Authors: Haiwei Xue; Yiqi Dai
Addresses: Department of Computer Science and Technology, Tsinghua University, Beijing, 100084, China. ' Department of Computer Science and Technology, Tsinghua University, Beijing, 100084, China
Abstract: Transparent computing system provides services, including OS, applications, data, etc., for end users, in which users can request the computing and storages resources according to their requirement. It is important to protect the data in transparent computing system, especially to enhance the privacy protection. In some cases, security threats are not only from malicious users or viruses but also include inside leaks, which cannot be prevented by current security systems. We proposed system-based privacy protection model for transparent computing systems in this paper. Our model is based from mandatory access control and we use formal methods to analysis the privacy protection problem. Our model is a state machine model, which have five state transition rules and all these rules can be proved to be safe by formally description method. So if we use these rules in transparent computing system, and make sure that the initial state is secure, the transparent computing system is always keep state secure.
Keywords: transparent computing; cloud computing; privacy protection; privacy preservation; BLP; L-BLP; state machine models; data protection; mandatory access control; data security.
International Journal of Cloud Computing, 2012 Vol.1 No.4, pp.367 - 384
Published online: 16 Aug 2014 *Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article