COMPUTER IMPLEMENTED METHOD FOR PERFORMING CLOUD COMPUTING ON DATA BEING STORED PSEUDONYMOUSLY IN A DATABASE
First Claim
1. A computer implemented method for performing cloud computing on data of a first user employing cloud components, the cloud components comprising a first database and a data processing component, wherein an asymmetric cryptographic key pair is associated with the first user, said asymmetric cryptographic key pair comprising a public key and a private key, the data being stored pseudonymously non-encrypted in the first database with the data being assigned to an identifier, wherein the identifier comprises the public key, the method comprising retrieving the data from the first database by the data processing component, wherein retrieving the data from the first database comprises receiving the identifier and retrieving the data assigned to the identifier from the first database, wherein the method further comprises processing the retrieved data by the data processing component and providing a result of the analysis.
3 Assignments
0 Petitions
Accused Products
Abstract
The invention relates to a computer implemented method for performing cloud computing on data of a first user employing cloud components, the cloud components comprising a first database and a data processing component, wherein an asymmetric cryptographic key pair is associated with the first user, said asymmetric cryptographic key pair comprising a public key and a private key, the data being stored pseudonymously non-encrypted in the first database with the data being assigned to an identifier, wherein the identifier comprises the public key, the method comprising retrieving the data from the first database by the data processing component, wherein retrieving the data from the first database comprises receiving the identifier and retrieving the data assigned to the identifier from the first database, wherein the method further comprises processing the retrieved data by the data processing component and providing a result of the analysis.
148 Citations
21 Claims
- 1. A computer implemented method for performing cloud computing on data of a first user employing cloud components, the cloud components comprising a first database and a data processing component, wherein an asymmetric cryptographic key pair is associated with the first user, said asymmetric cryptographic key pair comprising a public key and a private key, the data being stored pseudonymously non-encrypted in the first database with the data being assigned to an identifier, wherein the identifier comprises the public key, the method comprising retrieving the data from the first database by the data processing component, wherein retrieving the data from the first database comprises receiving the identifier and retrieving the data assigned to the identifier from the first database, wherein the method further comprises processing the retrieved data by the data processing component and providing a result of the analysis.
-
12. A computer implemented method for receiving a result from a second user of a data processing component of a network cloud by a first user, wherein an asymmetric cryptographic key pair is associated with the first user, said key pair comprising a public key and a private key, the method comprising receiving the result by said first user with the recipient address at which the result is received comprising the public key.
-
13. A computer implemented method for storing data of a first user in a first or a second database of a network cloud, the first user having a private key, the method comprising:
-
calculating a set of public keys, wherein the private key and each public key of the set of public keys form an asymmetric cryptographic key pair, storing the data encrypted with one of the public keys and assigned to the first user in the second database or storing the data pseudonymously in the first database with the data being assigned to an identifier, wherein the identifier comprises one of the public keys. - View Dependent Claims (14)
-
-
19. A cloud network for performing cloud computing on data of a first user, the cloud comprising cloud components, the cloud components comprising a first database and a data processing component, wherein an asymmetric cryptographic key pair is associated with the first user, said asymmetric cryptographic key pair comprising a public key and a private key, the data being stored pseudonymously non-encrypted in the first database with the data being assigned to an identifier, wherein the identifier comprises the public key, wherein the data processing component is adapted for retrieving the data from the first database, wherein retrieving the data from the first database comprises receiving the identifier and retrieving the data assigned to the identifier from the first database, wherein the data processing component is further adapted for processing the retrieved data and providing a result of the analysis.
-
20. A computer system for receiving a result from a second user of a network cloud by a first user, wherein an asymmetric cryptographic key pair is associated with the first user, said key pair comprising a public key and a private key, the system comprising means for receiving the result by said first user with the recipient address at which the result is received comprising the public key.
-
21. A computer system for storing data of a first user in a first or a second database of a network cloud, the first user having a private key, the system comprising:
-
processor means for calculating a set of public keys, wherein the private key and each public key of the set of public keys form an asymmetric cryptographic key pair, means for storing the data encrypted with one of the public keys and assigned to the first user in the second database or means for storing the data pseudonymously in the first database with the data being assigned to an identifier, wherein the identifier comprises one
-
Specification