Home
Author Guide
Editor Guide
Reviewer Guide
Special Issues
Special Issue Introduction
Special Issues List
Topics
Published Issues
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2010
2009
2008
2007
2006
journal menu
Aims and Scope
Editorial Board
Indexing Service
Article Processing Charge
Open Access Policy
Publication Ethics
Digital Preservation Policy
Editorial Process
Subscription
Contact Us
General Information
ISSN:
1796-2021 (Online); 2374-4367 (Print)
Abbreviated Title:
J. Commun.
Frequency:
Monthly
DOI:
10.12720/jcm
Abstracting/Indexing:
Scopus
;
DBLP
;
CrossRef
,
EBSCO
,
Google Scholar
;
CNKI,
etc.
E-mail questions
or comments to
editor@jocm.us
Acceptance Rate:
27%
APC:
800 USD
Average Days to Accept:
88 days
3.4
2023
CiteScore
51st percentile
Powered by
Article Metrics in Dimensions
Editor-in-Chief
Prof. Maode Ma
College of Engineering, Qatar University, Doha, Qatar
I'm very happy and honored to take on the position of editor-in-chief of JCM, which is a high-quality journal with potential and I'll try my every effort to bring JCM to a next level...
[Read More]
What's New
2024-08-20
Vol. 19, No. 8 has been published online!
2024-07-22
Vol. 19, No. 7 has been published online!
2024-06-20
Volume 19, No. 4 has been indexed by Scopus.
Home
>
Published Issues
>
2015
>
Volume 10, No. 1, January 2015
>
Requirement-Oriented Privacy Protection Analysis Architecture in Cloud Computing
Changbo Ke
1,2
, Ruchuan Wang
1,2
, Fu Xiao
1,2,4
, and Zhiqiu Huang
3
1.School of Computer Sci. & Tech./School of Software, Nanjing Univ. of Posts and Telecom., Nanjing 210023, China
2.Jiangsu High Tech. Research Key Laboratory for Wireless Sensor Networks, Nanjing, Jiangsu, 210003, China
3.College of computer Sci. and Tech., Nanjing Univ. of Aeronautics and Astronautics, Nanjing, Jiangsu, 210016 China
4.Key Lab of Broadband Wireless Communication and Sensor Network Tech. (Nanjing University of Posts and Telecom.), Ministry of Education Jiangsu Province, Nanjing, Jiangsu, 210003, China
Abstract—As a new software paradigm, cloud computing provides services dynamically according to user requirements. However, it is difficult to control personal privacy information because of the opening, virtualization, multi-tenancy and service outsourcing characters. Therefore, how to protect user privacy information has become a research focus. In this paper, we propose requirement-oriented privacy protection theory analysis architecture and implementation platform. Firstly, the theory analysis architecture is depicted as layers, and we analyze the function and key technologies of every layer. Secondly, we address the privacy property description method with ontology and description logic, and then analyze the theory modules of privacy items conflict checking layer, privacy policy negotiation layer and privacy agreement forensics layer. Thirdly, according to theory architecture, we design the implementation platform of requirement-oriented privacy protection, and discuss the function and workflow. In the end, we conclude and point out the future work.
Index Terms—Privacy protection, privacy items, privacy policy, privacy property, cloud computing
Cite: Changbo Ke, Ruchuan Wang, Fu Xiao, and Zhiqiu Huang, "Requirement-Oriented Privacy Protection Analysis Architecture in Cloud Computing," Journal of Communications, vol. 10, no. 1, pp. 55-63, 2015. Doi: 10.12720/jcm.10.1.55-63
8-JCM-409021
PREVIOUS PAPER
Identifying Influential Nodes for Efficient Routing in Opportunistic Networks
NEXT PAPER
Grading Image Retrieval Based on DCT and DWT Compressed Domains Using Low-Level Features