect Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 238000004422 calculation algorithm Methods 0.000 description 3
- 238000010276 construction Methods 0.000 description 3
- 238000010801 machine learning Methods 0.000 description 3
- 238000013473 artificial intelligence Methods 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 238000007405 data analysis Methods 0.000 description 2
- 238000003745 diagnosis Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000012549 training Methods 0.000 description 2
- 230000005856 abnormality Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000013135 deep learning Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 201000010099 disease Diseases 0.000 description 1
- 208000037265 diseases, disorders, signs and symptoms Diseases 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000012502 risk assessment Methods 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
Abstract
The application discloses a privacy enhancement method, device, equipment and medium based on a trusted execution environment, and relates to the field of data processing. And receiving a target user certificate request, creating a user certificate based on the authority authentication service, initializing a task key based on the key management service, and initializing task information by a user. In the task execution stage, the mirror image environment is checked through the remote authentication service, the target value and the first preset mechanism, and the user is checked through the authorization service and the second preset mechanism. And if the verification is passed, scheduling the task to be processed to a mirror image environment, and performing data processing by using the task key and the target task information acquired by the key management service to obtain a task execution result. Therefore, the application can effectively realize the privacy enhancement of the data while ensuring the data processing efficiency, thereby protecting the safety of the data.
Description
Technical Field
The present invention relates to the field of data processing, and in particular, to a privacy enhancing method, apparatus, device, and medium based on a trusted execution environment.
Background
With the rapid development of artificial intelligence and big data technology, the processing of data is becoming increasingly widespread. Currently, existing computing environments such as cloud computing and edge computing highlight security issues of data during processing. These security issues not only affect the usability and integrity of the data, but may also have serious consequences for some application scenarios where the data security requirements are high.
However, existing solutions such as Hadoop and Spark distributed computing frameworks can provide the ability to handle large-scale data, but lack adequate security in processing the data. In addition, the conventional TEE (Trusted Execution Environment ) environment authentication mechanism is mostly simple hardware level authentication, and single authentication mode has the risk of being bypassed or data leakage.
Therefore, how to implement privacy enhancement while guaranteeing the efficiency of data processing to protect the security of data is a key problem to be solved at present.
Disclosure of Invention
In view of the above, the present invention aims to provide a privacy enhancing method, apparatus, device and medium based on trusted execution environment, which can implement privacy enhancement while ensuring the efficiency of data processing so as to protect data security. The specific scheme is as follows:
in a first aspect, the present application provides a privacy enhancement method based on a trusted execution environment, applied to a data processing system created based on a preset distributed computing framework, including:
triggering a trusted execution environment image creation operation corresponding to a task to be processed in a task initialization stage to obtain a corresponding image environment and a target measurement value corresponding to the image environment;
When a certificate request sent by a target user is received, a user certificate corresponding to the certificate request is created based on a local authority authentication service, and task key initialization is performed based on a local key management service, so that the target user initializes task information of the task to be processed based on the obtained task key, and target task information is obtained;
In a task execution stage, performing environment verification on the mirror image environment based on a local remote authentication service, the target measurement value and a first preset multi-level authentication mechanism, and verifying the target user based on a local authorization service and a second preset multi-level authentication mechanism to obtain an environment verification result and a user verification result;
and if the environment verification result and the user verification result indicate that verification is passed, scheduling the task to be processed to the mirror image environment, and acquiring the task key corresponding to the task to be processed based on the key management service so as to trigger corresponding data processing operation by utilizing the task key and the target task information and obtain a task execution result.
Optionally, the triggering the trusted execution environment image creation operation corresponding to the task to be processed to obtain a corresponding image environment and a target measurement value corresponding to the image environment includes:
In the process of executing the trusted execution environment image creation operation, hash operation is performed based on the content of the obtained image environment to obtain a target measurement value corresponding to the image environment, so that a target user registers the target measurement value into a local measurement management service.
Optionally, when receiving a certificate request sent by a target user, creating a user certificate corresponding to the certificate request based on a local authority authentication service includes:
when a certificate request sent by a target user is received, public key information and first identity information corresponding to the target user in the certificate request are acquired based on a local authority authentication service;
Judging whether the public key information and the first identity information meet preset conditions or not to obtain corresponding judging results;
And if the judgment results indicate that the public key information and the first identity information are satisfied, signing the public key information and the first identity information by using private key information corresponding to the authoritative authentication service to obtain a user certificate corresponding to the certificate request.
Optionally, the task key initializing by the local key management service is performed so that the target user initializes the task information of the task to be processed based on the obtained task key, so as to obtain target task information, including:
creating a target account corresponding to the target user based on a local key management service and by using second identity information of the target user;
And creating a root key based on the target account, and encrypting and landing the initial task key created by the target user by utilizing the root key so that the target user encrypts the task information of the task to be processed based on the task key obtained after encryption, and determines task code information corresponding to the task information to obtain target task information.
Optionally, the preset distributed computing framework includes a corresponding distributed file storage system, a distributed computing base constructed based on a preset container arrangement platform, and a distributed computing bottom layer framework constructed based on a preset computing cluster system and a preset batch processing and streaming data processing platform, where the distributed computing base includes a container for respectively storing application programs corresponding to the authoritative authentication service, the key management service, the remote authentication service, the measurement management service and the authorization service.
Optionally, the performing environment verification on the mirror image environment based on the local remote authentication service, the target metric value and the first preset multi-level authentication mechanism, and verifying the target user based on the local authorization service and the second preset multi-level authentication mechanism to obtain an environment verification result and a user verification result, including:
Verifying hardware configuration information, software operation information and security plug-in information in the report of the mirror image environment based on a local remote authentication service to obtain a corresponding first verification result;
Carrying out integrity check on the mirror image environment based on the target measurement values in the remote authentication service and the local measurement management service to obtain corresponding second check results, and determining corresponding environment check results based on the first check results and the second check results;
Verifying a user name, the user certificate and target signature information corresponding to the target user based on a local authorization service to finish corresponding user identity verification operation and obtain a third verification result, wherein the target signature information is data obtained by signing the target task information by the target user;
After the task corresponding to the target user is subjected to permission checking based on the authorization service, if the permission checking is passed, carrying out integrity checking on the target task information based on the authorization service to obtain a corresponding fourth checking result;
Carrying out authenticity verification on authority authentication service signature information in the user certificate based on the authorization service and public key information corresponding to the target user so as to obtain a corresponding fifth verification result;
performing resource access right verification and resource operation right verification on the target user based on the authorization service and the to-be-processed resources corresponding to the to-be-processed tasks to obtain a corresponding sixth verification result;
and determining a corresponding user verification result by using the third verification result, the fourth verification result, the fifth verification result and the sixth verification result.
Optionally, the scheduling the task to be processed to the mirror image environment, and acquiring the task key corresponding to the task to be processed based on the key management service, so as to trigger a corresponding data processing operation by using the task key and the target task information, and obtain a task execution result, including:
Submitting the task to be processed to the preset distributed computing framework so that the preset distributed computing framework dispatches the task to be processed to the mirror image environment;
After the task key corresponding to the task to be processed is requested to the key management service, checking whether the environment check result corresponding to the mirror image environment is checked to pass or not through the remote authentication service again based on the key management service so as to obtain a corresponding check result;
And if the checking result shows that the environment checking result is that the checking result is passed, transmitting the task key corresponding to the task to be processed into the mirror image environment so as to decrypt the target task information by using the task key in the mirror image environment, triggering corresponding data processing operation based on the obtained decrypted information, and obtaining a task execution result.
In a second aspect, the present application provides a privacy enhancing apparatus based on a trusted execution environment, applied to a data processing system created based on a preset distributed computing framework, comprising:
the image creation module is used for triggering the image creation operation of the trusted execution environment corresponding to the task to be processed in the task initialization stage so as to obtain a corresponding image environment and a target measurement value corresponding to the image environment;
The information acquisition module is used for creating a user certificate corresponding to a certificate request based on a local authority authentication service when receiving the certificate request sent by a target user, and initializing a task key based on a local key management service so that the target user initializes task information of the task to be processed based on the obtained task key to obtain target task information;
the verification module is used for carrying out environment verification on the mirror image environment based on the local remote authentication service, the target measurement value and a first preset multi-level authentication mechanism in a task execution stage, and verifying the target user based on the local authorization service and a second preset multi-level authentication mechanism to obtain an environment verification result and a user verification result;
And the task execution module is used for dispatching the task to be processed to the mirror image environment if the environment verification result and the user verification result indicate that the verification is passed, acquiring the task key corresponding to the task to be processed based on the key management service, triggering corresponding data processing operation by utilizing the task key and the target task information, and obtaining a task execution result.
In a third aspect, the present application provides an electronic device, comprising:
A memory for storing a computer program;
and the processor is used for executing the computer program to realize the privacy enhancement method based on the trusted execution environment.
In a fourth aspect, the present application provides a computer readable storage medium for storing a computer program, where the computer program when executed by a processor implements the aforementioned privacy enhancement method based on a trusted execution environment.
The method comprises the steps of triggering a trusted execution environment image creation operation corresponding to a task to be processed in a task initialization stage to obtain a corresponding image environment and a target measurement value corresponding to the image environment, creating a user certificate corresponding to a certificate request based on a local authoritative authentication service when the certificate request sent by a target user is received, initializing a task key based on a local key management service so that the target user initializes task information of the task to be processed based on the obtained task key to obtain target task information, performing environment verification on the image environment based on the local remote authentication service, the target measurement value and a first preset multi-level authentication mechanism to obtain an environment verification result and a user verification result based on the local authorization service and a second preset multi-level authentication mechanism, and if the environment verification result and the user verification result indicate that verification is passed, scheduling the task to be processed to the environment, acquiring task information corresponding to the task to be processed based on the key management service to obtain the task to be processed, triggering the task operation key and the task operation key to be processed by using the corresponding task information. In the task initialization stage, the method triggers the creation of the image of the trusted execution environment of the task to be processed to obtain the image environment and the target measurement value. And receiving a target user certificate request, creating a user certificate based on the authority authentication service, initializing a task key based on the key management service, and initializing task information by a user. In the task execution stage, the mirror image environment is checked through the remote authentication service, the target value and the first preset mechanism, and the user is checked through the authorization service and the second preset mechanism. And if the verification is passed, scheduling the task to be processed to a mirror image environment, and performing data processing by using the task key and the target task information acquired by the key management service to obtain a task execution result. Therefore, the application can effectively realize the privacy enhancement of the data while ensuring the data processing efficiency, thereby protecting the safety of the data.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are required to be used in the embodiments or the description of the prior art will be briefly described below, and it is obvious that the drawings in the following description are only embodiments of the present invention, and that other drawings can be obtained according to the provided drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a privacy enhancement method based on trusted execution environment disclosed by the application;
FIG. 2 is a schematic diagram of a preset distributed computing framework according to the present disclosure;
FIG. 3 is a schematic diagram of a privacy enhancement device based on a trusted execution environment according to the present disclosure;
fig. 4 is a block diagram of an electronic device according to the present disclosure.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Existing solutions, such as Hadoop and Spark distributed computing frameworks, can provide the ability to handle large-scale data, but lack adequate security in processing the data. In addition, most of the traditional TEE environment authentication mechanisms are simple hardware level authentication, and single authentication modes have the risk of being bypassed or data leakage. Therefore, the application provides a privacy enhancement method based on a trusted execution environment, which can realize privacy enhancement while guaranteeing the efficiency of data processing so as to protect the safety of data.
Referring to fig. 1, an embodiment of the present invention discloses a privacy enhancement method based on a trusted execution environment, which is applied to a data processing system created based on a preset distributed computing frame, and includes:
And step S11, triggering a trusted execution environment image creation operation corresponding to a task to be processed in a task initialization stage to obtain a corresponding image environment and a target measurement value corresponding to the image environment.
Firstly, it should be noted that in this embodiment, the preset distributed computing framework includes a corresponding distributed file storage system, a distributed computing base constructed based on a preset container arrangement platform, and a distributed computing bottom framework constructed based on a preset computing cluster system and a preset batch processing and streaming data processing platform, where the distributed computing base includes containers for respectively storing application programs corresponding to an authoritative authentication service, a key management service, a remote authentication service, a measurement management service, and an authorization service.
Specifically, as shown in fig. 2, the preset distributed computing framework manages distributed computing tasks through k8s clusters (i.e., kubernetes, a container arrangement platform for automatically deploying, expanding and contracting and managing containerized applications), performs trusted execution in cooperation with the TEE, and constructs a complete set of computing framework through Spark (i.e., APACHE SPARK, a distributed computing system), flink (i.e., APACHE FLINK, a computing platform for distributed data stream processing and batch data processing), hadoop (i.e., apache Hadoop, a distributed system infrastructure) and multiparty services. It should be further understood that the distributed file storage system in the framework may be a Hadoop system, which is responsible for storing and managing the encryption processing result after the task processing is finished. The distributed architecture of the distributed file storage system is designed such that each piece of data has a copy, and the copies of each piece of data are stored in respective nodes of the distributed file storage system. The storage mode not only can ensure the orderly storage of the data, but also can efficiently recover the data from other nodes when a certain node has a problem. The preset container arranging platform can be k8s, can automatically perform a plurality of manual operations involved in the process of deploying, managing and expanding the containerized application, and supports the whole data processing flow based on the distributed computing base constructed by the preset container arranging platform to play a role in overall coordination. The preset computing cluster system can be a Spark system, the preset batch processing and stream data processing platform can be a flank platform, and the distributed computing bottom layer framework constructed based on the preset computing cluster system and the preset batch processing and stream data processing platform further enriches the capability and the mode of data processing, so that the distributed computing bottom layer framework can meet diversified task demands. It is particularly noted that in a distributed computing base, a plurality of containers are provided for storing different applications (i.e., the applications in fig. 2). These containers correspond to authoritative authentication services, key management services, remote authentication services, metric management services, and authorization services, respectively. Moreover, as can be seen from fig. 2, the containers are relatively independent, and the interaction channels between the containers are encrypted and protected. In one embodiment, communication of information between containers may be accomplished when the containers invoke corresponding services to process the same task. The services can jointly guarantee privacy enhancement and security in the data processing process.
In this embodiment, during the process of executing the trusted execution environment image creation operation in the task initialization stage, hash operation is performed based on the content of the obtained image environment, so as to obtain a target metric value corresponding to the image environment, so that the target user registers the target metric value in the local metric management service. It will be appreciated that the hash operation in this embodiment generates the destination value based on the content of the mirrored environment. Thus, the target magnitude can reflect the characteristics of the mirrored environment. By obtaining the target value, the target user can register it with the local metric management service. In this way, in the subsequent verification step involving the integrity and consistency of the image environment, it is possible to confirm whether the image environment remains intact and has not been tampered by comparing the target metric values.
And step S12, when a certificate request sent by a target user is received, creating a user certificate corresponding to the certificate request based on a local authority authentication service, and initializing a task key based on a local key management service so that the target user initializes task information of the task to be processed based on the obtained task key to obtain target task information.
In this embodiment, when a certificate request sent by a target user is received, public key information and first identity information corresponding to the target user in the certificate request are obtained based on a local authority authentication service, and whether the public key information and the first identity information both meet preset conditions is determined, so as to obtain a corresponding determination result. Wherein the preset condition is a standard set based on a security policy and a data protection requirement. For example, whether the public key information and the first identity information are real, whether the format of the public key information meets the specified requirement, whether the first identity information is matched with the registered legal user identity mode, and the like are determined. And if the judgment results indicate that the public key information and the first identity information are satisfied, signing the public key information and the first identity information by using private key information corresponding to the authoritative authentication service to obtain a user certificate corresponding to the certificate request.
Subsequently, in the present embodiment, a target account corresponding to the target user is created based on the local key management service and using the second identity information of the target user. Wherein the second identity information comprises a user name, an email address and the like of the target user. And then, creating a root key based on the target account, encrypting and landing the initial task key created by the target user by utilizing the root key so that the target user encrypts the task information of the task to be processed based on the task key obtained after encryption, and determining task code information corresponding to the task information to obtain target task information.
In addition, in the process of constructing the target task information, in order to ensure the consistency of the task to be processed in the trusted execution environment, hash operation needs to be performed on the plaintext data and the task code information. The hash operation result can uniquely identify the characteristics of the data and the code, and can provide basis for subsequent consistency verification.
And step S13, in the task execution stage, carrying out environment verification on the mirror image environment based on the local remote authentication service, the target measurement value and a first preset multi-level authentication mechanism, and verifying the target user based on the local authorization service and a second preset multi-level authentication mechanism to obtain an environment verification result and a user verification result.
The task execution stage involves comprehensive verification of the mirror image environment and the target user, and ensures the safety of the whole mirror image environment and the legality of user operation through local remote authentication service, target scale value and corresponding preset multi-level authentication mechanism, thereby ensuring that the task to be processed is executed under safe and reliable conditions.
In this embodiment, hardware configuration information, software operation information and security plug-in information in a report of the mirror image environment are checked based on the local remote authentication service, so as to obtain a corresponding first check result. It is understood that the remote authentication service may verify the information according to a preset verification rule. For example, for hardware configuration information, it is checked whether it matches a preset list of compatible hardware, preventing potential security risks due to incompatible hardware. For software running information, it is verified whether the software is authorized, has security holes, or is tampered with.
In addition, in this embodiment, the integrity check needs to be performed on the mirror image environment based on the target metric values in the remote authentication service and the local metric management service, so as to obtain a corresponding second check result, and a corresponding environment check result is determined based on the first check result and the second check result. It can be understood that the target metric value is used as a characteristic identifier of the content of the mirror image environment, and is a key basis for judging whether the mirror image environment is maliciously modified. By comparing the actual state of the current mirrored environment with the state represented by the target metric, the remote authentication service and the metric management service can detect whether the mirrored environment has been subject to unauthorized modification. Moreover, the present embodiment needs to integrate the first verification result and the second verification result to determine the environment verification result, and only when both the two verification results indicate that the mirror image environment is safe, it can be confirmed that the mirror image environment meets the safety requirement of executing the task.
In this embodiment, the user name, the user certificate and the target signature information corresponding to the target user are verified based on the local authorization service, so as to complete the corresponding user identity verification operation and obtain a third verification result, where the target signature information is data obtained by signing the target task information by the target user. It can be understood that the third verification result is a verification result aiming at the identity of the target user, and whether the target user has the authority of task execution can be reflected.
After the task corresponding to the target user is subjected to permission checking based on the authorization service, if the permission checking is passed, the target task information is subjected to integrity checking based on the authorization service so as to obtain a corresponding fourth checking result. It should be noted that, the integrity check is mainly implemented by comparing the hash value of the target task information, and the hash value should be kept unchanged during the transmission process of the target task information. And calculating the hash value of the currently received target task information, comparing the hash value with the hash value of the target task information in the construction process, and if the hash value is consistent with the hash value of the target task information, indicating that the target task information is not tampered in the transmission process.
In this embodiment, the authenticity verification is performed on the authority authentication service subscription information in the user certificate based on the authorization service and the public key information corresponding to the target user, so as to obtain a corresponding fifth verification result, where the authority authentication service subscription information is generally generated by using the private key information of the target user. Then, based on the authorization service and the resources to be processed corresponding to the tasks to be processed, performing resource access right verification and resource operation right verification on the target user to obtain a corresponding sixth verification result;
And finally, determining a corresponding user verification result by using the third verification result, the fourth verification result, the fifth verification result and the sixth verification result. It should be noted that if an abnormality is found in the environmental verification result and the user verification result, for example, the identity that cannot be verified, insufficient execution authority, incomplete target task information, incorrect authority authentication service signature information or no resource access authority is indicated, the authority service refuses to execute the task to be processed and returns related error information.
And step S14, if the environment verification result and the user verification result indicate that verification is passed, scheduling the task to be processed to the mirror image environment, and acquiring the task key corresponding to the task to be processed based on the key management service so as to trigger corresponding data processing operation by utilizing the task key and the target task information and obtain a task execution result.
In this embodiment, the task to be processed is submitted to the preset distributed computing framework, so that the preset distributed computing framework schedules the task to be processed to the mirror image environment.
It can be understood that after the task key corresponding to the task to be processed is requested from the key management service, whether the environment verification result corresponding to the mirror image environment is verified is checked to be passed or not based on the key management service again through the remote authentication service, so as to obtain a corresponding check result. In this embodiment, since the image environment may change due to an external attack or other factors for a short time from the request of the task key to the acquisition of the task key. By checking again, the security of the mirror image environment can be further ensured.
Then, in this embodiment, if the inspection result indicates that the environment verification result is verification, the task key corresponding to the task to be processed is transmitted to the mirror image environment, so that the target task information is decrypted by using the task key in the mirror image environment, and a corresponding data processing operation is triggered based on the decrypted information, so as to obtain a task execution result. And after the data processing operation is finished, encrypting the task execution result by using a secret key, and storing the task execution result into each node of the distributed file storage system in a distributed file storage system mode.
In the task initialization stage, the method triggers the creation of the image of the trusted execution environment of the task to be processed to obtain the image environment and the target measurement value. And receiving a target user certificate request, creating a user certificate based on the authority authentication service, initializing a task key based on the key management service, and initializing task information by a user. In the task execution stage, the mirror image environment is checked through the remote authentication service, the target value and the first preset mechanism, and the user is checked through the authorization service and the second preset mechanism. And if the verification is passed, scheduling the task to be processed to a mirror image environment, and performing data processing by using the task key and the target task information acquired by the key management service to obtain a task execution result. Therefore, the application can effectively realize the privacy enhancement of the data while ensuring the data processing efficiency, thereby protecting the safety of the data.
The technical scheme of the application is specifically described below in connection with specific application scenarios.
In one embodiment, sensitive data such as customer financial information or transaction records need to be protected for financial data processing scenarios, particularly when dealing with and analyzing large scale transaction data.
Specifically, when the financial institution processes the transaction data, the security of the computing environment is ensured by the trusted execution environment mirror image construction process. During construction, the code and associated information used for transaction data calculation is integrated into the resulting mirrored environment, while a particular metric value (i.e., target metric value) is generated. The measurement value is obtained by carrying out hash operation on the mirror image environment content and the key code, and reflects the characteristics of the mirror image content. The financial institution can register the measurement value into the measurement management service, and then when the mirror image environment is used, the integrity and consistency of the mirror image environment can be effectively verified by comparing the measurement value with the measurement value in the measurement management service, so that the mirror image environment is ensured to be unmodified and tampered.
The task key plays a key role in machine learning model training associated with financial data payments. The task key is provided by the key management service and is used for encrypting transaction data and ensuring the security of the data in the storage and transmission processes. And, execution of the task is permitted only after the remote authentication is successful. In the process, the task key can be authorized to be used after being confirmed by the remote authorization service, so that data leakage is prevented.
After the data analysis is completed, the data processing results such as complaint monitoring or transaction risk assessment are stored in the distributed file system in an encrypted manner. The distributed file system is realized based on Hadoop and other technologies, has the characteristic of redundant backup of data, and can recover the data from other nodes even if a certain node has a problem, thereby guaranteeing the durability and the availability of the data.
In another embodiment, for the medical data processing scenario, the patient data is often extremely sensitive, and the technical scheme can provide a reliable method for processing and protecting the medical data, whether training a machine learning model such as a disease prediction algorithm is performed or sensitivity data processing during scientific research is performed.
Specifically, the mirror image environment plays a core safety protection role in the scene. Only medical institution personnel holding certificates issued by an authoritative certification service (i.e., user certificates) can access the analysis service of the medical system. When the staff applies to the authority authentication service, public key information and other identity authentication information are required to be provided, and after the authority authentication service is authenticated, a private key is used for signing and generating a user certificate. Upon accessing the analysis service of the medical system, the authorization service may check the validity of the user credentials to ensure the legitimacy of the access.
At the same time, the medical record security is ensured by the encrypted data provided by the key management service. During data analysis, patient data is decrypted and analysis is performed only inside the mirrored environment. The remote authentication service ensures the integrity of the image environment, and the remote authentication service and the measurement management service cooperate together to prevent the image environment from being tampered or invaded by malicious software. The remote authentication service can carry out detailed verification on the report of the mirror image environment, including information such as hardware configuration, running software, security plug-ins and the like, and meanwhile, the remote authentication service is combined with a measurement value in the measurement management service to carry out integrity verification on the mirror image environment, so that the security of the data processing environment is ensured.
After analysis is finished, the authorized service is used for managing the generation and access of diagnosis and treatment results, so that only doctors authorized by the system are authorized to obtain the encrypted medical records. The authorization service performs various checks including verifying the identity, role and authority of the doctor, checking the integrity and signature (i.e., target signature information) of diagnosis and treatment result information (i.e., target task information), and confirming the access authority of the doctor to related resources, thereby comprehensively guaranteeing the safety and privacy of medical data.
Therefore, through application display of the different scenes, the application can provide comprehensive and effective guarantee for data security in different application scenes in the fields of large-scale data processing, machine learning, deep learning, generation type artificial intelligence and the like, has perfect data security and integrity operation steps in the processes of data transmission, calculation and storage, and fully embodies the convenience and safety of the technical scheme in application of each scene.
Accordingly, referring to fig. 3, an embodiment of the present application further provides a privacy enhancing device based on a trusted execution environment, which is applied to a data processing system created based on a preset distributed computing frame, and includes:
The image creation module 11 is configured to trigger, in a task initialization stage, an image creation operation of a trusted execution environment corresponding to a task to be processed, so as to obtain a corresponding image environment and a target metric value corresponding to the image environment;
The information acquisition module 12 is configured to, when receiving a certificate request sent by a target user, create a user certificate corresponding to the certificate request based on a local authority authentication service, and perform task key initialization based on a local key management service, so that the target user initializes task information of the task to be processed based on the obtained task key to obtain target task information;
The verification module 13 is configured to perform, in a task execution stage, environmental verification on the mirror image environment based on a local remote authentication service, the target metric value and a first preset multi-level authentication mechanism, and verify the target user based on a local authorization service and a second preset multi-level authentication mechanism, so as to obtain an environmental verification result and a user verification result;
and the task execution module 14 is configured to schedule the task to be processed to the mirror image environment if the environment verification result and the user verification result both indicate verification is passed, and acquire the task key corresponding to the task to be processed based on the key management service, so as to trigger a corresponding data processing operation by using the task key and the target task information, and obtain a task execution result.
In the task initialization stage, the method triggers the creation of the image of the trusted execution environment of the task to be processed to obtain the image environment and the target measurement value. And receiving a target user certificate request, creating a user certificate based on the authority authentication service, initializing a task key based on the key management service, and initializing task information by a user. In the task execution stage, the mirror image environment is checked through the remote authentication service, the target value and the first preset mechanism, and the user is checked through the authorization service and the second preset mechanism. And if the verification is passed, scheduling the task to be processed to a mirror image environment, and performing data processing by using the task key and the target task information acquired by the key management service to obtain a task execution result. Therefore, the application can effectively realize the privacy enhancement of the data while ensuring the data processing efficiency, thereby protecting the safety of the data.
In some embodiments, the image creation module 11 may specifically include:
And the measurement value acquisition unit is used for carrying out hash operation based on the content of the obtained mirror image environment in the process of executing the trusted execution environment mirror image creation operation so as to obtain a target measurement value corresponding to the mirror image environment, so that a target user registers the target measurement value into a local measurement management service.
In some embodiments, the information obtaining module 12 may specifically include:
the first information acquisition unit is used for acquiring public key information and first identity information corresponding to a target user in a certificate request based on a local authority authentication service when the certificate request sent by the target user is received;
the information judging unit is used for judging whether the public key information and the first identity information meet preset conditions or not so as to obtain corresponding judging results;
And the certificate creation unit is used for signing the public key information and the first identity information by utilizing private key information corresponding to the authoritative authentication service if the judging result shows that the public key information and the first identity information are all satisfied, so as to obtain a user certificate corresponding to the certificate request.
In some embodiments, the information obtaining module 12 may specifically include:
an account creation unit, configured to create a target account corresponding to the target user based on a local key management service and using second identity information of the target user;
The second information acquisition unit is used for creating a root key based on the target account, encrypting the initial task key created by the target user by utilizing the root key, so that the target user encrypts the task information of the task to be processed based on the task key obtained after encryption, and determines task code information corresponding to the task information to obtain target task information.
In some specific embodiments, the preset distributed computing framework comprises a corresponding distributed file storage system, a distributed computing base constructed based on a preset container arrangement platform, and a distributed computing bottom layer framework constructed based on a preset computing cluster system and a preset batch processing and streaming data processing platform, wherein the distributed computing base comprises containers for respectively storing application programs corresponding to the authoritative authentication service, the key management service, the remote authentication service, the measurement management service and the authorization service.
In some embodiments, the verification module 13 may specifically include:
the first verification unit is used for verifying hardware configuration information, software running information and security plug-in information in the report of the mirror image environment based on local remote authentication service so as to obtain a corresponding first verification result;
the second verification unit is used for carrying out integrity verification on the mirror image environment based on the target measurement values in the remote authentication service and the local measurement management service so as to obtain a corresponding second verification result, and determining a corresponding environment verification result based on the first verification result and the second verification result;
The third verification unit is used for verifying the user name, the user certificate and the target signature information corresponding to the target user based on the local authorization service so as to complete corresponding user identity verification operation and obtain a third verification result, wherein the target signature information is data obtained by signing the target task information by the target user;
the fourth checking unit is used for performing integrity checking on the target task information based on the authorization service if the authority checking is passed after the task corresponding to the target user is subjected to the authority checking based on the authorization service, so as to obtain a corresponding fourth checking result;
A fifth verification unit, configured to perform authenticity verification on the authoritative authentication service subscription information in the user certificate based on the authorization service and public key information corresponding to the target user, so as to obtain a corresponding fifth verification result;
A sixth checking unit, configured to perform resource access right check and resource operation right check on the target user based on the authorization service and a to-be-processed resource corresponding to the to-be-processed task, so as to obtain a corresponding sixth checking result;
And the result determining unit is used for determining a corresponding user check result by using the third check result, the fourth check result, the fifth check result and the sixth check result.
In some embodiments, the task execution module 14 may specifically include:
The task scheduling unit is used for submitting the task to be processed to the preset distributed computing framework so that the preset distributed computing framework schedules the task to be processed to the mirror image environment;
The result acquisition unit is used for checking whether the environment check result corresponding to the mirror image environment is checked to pass or not through the remote authentication service again based on the key management service after the task key corresponding to the task to be processed is requested to the key management service, so as to obtain a corresponding check result;
And the data processing unit is used for transmitting the task key corresponding to the task to be processed to the mirror image environment if the checking result shows that the environment checking result is checked, so that the target task information is decrypted by using the task key in the mirror image environment, corresponding data processing operation is triggered based on the decrypted information, and a task execution result is obtained.
Further, the embodiment of the present application further discloses an electronic device, and fig. 4 is a block diagram of an electronic device 20 according to an exemplary embodiment, where the content of the diagram is not to be considered as any limitation on the scope of use of the present application. The electronic device 20 may include, in particular, at least one processor 21, at least one memory 22, a power supply 23, a communication interface 24, an input-output interface 25, and a communication bus 26. Wherein the memory 22 is configured to store a computer program that is loaded and executed by the processor 21 to implement the relevant steps of the trusted execution environment-based privacy enhancement method disclosed in any of the foregoing embodiments. In addition, the electronic device 20 in the present embodiment may be specifically an electronic computer.
In this embodiment, the power supply 23 is configured to provide working voltages for each hardware device on the electronic device 20, the communication interface 24 is capable of creating a data transmission channel with an external device for the electronic device 20, and the communication protocol to be followed is any communication protocol applicable to the technical solution of the present application, which is not specifically limited herein, and the input/output interface 25 is configured to obtain external input data or output data to the external device, and the specific interface type of the input/output interface may be selected according to the specific application needs and is not specifically limited herein.
The memory 22 may be a carrier for storing resources, such as a read-only memory, a random access memory, a magnetic disk, or an optical disk, and the resources stored thereon may include an operating system 221, a computer program 222, and the like, and the storage may be temporary storage or permanent storage.
The operating system 221 is used for managing and controlling various hardware devices on the electronic device 20 and the computer program 222, which may be Windows Server, netware, unix, linux, etc. The computer program 222 may further comprise a computer program that can be used to perform other specific tasks in addition to the computer program that can be used to perform the trusted execution environment-based privacy enhancement method performed by the electronic device 20 as disclosed in any of the previous embodiments.
Furthermore, the application also discloses a computer readable storage medium for storing a computer program, wherein the computer program is executed by a processor to realize the privacy enhancement method based on the trusted execution environment. For specific steps of the method, reference may be made to the corresponding contents disclosed in the foregoing embodiments, and no further description is given here.
In this specification, each embodiment is described in a progressive manner, and each embodiment is mainly described in a different point from other embodiments, so that the same or similar parts between the embodiments are referred to each other. For the device disclosed in the embodiment, since it corresponds to the method disclosed in the embodiment, the description is relatively simple, and the relevant points refer to the description of the method section.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative elements and steps are described above generally in terms of functionality in order to clearly illustrate the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. The software modules may be disposed in Random Access Memory (RAM), memory, read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
Finally, it is further noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises an element.
While the foregoing has been provided to illustrate the principles and embodiments of the present application, specific examples have been provided herein to assist in understanding the principles and embodiments of the present application, and are intended to be in no way limiting, for those of ordinary skill in the art will, in light of the above teachings, appreciate that the principles and embodiments of the present application may be varied in any way.
Claims (10)
Publications (1)
Publication Number | Publication Date |
---|---|
CN119483978A true CN119483978A (en) | 2025-02-18 |
Family
ID=
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11533164B2 (en) | System and method for blockchain-based cross-entity authentication | |
US11025435B2 (en) | System and method for blockchain-based cross-entity authentication | |
CN109274652B (en) | Identity information verification system, method and device and computer storage medium | |
Anakath et al. | Privacy preserving multi factor authentication using trust management | |
EP3788522A1 (en) | System and method for mapping decentralized identifiers to real-world entities | |
US9900157B2 (en) | Object signing within a cloud-based architecture | |
US20140282834A1 (en) | Managing exchanges of sensitive data | |
US11275865B2 (en) | Privacy friendly decentralized ledger based identity management system and methods | |
CN115580413B (en) | Zero-trust multi-party data fusion calculation method and device | |
Slaughter et al. | Information security plan for flight simulator applications | |
CN111769956B (en) | Service processing method, device, equipment and medium | |
US11728973B2 (en) | System and method for secure access management | |
KR101643677B1 (en) | Securing execution of computational resources | |
EP3883204B1 (en) | System and method for secure generation, exchange and management of a user identity data using a blockchain | |
CN119483978A (en) | Privacy enhancement method, device, equipment and medium based on trusted execution environment | |
JP2010262550A (en) | Encryption system, encryption program, encryption method and cryptograph device | |
JP5054552B2 (en) | Secondary content right management method and system, program, and computer-readable recording medium | |
Schaffer | Ontology for authentication | |
de Carvalho et al. | How to improve monitoring and auditing security properties in cloud storage? | |
CN116961937A (en) | Block chain program access method, related equipment and storage medium | |
KR20230089559A (en) | Blockchain-based fido authentication system | |
CN117595996A (en) | Electronic signature processing method and device, electronic equipment and storage medium | |
Danner et al. | Securing emergency response operations using distributed trust decisions | |
Alawneh | Mitigating the risk of insider threats when sharing credentials. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication |