| The emergence of cloud computing solved the previous computer resources can only be used alone and the situation of the serious resource waste. Cloud computing saving the cost of the software and hardware for the user through all resources unified scheduling, according to the need to use. Cloud computing has become a kind of low cost and high efficiency for resource use. Cloud is a huge resource pool for the user to choosing varieties of resources and sharing resources。With the rapid popularization of SaaS model, the problem of privacy data security is becoming more and more brought to the attention of the tenant. Against the tenant for data breaches of privacy, privacy preservation technology arises at the historic moment. Data privacy preservation’s goal is to make sure if the tenant’s data on the SaaS provider was leaked, the tenant will not expose sensitive information. How to protect the tenant in the privacy of data at the same time improve the efficiency of cloud storage has become a research focus at present stage. Privacy protection technology and the database system has the very high coupling, different privacy protection technology is suitable for different database system.Document-oriented databases with easy deployment, low operating costs, support high concurrency, easy extension, and favored by some small SaaS application service providers, and start migration the data in the Document-oriented database system. But the privacy protection mechanism for document-oriented databases has not been established. Mature solution has no longer apply because document-oriented databases using document as storage mode. In the use of a document-oriented database system of SaaS applications, how to prevent the tenant’s privacy data security after data leakage, how to let the tenant know exactly the private data safety degree, is to solve the main problems in this paper.This paper first introduces the basic methods of privacy protection based document-oriented database. Using features of freedom for a document-oriented database schema, Adopt to proper segmentation based on data privacy protection to achieve the purpose of protecting privacy data. For the nested structure of the document, this paper designed the document structure tree to retain the document structure information. At the same time are presented in this paper the basic operational model of database system, the model can ensure that the privacy protection system in the view layer transparent to users, and to ensure the correctness and integrity of tenant dataIt need to measure whether the privacy protection method can effectively protect the privacy of the tenants’data after using the basic protection methods. This paper analyzes the influence of data security about attacker’s cognition to the tenant privacy data. This paper defines the attacker’s cognition of the tenant privacy data model and the index of privacy. Attacker cognitive model can effectively measure the attacker to be aware of the privacy data, and in accordance with privacy index, the index of privacy can measure the degree of protection of tenants private data.In order to improve the tenants in SaaS applications privacy data safety degree, this paper presents a matching method, and a matching of segmentation algorithm with a match degree model, matching segmentation algorithm fully considering the different tenants privacy protection strategy, combined with different level of privacy protection, effectively prevent the tenant privacy data from the restructuring of attacker. |