Trusted Enforcement Method of Privacy Policy in Cloud Environment
A privacy policy and execution method technology, applied in the field of cloud computing security, can solve the problems that users are difficult to identify cloud service providers, lack of distributed policy-driven access control mechanisms, etc., to ensure credibility and integrity, and ensure privacy security performance, ensuring credible implementation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0032] The operating environment of the present invention is composed of two parts, a remote access client program and a cloud platform. Among them, the remote access client program is developed based on Myeclipse10.0, which is implemented in J2SDK1.6 version java language, installed on the Windows7 system configured as Intel Core Duo.i5-4200H@1.7GHz, and used to send user requests and accept Service response; the cloud platform is developed based on the Swift1.7 cloud storage architecture. The platform is composed of 9 IntelXeon E5-2650@2.0GHz Linux system servers configured with a trusted root TPM. Each module in the privacy policy distributed execution method It is independently configured on each server, and based on the trusted root TPM in each server, the implementation of the privacy policy can be guaranteed, and the third-party Sunxacml development kit is used to analyze and supplement user requests, subject and object metadata, and privacy policies. Full sum matching ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


