Font Size: a A A

Research On Privacy Analysis And Protection Method Of Service Composition In Cloud Computing

Posted on:2015-12-14Degree:DoctorType:Dissertation
Country:ChinaCandidate:C B KeFull Text:PDF
GTID:1108330479975858Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Cloud computing has become a software paradigm, providing services dynamically according to user requirements. However, it is difficult to control personal privacy information because of the opening, virtualization, multi-tenancy and service outsourcing characters. Therefore how to protect user privacy information has become a research focus in cloud computing. Considering the service outsourcing character, all of software, platform and infrastructure are services in cloud computing, therefore, services composition are mojar method to meet user requirement. It is key issue how to protection the user personal privacy information for service outsourcing character of cloud computing. An IDC survey shows that security including privacy is regarded as the top challenge of nine, limiting the further development of cloud computing. At present, most of professors and experts focus on the privacy issue in cloud computing, but only give some conception module without specific theories and methods. In this paper, we propose a privacy analysis and protection method of service composition orienting service outsourcing character of cloud computing. Main research and implementation work are showed as follows:(1) Firstly, we survey the related works of privacy protection including information security. Secondly, we analyze the structure character of cloud computing(outsourcing, virtualization, multi-tenancy and offshoring) and propose two privacy protection methods orienting privacy data and orienting computing process, respectively. In this paper, we focus on privacy protection method orienting service outsourcing character, belonging to computing process-oriented method.(2) We propose a privacy items conflict detection method between service providers and users. Firstly, we model the input and precondition of cloud service with TBox and model the user privacy preference with ABox to get knowledge database. Secondly, we verify the consistency and satisfiability to check the conflict between cloud service providers and users, so as to prevent the outsourcing services from being used and propogated illegally, and avoid the exception because of privacy items confliction in service composition process. Thirdly, we address the privacy item conflict detection algorithm and prove the correctness and feasibility with case study.(3) We propose a privacy information description method, which is Privacy Negotiation Language(PNL) based on description logic. We also present a negotiation mechanism, which is a privacy negotiation method between user and service provider. Through our method, privacy policy can be obtained so as to constrain service provider. This method requires firstly obtaining user privacy property from user privacy requirement, and obtaining privacy disclosure assertion from service description document of service. Both user privacy property and privacy disclosure assertion are expressed in PNL. Secondly pre-negotiating between user and service composer, to find service attribute sequence that satisfying both parties requirement through conflict detection method. Thirdly though exchange privacy disclosure assertion, obtaining privacy policy that satisfying both parties. In the end, we put forward negotiation algorithm of privacy policy. Through case study we prove the feasibility and correctness of this method.(4) We propose description method of privacy agreement and agreement-oriented supervision mechanism in cloud computing. Firstly, we describe the privacy agreement with privacy agreement language. Secondly, with dynamic description logic we verify whether outsourcing service is authorized to obtain the user privacy attribute, so as to prevent unauthorized outsourcing service from obtaining user privacy information. Thirdly, we supervise authorized outsourcing service according to the privacy agreement, to assure the privacy agreement is kept. Therefore prevent outsourcing service from illegally using and propagating user privacy information. At last, we propose the privacy agreement supervising algorithm based on BPEL, and prove the correctness and feasibility by case study.(5) Through researching on privacy analysis and protection method of service composition in cloud computing, we design and implement the prototype system and prove the feasibility and practicality with case analysis.
Keywords/Search Tags:Cloud Computing, Knowlegde-based Engineering, Description Logic, Privacy Protection, Conflict Detection, Privacy Agreement Negotiation, Supervising
PDF Full Text Request
Related items