Bai et al., 2025 - Google Patents
Safeguarding user data privacy in online Large Language Model servicesBai et al., 2025
View PDF- Document ID
- 16365540762248172260
- Author
- Bai T
- Feng Y
- Fu S
- Publication year
- Publication venue
- Journal of Systems Architecture
External Links
Snippet
Abstract Large Language Models (LLMs), such as GPT, have become central to modern AI applications, including conversational agents, language translation, and document processing. Due to their computational demands, these models are typically hosted on …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/76—Proxy, i.e. using intermediary entity to perform cryptographic operations
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Aloufi et al. | Blindfolded evaluation of random forests with multi-key homomorphic encryption | |
| Fan et al. | PPMCK: Privacy-preserving multi-party computing for K-means clustering | |
| TW201448552A (en) | Privacy-preserving ridge regression | |
| Hu et al. | Batch image encryption using generated deep features based on stacked autoencoder network | |
| Liu et al. | DHSA: efficient doubly homomorphic secure aggregation for cross-silo federated learning: Z. Liu et al. | |
| Mahato et al. | Privacy preserving verifiable federated learning scheme using blockchain and homomorphic encryption | |
| Ibarrondo et al. | Banners: Binarized neural networks with replicated secret sharing | |
| Hao et al. | FastSecNet: An efficient cryptographic framework for private neural network inference | |
| Vasanthanayaki | Secure medical health care content protection system (SMCPS) with watermark detection for multi cloud computing environment | |
| Nagarajan et al. | Blockchain-based smart and secured scheme for question sharing using bee colony optimization based quantum logistic map encryption | |
| Niu et al. | A dual image encryption method based on improved henon mapping and improved logistic mapping | |
| Bai et al. | Safeguarding user data privacy in online Large Language Model services | |
| CN118509157B (en) | Privacy protection federal learning method for resisting back door attack | |
| Lansari et al. | FedCrypt: A dynamic white-box watermarking scheme for homomorphic federated learning | |
| Zhao et al. | Cipherdm: Secure three-party inference for diffusion model sampling | |
| Yang et al. | PFID: Privacy first inference delegation framework for LLMs | |
| Dong et al. | Privacy-Preserving Federated Learning via Homomorphic Adversarial Networks | |
| Shah et al. | Encrypted Intelligence: A Comparative Analysis of Homomorphic Encryption Frameworks for Privacy-Preserving AI | |
| Lee et al. | Verifiable computation over encrypted data via MPC-in-the-head zero-knowledge proofs: J. Lee et al. | |
| Antwi‐Boasiako et al. | Enhanced multi‐key privacy‐preserving distributed deep learning protocol with application to diabetic retinopathy diagnosis | |
| CN118427874B (en) | A Quantitative Neural Network Privacy Inference Method and System with Dual-branch Structure | |
| Jandali et al. | Optimizing Privacy-Preserving Primitives to Support LLM-Scale Applications | |
| Abdulhadi et al. | A Secure Framework for Automated Question Generation and Examination Protection Using Natural Language Processing (NLP) and Multilayer Encryption | |
| He et al. | ENSI: Efficient Non-Interactive Secure Inference for Large Language Models | |
| Wang et al. | Towards Efficient Privacy-Preserving Keyword Search for Outsourced Data in Intelligent Transportation Systems |