Method and Apparatus for Data Protection in Cloud-Based Matching System
First Claim
1. A method for data protection in cloud-based matching systems, comprising:
- transforming alternative client data using the principle of Independence of Irrelevant Alternatives (IIA);
receiving calculated results of matching upon the transformed alternative data;
rebuilding a final result for said alternative client data by a reverse transformation on the calculated results using the principle of IIA.
1 Assignment
0 Petitions
Accused Products
Abstract
Enhanced security is provided for cloud based matching systems by using the principle of Independence of Irrelevant Alternatives (IIA). The client uses IIA to transform alternative data before sending it to the cloud, and then does the reverse transformation on the matching results generated by the cloud service provider to rebuild the matching results for the alternative data. Using this protocol, the client does not disclose its own data in a form that is usable by the cloud service provider, and the cloud service provider does not disclose to the client the provider'"'"'s proprietary coefficient beta information.
-
Citations
20 Claims
-
1. A method for data protection in cloud-based matching systems, comprising:
-
transforming alternative client data using the principle of Independence of Irrelevant Alternatives (IIA); receiving calculated results of matching upon the transformed alternative data; rebuilding a final result for said alternative client data by a reverse transformation on the calculated results using the principle of IIA. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for data protection of cloud-based matching, comprising:
-
a processing unit for transforming alternative client data using the principle of Independence of Irrelevant Alternatives (IIA); a communications channel for receiving results of a matching calculation upon the transformed alternative data; a processing unit for rebuilding a final result for said alternative client data by a reverse transformation on the calculated results using the principle of IIA. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method for data protection in cloud-based matching systems, comprising:
-
receiving from a source alternative client data transformed using the principle of Independence of Irrelevant Alternatives (IIA); calculating results of matching upon the transformed alternative data; making said results available to the source for rebuilding a final result for said alternative client data by a reverse transformation on the calculated results using the principle of IIA. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification