• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
高级检索

云计算环境下隐私需求的描述与检测方法

柯昌博, 黄志球

柯昌博, 黄志球. 云计算环境下隐私需求的描述与检测方法[J]. 计算机研究与发展, 2015, 52(4): 879-888. DOI: 10.7544/issn1000-1239.2015.20131906
引用本文: 柯昌博, 黄志球. 云计算环境下隐私需求的描述与检测方法[J]. 计算机研究与发展, 2015, 52(4): 879-888. DOI: 10.7544/issn1000-1239.2015.20131906
Ke Changbo, Huang Zhiqiu. Privacy Requirement Description and Checking Method in Cloud Computing[J]. Journal of Computer Research and Development, 2015, 52(4): 879-888. DOI: 10.7544/issn1000-1239.2015.20131906
Citation: Ke Changbo, Huang Zhiqiu. Privacy Requirement Description and Checking Method in Cloud Computing[J]. Journal of Computer Research and Development, 2015, 52(4): 879-888. DOI: 10.7544/issn1000-1239.2015.20131906
柯昌博, 黄志球. 云计算环境下隐私需求的描述与检测方法[J]. 计算机研究与发展, 2015, 52(4): 879-888. CSTR: 32373.14.issn1000-1239.2015.20131906
引用本文: 柯昌博, 黄志球. 云计算环境下隐私需求的描述与检测方法[J]. 计算机研究与发展, 2015, 52(4): 879-888. CSTR: 32373.14.issn1000-1239.2015.20131906
Ke Changbo, Huang Zhiqiu. Privacy Requirement Description and Checking Method in Cloud Computing[J]. Journal of Computer Research and Development, 2015, 52(4): 879-888. CSTR: 32373.14.issn1000-1239.2015.20131906
Citation: Ke Changbo, Huang Zhiqiu. Privacy Requirement Description and Checking Method in Cloud Computing[J]. Journal of Computer Research and Development, 2015, 52(4): 879-888. CSTR: 32373.14.issn1000-1239.2015.20131906

云计算环境下隐私需求的描述与检测方法

基金项目: 南京邮电大学引进人才科研启动基金资助(NY214164);国家自然科学基金项目(61272083);南京航空航天大学博士学位论文创新与创优基金项目(BCXJ12-14);中央高校基本科研业务费专项资金
详细信息
  • 中图分类号: TP311

Privacy Requirement Description and Checking Method in Cloud Computing

  • 摘要: 云计算已经成为一种计算范型为用户提供服务,但其开放性、虚拟化和服务外包化的特点使得用户的隐私信息难以控制和保护.以描述逻辑为基础,提出了一种云计算环境下面向语义的隐私需求描述与检测方法.首先,对用户隐私需求与服务提供者的隐私策略进行描述;其次,对两者之间是否存在冲突进行检测,发现满足用户隐私需求的服务;最后,利用Protégé本体建模工具对用户的隐私需求和服务提供者的隐私策略进行建模,并利用Pellet推理机进行了实验,分别对本体模型中的概念进行一致性检测和对概念与逻辑公理之间的可满足性进行检验,从而证明了此检测方法的正确性与可行性.
    Abstract: Cloud computing has been a computing paradigm to provide services for users. However, it is difficult to control and protect personal privacy information because of its opening, virtualization, multi-tenancy and service outsourcing characters. Therefore, how to prevent user privacy information from being used and propagated in cloud computing illegally has become a research focus. In this work, we propose a semantic-oriented privacy requirement description method and checking mechanism. First of all, we describe the user privacy requirement and privacy policy of service provider based on description logic. Secondly, we address the privacy requirement checking framework. Namely, we build the knowledge base through privacy disclosure assertion of user map to TBox and privacy disclosure assertion of service provider map to ABox, and then reason the TBox and ABox by taking advantage of the Tableau algorithm. In the end, we check whether there are the conflicts between user privacy requirement and privacy policy of service provider through experiment and case analysis. Namely, we build the privacy requirement checking model with Protégé of Stanford University, and prove the consistency of conceptions in model and the satisfiability between the conceptions and the logic axioms with Pellet reasonor. Thereby, the correctness and feasibility of our method is certified.
计量
  • 文章访问数:  1210
  • HTML全文浏览量:  0
  • PDF下载量:  885
  • 被引次数: 0
出版历程
  • 发布日期:  2015-03-31

目录

    /

    返回文章
    返回