Home > Published Issues > 2015 > Volume 10, No. 1, January 2015 >

Requirement-Oriented Privacy Protection Analysis Architecture in Cloud Computing

Changbo Ke1,2, Ruchuan Wang1,2, Fu Xiao1,2,4 , and Zhiqiu Huang3
1.School of Computer Sci. & Tech./School of Software, Nanjing Univ. of Posts and Telecom., Nanjing 210023, China
2.Jiangsu High Tech. Research Key Laboratory for Wireless Sensor Networks, Nanjing, Jiangsu, 210003, China
3.College of computer Sci. and Tech., Nanjing Univ. of Aeronautics and Astronautics, Nanjing, Jiangsu, 210016 China
4.Key Lab of Broadband Wireless Communication and Sensor Network Tech. (Nanjing University of Posts and Telecom.), Ministry of Education Jiangsu Province, Nanjing, Jiangsu, 210003, China

Abstract—As a new software paradigm, cloud computing provides services dynamically according to user requirements. However, it is difficult to control personal privacy information because of the opening, virtualization, multi-tenancy and service outsourcing characters. Therefore, how to protect user privacy information has become a research focus. In this paper, we propose requirement-oriented privacy protection theory analysis architecture and implementation platform. Firstly, the theory analysis architecture is depicted as layers, and we analyze the function and key technologies of every layer. Secondly, we address the privacy property description method with ontology and description logic, and then analyze the theory modules of privacy items conflict checking layer, privacy policy negotiation layer and privacy agreement forensics layer. Thirdly, according to theory architecture, we design the implementation platform of requirement-oriented privacy protection, and discuss the function and workflow. In the end, we conclude and point out the future work.

Index Terms—Privacy protection, privacy items, privacy policy, privacy property, cloud computing

Cite: Changbo Ke, Ruchuan Wang, Fu Xiao, and Zhiqiu Huang, "Requirement-Oriented Privacy Protection Analysis Architecture in Cloud Computing," Journal of Communications, vol. 10, no. 1, pp. 55-63, 2015. Doi: 10.12720/jcm.10.1.55-63