Credible execution method for privacy policy in cloud environment

A privacy policy and execution method technology, applied in the field of cloud computing security, can solve the problems that users are difficult to identify cloud service providers, lack of distributed policy-driven access control mechanisms, etc., to ensure credibility and integrity, and ensure privacy security performance, ensuring credible implementation

Active Publication Date: 2015-04-08
BEIJING UNIV OF TECH
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

It introduces an improved way of protecting sensitive personal data by providing them securely within their own organization (the Cloud). Instead of relying solely upon existing methods like encryption key management systems, this new approach allows multiple users share one computer without compromising any individual oneself. By implementing these techniques, there are no threats against attacks but they ensure only authorized individuals receive certain protected resources.

Problems solved by technology

The technical problem addressed in this patents relates to ensuring securely accessing protected data within a virtualized system while maintaining efficient processing capabilities without compromising any trustworthiness or confidentiality issues associated therewith. Current methods require manual input and are prone to attacks over time due to changes made during operation.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credible execution method for privacy policy in cloud environment
  • Credible execution method for privacy policy in cloud environment
  • Credible execution method for privacy policy in cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The operating environment of the present invention is composed of two parts, a remote access client program and a cloud platform. Among them, the remote access client program is developed based on Myeclipse10.0, which is implemented in J2SDK1.6 version java language, installed on the Windows7 system configured as Intel Core Duo.i5-4200H1.7GHz, and used to send user requests and receive services Response; the cloud platform is developed based on the Swift1.7 cloud storage architecture. The platform is composed of 9 Intel Xeon E5-2650 2.0GHz Linux system servers configured with a trusted root TPM. Each module in the privacy policy distributed execution method is independent It is configured on each server, and based on the trusted root TPM in each server, the implementation of privacy policy can be guaranteed, and the third-party Sunxacml development kit is used to analyze, complete and complete user requests, subject and object metadata, and privacy policies. match calcu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a credible execution method for a privacy policy in a cloud environment, and particularly relates to credible access control for cloud data privacy protection in the cloud environment, which aims to solve the problems of implementation and implementation guarantee of the privacy policy in the cloud environment in the technical field of cloud computing security. The method adopts a policy-driven concept; according to various privacy protection requirements of multi-tenant, flexible privacy protection is realized through distributed execution of the privacy policy in the cloud environment; furthermore, through combination of credible computing technology, the cloud privacy policy is protected from malicious modification by attackers, credibility of execution of the privacy policy is guaranteed, and finally, privacy security of cloud data storage of the user is guaranteed.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products