Unlock instant, AI-driven research and patent intelligence for your innovation.

Trusted Enforcement Method of Privacy Policy in Cloud Environment

A privacy policy and execution method technology, applied in the field of cloud computing security, can solve the problems that users are difficult to identify cloud service providers, lack of distributed policy-driven access control mechanisms, etc., to ensure credibility and integrity, and ensure privacy security performance, ensuring credible implementation

Active Publication Date: 2017-12-08
BEIJING UNIV OF TECH
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, existing cloud computing applications still lack a distributed policy-driven access control mechanism, so it is necessary to provide a distributed execution method for privacy policies to solve the problem of cloud-based implementation of privacy policies
In addition, since the privacy policy is also stored and executed in the "cloud", the attacker may still pretend to be the user to tamper with the privacy policy, that is, it is difficult for the user to know whether the cloud service provider faithfully abides by the policy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted Enforcement Method of Privacy Policy in Cloud Environment
  • Trusted Enforcement Method of Privacy Policy in Cloud Environment
  • Trusted Enforcement Method of Privacy Policy in Cloud Environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The operating environment of the present invention is composed of two parts, a remote access client program and a cloud platform. Among them, the remote access client program is developed based on Myeclipse10.0, which is implemented in J2SDK1.6 version java language, installed on the Windows7 system configured as Intel Core Duo.i5-4200H@1.7GHz, and used to send user requests and accept Service response; the cloud platform is developed based on the Swift1.7 cloud storage architecture. The platform is composed of 9 IntelXeon E5-2650@2.0GHz Linux system servers configured with a trusted root TPM. Each module in the privacy policy distributed execution method It is independently configured on each server, and based on the trusted root TPM in each server, the implementation of the privacy policy can be guaranteed, and the third-party Sunxacml development kit is used to analyze and supplement user requests, subject and object metadata, and privacy policies. Full sum matching ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a credible execution method for a privacy policy in a cloud environment, and particularly relates to credible access control for cloud data privacy protection in the cloud environment, which aims to solve the problems of implementation and implementation guarantee of the privacy policy in the cloud environment in the technical field of cloud computing security. The method adopts a policy-driven concept; according to various privacy protection requirements of multi-tenant, flexible privacy protection is realized through distributed execution of the privacy policy in the cloud environment; furthermore, through combination of credible computing technology, the cloud privacy policy is protected from malicious modification by attackers, credibility of execution of the privacy policy is guaranteed, and finally, privacy security of cloud data storage of the user is guaranteed.

Description

technical field [0001] The invention belongs to the technical field of cloud computing security, and in particular relates to a trusted access control method for cloud data privacy protection in a cloud environment. This method adopts policy-driven thinking and trusted computing technology, and provides a distributed execution method of cloud privacy policy (privacy protection-oriented access control policy) and its implementation guarantee method, so as to realize the trusted execution of cloud privacy policy. Background technique [0002] Cloud computing is a computing model and business model based on the Internet that gathers various IT resources scattered to form a shared resource pool and provides users with large-scale computing and storage services in a dynamic and flexible manner. hot spots in technology. However, in the cloud environment, user data is stored in the "cloud", and these user data may involve sensitive information of user privacy. Since the rise of c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0428H04L63/10H04L63/1441H04L63/20H04L67/1097
Inventor 林莉刘婷婷胡健
Owner BEIJING UNIV OF TECH