Article of Basic and Applied Research  

The Protection Strategies of User Privacy in Cloud Computing

Shaohui Zhang
School of Network Engineering, Zhoukou Normal University, Zhoukou 466001, China

Cloud computing attracts a large number of users by its good scalability, low cost, on-demand payment and other advantages, but due to the related technology is not mature enough, imperfect legal supervision and so on, the privacy and security problems of cloud computing are serious at present. This paper proposes a privacy data protection model based on the analysis of the security and privacy problems in cloud computing, which classifies data into private data and non-private data according to the privacy attributes of data, and considers encryption, decryption technology and data partitioning technology to protect privacy data in data transmission and data storage. Experiments indicate that this model can improve the security of privacy data to a certain degree.

Cloud Computing; Privacy Security; Encryption; Decryption; Data Block

Click to download Free PDF


[1] Wang Qingfeng. A Preliminary Study on Cloud Computing and Cloud Data Management Technology[J]. Computer Software and Applications, 2013 (04): 252-255.
[2] He Ming, Chen Guohua et al. Research on Cloud Data Storage Security and Privacy Protection Strategies in the Internet of Things [J], Computer Science, 2011 (05): 62-66.
[3] [3]Mao Jian, Li Kun et al. Privacy Protection Scheme in Cloud Computing Environment [J]. Journal of Tsinghua University (Natural Science Edition), 2011 (10): 1357-1362.
[4] He Wenna. Geological Informatization Research Based on Internet of Things and Cloud Computing in Big Data Era [D]. Jilin: Jilin University, 2013.
[5] Chen Guoying. Analysis of Data Security and Privacy Protection in Cloud Computing Envi-ronment [J]. Network Security Technology and Applications, 2019 (02): 40-41.
[6] ChiangC, LinC, ChangR. A New Scheme of Key Distribution Using Implicit Security in Wireless Sensor Networks[C]//Proceedings of the 12th International Conference on Advanced Commu-nication Technology. Gangwon-Do, Korea: IEEE Advanced Communication Technology, 2010:151-155.
[7] Parakh A, KakS. Space Efficient Secret Sharing for Implicit Data Security[J].Information Sci-ences,2011,181(2):335-341
[8] Mell P, Grance T. The NIST Definition of Cloud Computing [J]. NIST special publication, 2011, 07.
[9] Arnold S. The Issue of Privacy in Cloud Computing [J]. KM World, 2012:14-22.
[10] Friedman AA, West D M. Privacy and Security in Cloud Computing[M]. Center for Technology Innovation at Brookings, 2010.
[11] Wang Haitao, Song Lihua. Security Management of Cloud Computing [J]. Data Communication, 2019 (04): 44-46.
[12] Cheng Guangde. Research on Big Data Security and Privacy Protection Strategy in Cloud Computing Environment [J]. Computer Products and Circulation, 2019 (07):145.