A privacy protection model for transparent computing system Online publication date: Sun, 14-Oct-2012
by Haiwei Xue; Yiqi Dai
International Journal of Cloud Computing (IJCC), Vol. 1, No. 4, 2012
Abstract: Transparent computing system provides services, including OS, applications, data, etc., for end users, in which users can request the computing and storages resources according to their requirement. It is important to protect the data in transparent computing system, especially to enhance the privacy protection. In some cases, security threats are not only from malicious users or viruses but also include inside leaks, which cannot be prevented by current security systems. We proposed system-based privacy protection model for transparent computing systems in this paper. Our model is based from mandatory access control and we use formal methods to analysis the privacy protection problem. Our model is a state machine model, which have five state transition rules and all these rules can be proved to be safe by formally description method. So if we use these rules in transparent computing system, and make sure that the initial state is secure, the transparent computing system is always keep state secure.
Online publication date: Sun, 14-Oct-2012
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Cloud Computing (IJCC):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email email@example.com