期刊文献+

云计算环境下隐私需求的描述与检测方法 被引量:12

Privacy Requirement Description and Checking Method in Cloud Computing
下载PDF
导出
摘要 云计算已经成为一种计算范型为用户提供服务,但其开放性、虚拟化和服务外包化的特点使得用户的隐私信息难以控制和保护.以描述逻辑为基础,提出了一种云计算环境下面向语义的隐私需求描述与检测方法.首先,对用户隐私需求与服务提供者的隐私策略进行描述;其次,对两者之间是否存在冲突进行检测,发现满足用户隐私需求的服务;最后,利用Protégé本体建模工具对用户的隐私需求和服务提供者的隐私策略进行建模,并利用Pellet推理机进行了实验,分别对本体模型中的概念进行一致性检测和对概念与逻辑公理之间的可满足性进行检验,从而证明了此检测方法的正确性与可行性. Cloud computing has been a computing paradigm to provide services for users .However ,it is difficult to control and protect personal privacy information because of its opening ,virtualization , multi‐tenancy and service outsourcing characters .T herefore ,how to prevent user privacy information from being used and propagated in cloud computing illegally has become a research focus . In this work , we propose a semantic‐oriented privacy requirement description method and checking mechanism .First of all , we describe the user privacy requirement and privacy policy of service provider based on description logic . Secondly , we address the privacy requirement checking framework .Namely ,we build the knowledge base through privacy disclosure assertion of user map to TBox and privacy disclosure assertion of service provider map to ABox ,and then reason the TBox and ABox by taking advantage of the Tableau algorithm .In the end ,we check whether there are the conflicts between user privacy requirement and privacy policy of service provider through experiment and case analysis .Namely ,we build the privacy requirement checking model with Protégé of Stanford University ,and prove the consistency of conceptions in model and the satisfiability between the conceptions and the logic axioms with Pellet reasonor .Thereby ,the correctness and feasibility of our method is certified .
出处 《计算机研究与发展》 EI CSCD 北大核心 2015年第4期879-888,共10页 Journal of Computer Research and Development
基金 南京邮电大学引进人才科研启动基金资助(NY214164) 国家自然科学基金项目(61272083) 南京航空航天大学博士学位论文创新与创优基金项目(BCXJ12-14) 中央高校基本科研业务费专项资金
关键词 云计算 描述逻辑 隐私属性 隐私策略 隐私偏好 cloud computing description logic privacy property privacy policy privacy preference
  • 相关文献

参考文献24

  • 1Mell P, Grance T. Draft N/ST working definition of cloud computing [EB/OL]. Washington: Information Technology Laboratory, United States Department of Commerce, 2010 [2014-04-08]. http://csre, nist. gov/groups/SNS/cloud- computing. 被引量:1
  • 2Armbrust M, Fox A, Griffith R, et al. Above the clouds: A berkeley view of cloud computing, UCB/EECS-2009-28 [R]. Berkeley, CA: University of California, Berkeley, 2009: 1- 23. 被引量:1
  • 3Caroline K, Ellen A. The Right to Privacy [M]. New York: Vintage, 1972:100-132. 被引量:1
  • 4Goldberg I, Wagner D, Brewer E. Privacy enhancing technologies for the Internet [C]//Proc of the 42nd IEEE Int Computer Conf (COMPCON'97). Piscataway, NJ: IEEE, 1997:103-109. 被引量:1
  • 5Xiao Fangxiong, Huang Zhiqiu, Cao Zilin, et al. Modeling cost-aware Web services composition using PTCCS [C] // Proc of the 2009 IEEE Int Conf on Web Services (ICWS 2009). Piscataway, NJ: IEEE, 2009:461-468. 被引量:1
  • 6Yee G, Korba L. Privacy policy compliance for Web services [C] //Proc of the 2004 IEEE Int Conf on Web Services(ICWS 2004). Piscataway, NJ: IEEE, 2004:158-165. 被引量:1
  • 7Zhang Jia, Chang Carl K, Zhang Liangjie, et al. Toward a service-oriented development through a case study [J]. IEEE Trans on Systems, Man, Cybernetics: Part A, 2007, 37 (6) : 955-969. 被引量:1
  • 8Pearso S. Taking account of privacy when designing cloud computing services, HPL-2009-54 [R]. Palo Alto, CA: HP Labs, 2009. 被引量:1
  • 9Pearson S, Charlesworth A. Accountability as a way forward for privacy protection in the cloud, HPL-2009-178 [R]. Palo Alto, CA: HP Labs, 2009. 被引量:1
  • 10Ke Changbo, Huang Zhiqiu. Sel-adaptive semantic Web service matching method [J]. Knowledge-Based System, 2012, 35:41-48. 被引量:1

二级参考文献30

  • 1李建欣,怀进鹏,李先贤.自动信任协商研究[J].软件学报,2006,17(1):124-133. 被引量:52
  • 2李建欣,怀进鹏.COTN:基于契约的信任协商系统[J].计算机学报,2006,29(8):1290-1300. 被引量:18
  • 3Bertino E, Ferrari E, Squicciarini A C. Trust-X: A peer to peer framework for trust establishment. IEEE Transactions on Knowledge and Data Engineering, 2004, 16(7):827-842. 被引量:1
  • 4Nejdl W, Olmedilla D, Winslett M. PeerTrust: Automated trust negotiation for peers on the semantic Web//Proceedings of the Secure Data Management. Toronto, Ontario, Canada,2004:118-132. 被引量:1
  • 5Winsborough W, Seamons K, Jones V. Automated trust negotiation. North Carolina State University at Raleigh: Technical Report TR-2000-05, 2000. 被引量:1
  • 6Yu Ting, Ma Xiao-Song, Winslett M. PRUNES: An efficient and complete strategy for automated trust negotiation over the Internet//Proceedings of the ACM Conference on Computer and Communications Security. New York, 2000: 210-219. 被引量:1
  • 7Smith B, Seamons K E, Jones M D. Responding to policies at runtime in Trust Builder//Proceedings of the 5th International Workshop on Policies for Distributed Systems and Networks. Washington, 2004:149-158. 被引量:1
  • 8Lee J A, Winslett M. Towards an efficient and language-agnostic compliance checker for trust negotiation systems//Proceedings of the 3rd ACM Symposium on Information, Computer and Communications Security. Tokyo, Japan, 2008: 228-239. 被引量:1
  • 9Li Jiang-Tao, Li Ning Hui. OACerts: Oblivious attribute certificates//Proceedings of the 3rd Conference on Applied Cryptography and Network Security. New York, 2005: 122- 138. 被引量:1
  • 10Bauer D, Blough M D, Cash D. Minimal information disclosure with efficiently verifiable credentials//Proceedings of the 4th ACM workshop on Digital Identity Management. Virginia, 2008, 15-24. 被引量:1

共引文献27

同被引文献112

  • 1梅婧,林作铨.从ALC到SHOQ(D):描述逻辑及其Tableau算法[J].计算机科学,2005,32(3):1-11. 被引量:34
  • 2顾明.用例图的BNF描述和扩充的基于约束模块化Petri网检测[J].计算机应用与软件,2005,22(11):26-27. 被引量:1
  • 3汤小康,王志刚,曹步文.UML用例图的Z形式规范[J].计算机与现代化,2006(11):12-13. 被引量:7
  • 4Mell P, Grance T. Draft NIST working definition of cloud computing [EB/OL]. ( 2009-06-03 ) [ 2015-08-13 ]. http:// csrc: hist. gov/groups/SNS/cloud-computinglindex, html. 被引量:1
  • 5Armbrust M, Fox A, Griffith R, etal. Above the clouds: A berkeley view of cloud computing, UCB-EECS-2009-28[R]. Berkeley, CA:University of California, Berkeley, 2009. 被引量:1
  • 6Warren S D, Brandeis L D. The right to privacy [G] // Harvard Law Review. Cambridge, MA: Gannett House, 1890:193-220. 被引量:1
  • 7Goldberg I, Wagner D, Brewer E. Privacy-enhancing technologies for the Internet [C] //Proc of the 42nd IEEE Int Computer Conf (COMPCON'97). Los Alamitos, CA: IEEE Computer Society, 1997:103-109. 被引量:1
  • 8Pearson S: Taking account of privacy when designing cloud computing services [C]//Proc of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing. Los Alamitos, CA: IEEE Computer Society, 2009:44-52. 被引量:1
  • 9Pearson S, Charlesworth A. Accountability as a way forward for privacy protection in the cloud, HPL-2009-178 [R]. Palo Alto, CA: HP Labs, 2009. 被引量:1
  • 10Farrell C. FTC charges deceptive privacy practices in Google's rollout of its buzz social network [N]. US Federal Trade Commission News Release, 2011-03-23. 被引量:1

引证文献12

二级引证文献48

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部