TELKOM
NIKA
, Vol. 11, No. 12, Decem
ber 20
13, pp.
7331
~73
3
8
e-ISSN: 2087
-278X
7331
Re
cei
v
ed
Jun
e
24, 2013; Revi
sed
Jul
y
2
7
, 2013; Acce
pted Augu
st 15, 2013
Cloud Computing Application of Personal
Information's Security in Network Sales
-
chan
nels
Qiong Sun*, Min Liu, Shimming Pang
T
ourism Institute of Beijin
g Un
ion U
n
ivers
i
t
y
,
No 99,Be
isih
ua
n Don
g
lu, C
h
a
o
y
an
g District, Beiji
ng
Chin
a,10
01
01
*Corres
p
o
ndi
n
g
author, e-ma
i
l
: sunqi
on
gbhs
@16
3
.com
A
b
st
r
a
ct
W
i
th the pr
o
m
otion
of inter
n
e
t
sales, the s
e
curi
ty of p
e
rso
nal
infor
m
ati
o
n
to netw
o
rk us
ers hav
e
beco
m
e incr
e
a
sin
g
ly d
e
m
a
n
d
in
g. T
he exi
s
ting n
e
tw
ork of sales c
h
a
n
nels
has p
e
rs
ona
l infor
m
ati
on
security risks, vulnerable to
ha
cker attacking. In this paper, a cl
oud computing sec
u
rity m
a
nagem
ent
mo
de
l is pro
p
o
sed to tackl
e
infor
m
atio
n le
akag
e for
the
netw
o
rk sale o
f
persona
l info
rmati
on sec
u
rit
y
app
licati
ons. It divid
e
s the
per
sona
l infor
m
ati
on int
o
cr
itical
i
n
formatio
n
an
d
gen
eral i
n
for
m
ation to
ensur
e
that the privat
e data d
oes
n
o
t l
eak o
u
t an
d is stored
by
private
cl
oud.
T
he me
mbers
h
ip-
base
d
clo
u
d
service
is als
o
introd
uce
d
.
A clou
d p
l
atfor
m
bui
lt
to test
the new
fra
m
e
w
ork mo
del
is
app
lie
d a
nd th
e
results show
the mo
de
l is ap
pl
icabl
e.
Ke
y
w
ords
:
int
e
rnet sal
e
s, clo
ud co
mp
utin
g,
security management strategy
Copy
right
©
2013 Un
ive
r
sita
s Ah
mad
Dah
l
an
. All rig
h
t
s r
ese
rved
.
1.Introduc
tio
n
Internet
sale
s are
ab
out u
s
ing
the inte
rnet to
sell p
r
odu
cts
[1].
With the po
pul
arity of
the internet, peopl
e have grad
ually re
cogni
zed this
marketing ap
proa
ch a
nd the numb
e
r o
f
netize
s
ha
s a
l
so in
crea
sed
.
Acco
rdin
g to the
"market
survey repo
rt
China'
s o
n
li
ne shoppi
ng
of
2013
”, the ra
tio that prefe
r
alipay rea
c
hes
77.4%, the si
ze a
nd
perm
eability investigatio
n
of
online
sh
oppi
ng sho
w
s th
e
r
e a
r
e totally
2,703 p
eopl
e
in 21
cities
h
ad bo
ught
so
mething o
n
lin
e
and the total
amount u
s
e
d
in onli
ne
shoppi
ng re
a
c
hes
73.4 billi
on yuan. Ba
sically, intern
et
sale
s
are
divi
ded i
n
to two
ways the
dire
ct sale
s a
nd i
ndire
ct
sale
s,
acco
rdin
g to
wh
ether it i
s
throug
h deal
ers.
The
di
re
ct
sale
s com
panie
s
build
web
s
ite
s
to p
r
omote
thei
r prod
uct
s
dire
ctly
to the con
s
u
m
ers, an
d th
e indi
re
ct sal
e
s
are
the
chann
el to
sel
l
pro
d
u
c
ts th
roug
h inte
rne
t
deale
r
s. Fo
r
either
sale
s
cha
nnel, we need to have
good securit
y
measu
r
e
s
, whi
c
h not onl
y
improve the
cre
d
ibility ofinternet vend
ors, but
al
so
do not dam
age the interests of neti
z
ens.
Ho
wever,
a
c
cordin
g to
the
2011
an
nual
se
curity
re
p
o
rt rele
ased
by
Risi
ng, it
sho
w
s that th
e e
-
comm
erce ha
s be
come the
main target
spie
d out by hacke
rs
.
En
croa
chin
g on the co
nsume
r
'
s
person
a
l info
rmation i
n
cl
u
des the ille
g
a
l coll
ectio
n
, disclo
su
re
and u
s
in
g o
f
con
s
um
er'
s
information, whi
c
h result
s in
net
wo
rk
se
curit
y
is
sue
s
.
In the existin
g
internet sal
e
s, the
se
cu
ri
ty managem
e
n
t of perso
na
l informatio
n
mainly
inclu
d
e
s
ban
k acco
unt confidentiality, firewall
p
r
ot
ection, p
r
eve
n
t "phishin
g
web
s
ite
s
" [2].
These me
asu
r
es
aim to d
o
well in
safe m
ode ma
na
g
e
m
ent of data i
n
formatio
n. In recent yea
r
s,
the cl
oud
co
mputing
ha
s bee
n a
ppli
c
ated in
vari
o
u
s fiel
ds. Aft
e
r th
e resea
r
ch
on
se
cu
rity
manag
eme
n
t mode of clo
ud com
puting
,
it puts fo
rward to apply the clo
ud co
m
puting securit
y
measures in
person
a
l information prot
ection strategy
of internet sal
e
s.
2.Securit
y
Pr
oblems of Personal
Information in Internet Sales
The internet vendors If underst
and
the cu
stome
r
's shoppi
ng
pr
eferen
ce
s, co
ul
d very
well i
dentify the ma
rket
nee
ds an
d
increa
se
p
r
ofits. The
r
ef
ore, if th
e
use
r
'
s
p
e
rso
nal
informatio
n is open to
vend
ors, th
ere
like
l
y exist the se
curity ri
sks
[3].
The sal
e
s
chann
els m
u
st
be learned. T
he user, whe
n
ca
rrie
s
out
online
sho
ppi
ng, must re
gi
ster, logi
n, fill out orde
r an
d
ma
k
e
pa
ymen
t, in
wh
ich
th
e
r
e is
s
e
c
u
rity p
r
o
b
l
em in
e
v
er
y s
t
ep [4
]. T
h
e
c
ons
u
m
ers
s
h
ou
ld
provide p
e
rsonal informa
t
ion whe
n
registe
r
and
the site ma
y use pe
rso
nal inform
ation
Evaluation Warning : The document was created with Spire.PDF for Python.
e-ISSN: 2
087-278X
TELKOM
NIKA
Vol. 11, No
. 12, Dece
mb
er 201
3: 733
1 – 7338
7332
submitted by
use
r
s to d
o
illegal a
c
tivity,
whi
c
h
will h
u
rt consume
r
s.
Therefo
r
e, the co
nsume
r
s
do n
o
t want t
o
provide
pe
rson
al info
rma
t
ion for se
curi
ty and p
r
ivacy, which al
so
bring
tro
uble
to
the internet v
endo
rs.
Wh
e
n
the
user
se
lects thei
r go
ods, it
will l
e
a
v
e log
re
co
rd
in the
net
wo
rk
serve
r
. The
mercha
nts co
uld analy
z
e the user'
s
exp
ense cal
end
a
r
with the log
s
.
Presently, the existin
g
secu
rity probl
ems
mainly
inclu
de the
i
llegal
colle
cti
on a
nd
exploitation a
nd utilizatio
n of use
r
's
person
a
l in
form
a
t
ion and illeg
a
l profit-m
aki
ng from u
s
e
r
'
s
person
a
l information [5]
.
It mainly thro
ug
h the follo
win
g
way
s
: Usin
g co
oki
e
tra
c
king
software
;
hacke
rs to l
ogin in co
m
puter
s of others and
sp
am mails. A
nalyzin
g the user's pe
rsonal
informatio
n is the prere
qui
site for the m
e
rchant
s
to promote. The i
n
ternet vend
o
r
s ma
ke u
s
e
of
use
r
s' p
e
rso
nal info
rmati
on
colle
cted
to ma
ke
se
conda
ry devel
opment to
se
ek
ben
efits a
nd
sen
d
sp
am mails or me
ssa
ges to condu
ct malic
io
us
prom
otion. The above is d
e
rived from t
h
e
disclo
sure of
perso
nal inf
o
rmatio
n of
use
r
, so it m
u
st ma
ke
cle
a
r first why the info
rmatio
n
disclosure issue exi
s
ts.
The in
ternet
sales pr
ocess m
u
st require user
s to fill in personal
informatio
n, in ord
e
r to
co
ndu
ct tran
sa
ction [6
]. Howe
ver, the information when
submitted i
s
not
encrypted, it is easily sto
l
en.
Internet sale
s ma
ke
s transa
c
tion
s networke
d
and virtuali
z
e
d
,
whi
c
h results in cre
d
it risk issu
es. Th
e
coo
k
ie te
chn
o
logy is
wide
ly used in
we
b desi
gn. Th
e
cookie
records the person
al information. if criminal intercep
ts the
cooki
e
, it will cause leakage
of personal in
formation.
3. Cloud Co
mputing and
Cloud Secu
rit
y
Clou
d compu
t
ing is n
o
t e
m
ergi
ng te
ch
nology in li
gh
t of techni
cal
mean
s. It bel
ong
s to
the dist
ribute
d
co
mputing
mode
and i
s
or
igin
ated from the g
r
id
comp
uting [7
].
Howev
e
r, the
clou
d
comp
uting b
e
lon
g
s to the
eme
r
gi
ng
servi
c
e
m
ode,
whi
c
h li
nk l
o
ts
of sto
r
age
devi
c
e
s
to
form
large
-
scale
re
so
urce sha
r
ed pool and
all
o
w
u
s
ers t
o
enjoy t
he computin
g
of high
stora
g
e
and hig
h
pe
rforma
nce, without having t
o
purch
ase e
x
pensive h
a
rdwa
re e
quip
m
ents [8].
T
he
comp
uting ta
sks
are
not
con
d
u
c
ted i
n
the lo
cal
co
mputer or re
mote serve
r
, but in
lots
of
distrib
u
ted
co
mputers, so t
hat
the re
sou
r
ce
s
can b
e
allocated to the dem
and.
Keep in
cre
a
si
ng
the pro
c
e
s
sin
g
ca
pa
city of the clo
ud a
n
d
redu
ce
th
e p
r
ocessin
g
loa
d
of the termi
nal compute
r
.
The termi
nal
enjoys p
o
werful comp
uting
and sto
r
ag
e cap
abilities
p
r
ovided
by the clou
d, to be
simplified
into input a
n
d
output d
e
vice
s. Cl
o
ud
comp
uting i
s
divided int
o
thre
e ki
nd
s,
infrast
r
u
c
ture
on-d
e
man
d
servi
c
e (IaaS
),
pla
tform o
n
-
dem
and
se
rvice (Pa
a
S) a
nd software o
n
-
deman
d serv
ice (SaaS), whi
c
h
n
o
t
on
ly
achiev
e th
e sh
ari
ng of
re
sou
r
ces a
nd redu
ce th
e
burd
en
on of
use
r
'
s
com
p
uter to m
ana
ge resource
s. Cloud
com
puting h
a
s m
any tech
nical
advantag
es.
It not only
has
supe
rio
r
processi
n
g
and sto
r
ag
e
capa
city, but also su
pp
ort
virtualizatio
n and tran
sp
arence of the user.
The clo
ud computing ma
inly involves thr
ee asp
e
cts, the se
curity access control,
virtualizatio
n and security prote
c
tion [9]. The
sol
u
tion
s are mainly
data en
crypti
on and b
a
cku
p
and p
r
ivate
cloud. Th
e pa
per
en
sures
data security
with the
hel
p of private
clou
d. Securi
ty
manag
eme
n
t ensures
dat
a co
nfidential
i
ty, integrity, availability, et
c. Confidenti
a
lity is that t
he
data i
s
re
stri
cted to
b
e
u
s
ed
by
auth
o
rized
u
s
er
s only. Integ
r
i
t
y is that i
n
formatio
n in
t
he
process when stored or
transmitted, i
s
not arbitrarily tampered.
A
v
ailability refers to that
cloud
servi
c
e has the ability to control data.
Und
e
r the cl
oud computi
ng enviro
n
m
ent, ther
e are plentiful se
curity authe
n
t
ication
mech
ani
sm
s, like id
entity authenti
c
atio
n, intru
s
i
on d
e
tection, se
curity
audit,
a
c
ce
ss co
ntrol and
credibility mechanism
of user behavior [10].
Even identity authe
ntication i
s
t
he mo
st ba
si
c
se
curity p
r
ote
c
tion,
whe
n
i
n
ternet
user l
ogs in,
the
u
s
er'
s
id
entity should
be
first
verified, b
u
t i
t
is a chall
eng
e to cloud se
curity. The premise of se
curity is that th
e cloud
servi
c
e provider m
u
st
be tru
s
two
r
th
y. The intrusion dete
c
tion
mech
ani
sm
is to gathe
r
anomaly d
a
ta packet
s
an
d
analyze wh
ether it is
attacked. Se
cu
rity audit me
cha
n
ism i
s
rel
a
ted to the "bl
a
ck box" work.
Acce
ss co
ntrol mech
ani
sm is to control the ri
ght
of the use o
f
resou
r
ce
s. User be
havi
o
r
cre
d
ibility me
cha
n
ism i
s
the mech
ani
sm
that ve
rifies wheth
e
r u
s
e
r
behavio
r is trustworthy.
4. Applicati
on and Ex
ploration o
f
Cloud
Co
mputing on
the Perso
n
al Informa
t
ion
Securit
y
in
Intern
et Sale
s
With the developme
n
t of scie
n
ce a
nd tech
nolo
g
y
, new co
nsumption p
a
ttern
s are
grad
ually b
e
i
ng recogni
ze
d by u
s
. Inte
rnet
sa
le
s i
s
an
online
trading
pla
c
e,
establi
s
hi
ng
a
Evaluation Warning : The document was created with Spire.PDF for Python.
TELKOM
NIKA
e-ISSN:
2087
-278X
Clou
d Com
p
u
t
ing Applicati
on of Person
al Info
rm
ation's Securit
y
in Network… (Q
iong Sun
)
7333
virtual tradin
g
platform for
mercha
nts a
nd cu
stome
r
s
[11]. The internet mu
st b
e
able to sol
v
e
the burstine
s
s and the pa
rallelism of visitor volume
a
nd there mu
st
be a powe
r
fu
l data cente
r
to
store m
a
ssiv
e data and e
n
su
re of data
security [12].
The advanta
ges of cl
oud
comp
uting, the
distrib
u
ted proce
s
sing, bri
ngs
a
lot
of convenie
n
ce
to internet
sal
e
s ch
ann
els.
Clou
d comp
u
t
ing
can red
u
ce
the
ha
rd
wa
re con
s
um
ption co
sts
a
nd im
prove d
a
ta transmi
ssion
e
fficiency a
nd
its
se
curity me
chani
sm ca
n b
e
tter en
sure of
the securit
y
of electroni
c tran
sa
ction
s
[13].
4.1. Cloud Securit
y
Management Mo
d
e
in Internet
Sales
The p
opula
r
ity of Internet sal
e
s should
ma
ke
the serve
r
have the
basi
c
cha
r
a
c
teri
stics, en
ough
st
orag
e
spa
c
e
and
se
nsit
iv
e re
sp
on
se.
Such l
a
rg
e d
a
ta processi
ng
allows us to i
n
trodu
ce the i
dea of clou
d comp
uti
ng. T
he perso
nal i
n
formatio
n su
bmit by users is
sent fo
r cl
oud
storage. If choo
sing
publi
c
cl
oud,
the
u
s
er cannot
co
ntrol data
sto
r
age l
o
cation,
cau
s
in
g probl
ems to the secu
rity of person
a
l in
forma
t
ion. This pa
per ad
opts th
e hybrid clo
u
d
frame
w
ork to
en
su
re
of
secu
rity of p
e
rson
al
info
rma
t
ion,
nam
ely two kind
s
of clou
d storage
,
publi
c
and p
r
ivate cloud
s
to store u
s
e
r
data info
rm
ation. The b
a
si
c idea i
s
to divide user's
person
a
l info
rmation i
n
to t
w
o
kind
s, of
whi
c
h,
on
e i
s
criti
c
al info
rmation, like p
hone
num
bers,
home
add
re
sse
s
a
nd oth
e
r
p
r
ivate data
inform
ati
on, the
othe
r
i
s
called comm
o
n
information
,
su
ch as
pu
rchase
hi
story, prefe
r
en
ce
s, recomme
ndat
ions an
d oth
e
r
info
rmation.
It lets th
e
ke
y
informatio
n b
e
sto
r
ed
by p
r
ivate clo
ud a
nd commo
n i
n
formatio
n b
e
sto
r
ed in
th
e publi
c
clou
d,
whi
c
h could v
e
ry well
solve
the se
curity i
s
sue
s
of
criti
c
al informatio
n
.
The perso
n
a
l information
se
curity mod
e
desi
gne
d is as follows:
User
La
y
e
r
Management L
a
y
er
Interface
La
y
e
r
Platform
La
y
e
r
Figure 1. Person
al Informa
t
ion Secu
ri
ty Frame
w
o
r
k of Basic
Cloud
Comp
uting
The frame
w
ork con
s
ist
s
of four l
a
yers:
platform
layer
com
p
l
e
ting data
storage,
interface lay
e
r for
compl
e
x person
a
l informatio
n classificatio
n
and en
cryption, use
r
lay
e
r
compl
e
ting
u
s
er ide
n
tity authentication
and
man
a
g
e
ment
laye
r ensurin
g
of overall effecti
v
e
wor
k
in
g.
User laye
r m
a
inly com
p
letes ide
n
tity aut
hentication
and u
s
er lo
gin authe
ntication,
adopt
s the two metho
d
s,
authenticati
on mec
hani
sms and a
c
ce
ss
control mech
ani
sms a
n
d
ensure
of a
ccess a
nd
se
cu
rity of clo
ud
computin
g
plat
form. Th
e a
c
ce
ss control
i
s
divid
ed i
n
to
three st
eps:
Step one: User se
nd
re
que
st to the
clou
d
termi
nal, namely
the de
scripti
on of the
res
o
u
r
c
e
s a
c
ce
ss
ed;
Step two: Cl
oud termi
nal
analyze
s
inf
o
rmat
io
n req
ueste
d by user and m
a
tch person
a
l
informatio
n st
ored by p
r
ivate clou
d.
User Application Program
Identit
y
Authen
tication and Access
Control
Securit
y
Education
S
e
cu
r
i
ty
A
u
d
i
t
Securit
y
Policy
Risk Asse
ssment
Data Evaluation
Classifi
cation
Securit
y
Gate
w
a
y
Filtering
Core Da
ta
Encry
p
tion
Public Cloud Storage
(gener
al data)
Private Cloud Storage
(
k
ey
d
a
t
a)
Evaluation Warning : The document was created with Spire.PDF for Python.
e-ISSN: 2
087-278X
TELKOM
NIKA
Vol. 11, No
. 12, Dece
mb
er 201
3: 733
1 – 7338
7334
Step three: Resp
on
se to the results of t
he se
cond
ste
p
and the se
nd re
spo
n
sed
result
s to
the use
r
.
Interface lay
e
r i
s
to
achi
eve the
cla
s
sifica
tio
n
of
use
r
s' p
e
rso
nal info
rmati
on a
nd
operation
s
o
f
gateway
s
and e
n
cryption, of wh
i
c
h cla
s
sificati
on of the u
s
ers'
perso
n
a
l
informatio
n is a newly a
d
d
ed algo
rithm.
Data
evalu
a
tion cla
s
sificat
i
on is b
a
sed
on: First, how
much h
a
rm i
s
ca
used by
discl
osure
of pers
onal i
n
formatio
n of user, Se
co
nd, mercha
nts
con
s
id
erin
g the confide
n
tiality degre
e
of su
ch d
a
ta. Data e
n
crypt
i
on is
still the
best
choi
ce f
o
r
sen
s
itive info
rmation. After the
se
nsitive
inform
at
ion i
s
e
n
crypted,
data
se
cu
rity is g
u
a
r
antee
d
.
Encrypte
d st
orag
e can en
sure of the
confidentialit
y of critical info
rmation in th
e
sha
r
ed
stora
ge
platform,
solv
ing the
data
stora
g
e
secu
rity. To a
pply
the
clo
ud
computing
se
curity gate
w
a
y
techn
o
logy i
n
the
intern
et sal
e
s
cha
nnel
s pl
ay
s
the role
of
se
cure filteri
ng of
pe
rso
nal
informatio
n d
a
ta. In addition, the se
cu
rity gatew
ay
in the clo
ud
comp
uting te
chn
o
logy al
so
plays a
n
imp
o
rtant role.
We arran
ge int
e
rface laye
r d
e
vice
s in th
e i
n
let and
outle
t of the privat
e
clou
d, to
co
ndu
ct cl
assifi
cation, filte
r
i
ng a
n
d
en
cryption p
r
o
c
e
ssi
ng
of the
user'
s
pe
rsonal
informatio
n. The
classifie
d
criti
c
al info
rmation c
an o
n
ly flow to th
e private
clo
ud. If the criti
c
al
informatio
n is encrypte
d
, the encrypted d
a
ta
can al
so
be stored in p
ublic
clou
d.
Platform laye
r involve
s
two pa
rts: p
ubli
c
a
nd
private
clo
u
d
s
. Strictly spea
kin
g
,
critical
informatio
n must be sto
r
ed in a priva
t
e cloud.
Ho
wever, if being pre
c
i
s
ely encrypted, such
critical info
rm
ation can b
e
stor
ed by p
ublic
clo
ud.
Gene
ral info
rmation n
eed
s to b
e
filtered
throug
h the
cloud comp
uting gate
w
ay. The inte
rce
p
ted se
nsitive i
n
formatio
n m
u
st be
stored
in
private
cloud
and th
e oth
e
r info
rmatio
n filtered
mu
st be
stored
in the p
ublic
clou
d. Platform
layer mo
re o
b
vious
explai
ns that the
system is
ba
sed on th
e hy
brid
clou
d. Netizen
s
g
ene
rally
do not have p
r
ivate clou
d a
nd the
private
cloud
can be
con
s
ide
r
ed a
s
the user int
e
rnal n
e
two
r
k.
As long as the user i
n
ternal net
work has sufficient
security prot
ection, it still meets the
overall
se
curity prote
c
tion of the system.
Manag
eme
n
t layer in
clud
e
s
ri
sk
asse
ssment,
strate
g
y
making
and
auditing, etc.
The
layer is the g
uara
n
tee an
d
supp
ort for o
peratio
n of the entire mo
d
e
. Cloud
com
puting securit
y
mech
ani
sm
s is almo
st
t
he same
wit
h
t
he sec
u
rity me
cha
n
ism reali
z
ed by com
m
on netwo
rk, but
it is me
rely
extended
on
the ba
si
s
of comm
on
netwo
rk,
so
that the security risks a
r
e
con
c
e
n
trated
in th
e
clou
d
provider.
Wi
th the
gen
er
al ri
sk te
chn
o
logy, it
can
not be
very
well
solved, so we
use man
age
ment tools for help.
4.2. Cloud Serv
ice Trust
Ev
aluation Sy
stem
It has p
r
op
o
s
ed i
n
the
a
bove sectio
n
that
perso
n
a
l inform
atio
n se
cu
rity d
epen
ds
largely on th
e clou
d se
rvi
c
e p
r
ovide
r
. Before requi
ring the user
to requ
est se
rvice, to sel
e
ct
approp
riate cl
oud servi
c
e p
r
ovide
r
acco
rding to t
he trust level, it need
s to co
nd
uct a
s
sessm
ent
on the credi
b
ility of
the clo
ud se
rvice
providers. This paper i
s
ba
sed on mem
b
ership de
gre
e
theory, and p
r
opo
se
s to e
s
tabli
s
h the b
ehavior tr
ust
evaluation of
the clou
d se
rvice p
r
ovide
r
.
The sy
stem model is a
s
follows:
Figure 2. Evaluation Sys
t
em
T
h
e
s
y
s
t
e
m
p
r
oc
ess
is
: (
1
)
re
le
as
e s
e
r
v
ic
es
, na
me
ly pr
o
v
ide
r
to
c
o
mp
le
te
the
regi
stratio
n
in
the regi
stration center;
(2) Service
regi
stration
ce
ntre to re
turn the res
u
lt to the
Trust Evaluation Center
User
Service Provid
er
Service T
e
stin
g
Center
Trust Database
Service Re
g
ist
r
ation Center
Evaluation Warning : The document was created with Spire.PDF for Python.
TELKOM
NIKA
e-ISSN:
2087
-278X
Clou
d Com
p
u
t
ing Applicati
on of Person
al Info
rm
ation's Securit
y
in Network… (Q
iong Sun
)
7335
servi
c
e p
r
ovi
der; (3)
User to send
qu
ery re
que
st
to the re
gistration center;
(4)
regi
strati
on
centre
retu
rn
s the
results to the
u
s
er;
(5
) in
a
c
cordan
ce
with t
he o
u
tcom
e
of the
req
u
e
s
t,
inquiri
e tru
s
t degree in th
e trust a
s
sessment
cent
e
r
; 6) Retu
rn
s trust de
gre
e
results; (7
) i
n
accordan
ce
with
the re
sul
t
s,
t
he u
s
e
r
choo
se
s the
b
e
st
cloud
se
rvice p
r
ovide
r
;(8) the
servi
c
e
provide
r
retu
rns the sel
e
ct
ed enha
ncer
to the user
. (9) Service monitorin
g
ce
ntre gets p
r
op
e
r
ty
values;10) S
e
rvice te
sting
cente
r
se
nd
the evaluatio
n to the use
r
;
(11)
user return
s evaluate
d
results; (1
2) t
e
sting
cente
r
update
s
the trust datab
ase.
The pe
rform
a
nce in
dicators of clou
d se
rvic
e provid
er
are mo
nitore
d by the monitoring
cente
r
. Store
the servi
c
e e
v
aluation info
rmation rece
ived from user in the trus
t databas
e
. It is
to
be stored a
c
cordin
g to the quintupl
e in the followi
ng formul
a:
,,
,
,
,
1
,
2
,
3
,
.
.
.
,
ii
n
n
SU
t
w
V
n
N
(1)
i
S
in the ab
ove
formula i
s
se
rvice p
r
ovide
r
i
U
mean
s th
e
use
r
t
mean
s the time
provide
d
for the se
rvice
n
w
mean
s the property
n
V
means prope
rty value.
Definition 1
a is physi
cal
attribute X is langua
ge va
lue of the tru
s
t level
l
et domain
a
for
a
there i
s
()
0
,
1
Xa
then call
the su
bordinati
ng de
gre
e
fu
nction
of
X
The dist
rib
u
tion of functi
on is al
so call
ed trust
cloud
.
Definition 2
tr
u
s
t c
l
ou
d is
r
e
pr
es
en
te
d
b
y
P=
P(EX,EN,HE)
of whic
h, Exis
expectatio
n
En is entro
py
He re
prese
n
ts extra- e
n
tropy.
The prope
rty trust cl
oud
co
mputing is a
s
follows:
Input
Evalua
tion value of the i-th attribut
e of n entities to entity X.
Output
Trust
cloud P of attribute i.
First, obtain t
he sam
p
le m
ean:
1
1
n
ij
i
j
aa
n
(2)
Then a
c
cordi
ng to the following formula,
obtain the sa
mple ce
nter d
i
stan
ce:
1
1
n
ij
i
i
i
da
a
n
(3)
Followed by the sam
p
le va
rian
ce:
22
1
1
()
n
ij
i
j
j
s
aa
n
(4)
Then
22
,*
,
2
ii
i
i
i
i
i
E
a
a
En
d
H
e
s
En
(5)
For the ab
ove formula, a
c
cording to def
initi
on 2, aqui
re tru
s
t clou
d, abtain clo
ud
core:
12
(
,
,
...
,
)
,1
,
2
,
.
.
.
,
n
ii
i
G
G
GGh
l
Gh
l
i
n
(6)
Obtain weight
ed deviation
degree, acco
rding to the formula:
Evaluation Warning : The document was created with Spire.PDF for Python.
e-ISSN: 2
087-278X
TELKOM
NIKA
Vol. 11, No
. 12, Dece
mb
er 201
3: 733
1 – 7338
7336
1
n
ii
i
G
(7)
To cal
c
ulate t
he trust d
egree, according
the following
formula:
ij
ij
ij
Px
D
P
y
R
P
(8)
Whe
r
e
i m
a
rked
bel
ow th
e pa
ram
e
ter
ij
P
in th
e a
b
ov
e form
ula
re
pre
s
ent
s
use
r
j
r
e
pr
es
e
n
t
s
se
r
v
ic
e
x
y
are the
pro
p
o
rtion p
a
ra
m
e
ter
T
h
e
pa
per divid
e
s t
r
ust d
egree i
n
to
dire
ct tru
s
t d
egre
e
an
d re
comm
end
atio
n trust d
egre
e
, whi
c
h a
r
e
rep
r
e
s
ente
d
by DP and
RP
respe
c
tively. DP is obtai
n
ed with the
histori
c
al tra
n
sa
ction
re
cord
s
of user and the service
provide
r
. For
the cal
c
ulatio
n of direct tru
s
t degr
ee, it need
s the quin
t
uple trust tab
l
e for help:
,,
,
,
,
1
,
2
,
3
,
.
.
.
,
ki
j
n
n
SU
t
w
V
j
N
(9)
Acco
rdi
ng fin
a
lly obtaine
d
degree
of de
viation of ba
rycenter of tru
s
t clo
u
d, d
e
te
rmine
s
the distrib
u
tio
n
interval of the trust
cloud
, t
hus cho
o
se
the appro
p
ri
ate clou
d se
rvice provid
er.
4.3. Experimental Conditi
ons and Res
u
lts An
aly
s
is
First
build
th
e cl
oud
platfo
rm, an
d
appl
y the fra
m
e
w
ork mo
del
propo
sed
in th
e pa
pe
r
in the clo
ud
environ
ment.
This pa
pe
r adopt
s t
he o
p
en sou
r
ce Eucalypts
pla
tform and
sin
g
le
cluster installation. One i
s
in
stalle
d
in
clo
ud co
ntroller (CL
C
), clu
s
ter
controller (CC) a
n
d
stora
ge controller (S
C), the other o
n
e
is insta
lle
d
in virtual machi
ne, of which the cl
o
u
d
controlle
r i
s
t
he e
n
tran
ce
for a
d
mini
strat
o
r a
nd
end
-u
ser to a
c
ce
ss clo
u
d
platform, re
spo
n
si
bl
e
for the
prese
n
tation a
nd
manag
eme
n
t of virtuali
z
ed
re
sou
r
ce
s. Clu
s
ter co
ntroller run
s
on the
front-e
nd of the cluste
r to colle
ct virtual info
rmati
on; NC cont
rols o
peratio
n of the virtual
machi
ne
on
it, extract
a a
n
d
remove
a t
he mi
rro
re
d l
o
cal
copy. After the
platform is built, thi
s
pape
r p
r
ovid
es two cl
oud
servi
c
e p
r
ovi
ders an
d 20
0
use
r
s, the p
e
rform
a
n
c
e a
ttributes ta
ble
of
clou
d se
rvice
provide
r
is a
s
follows:
Table 1. Clo
u
d
Service Attribute Setting
Each attribute
Cloud service provi
der 1
Cloud service provider 2
Response rate
0.4
0.8
Storage capacit
y
0.9
0.9
transmission rate
0.9
0.5
Success rate
0.8
0.8
The exp
e
rim
ent compa
r
e
s
tru
s
t d
egree with
the
method
s
p
r
opo
s
e
d
by
Qo
s
evaluation. When u
s
e
r
re
q
u
ire
s
hig
her
resp
on
se
spe
ed of clo
u
d
service
s
, for th
e com
p
ari
s
o
n
of
the trust level
result
s, refe
r to Figure 3:
Figure 3. Tru
s
t Level wh
en
Highe
r Re
sp
onse Speed i
s
Re
quired
0
1
2
3
4
5
cloud
ser
v
ice 1
cloud
ser
v
ice 2
Grade of
Membership
Qos Evaluation
Evaluation Warning : The document was created with Spire.PDF for Python.
TELKOM
NIKA
e-ISSN:
2087
-278X
Clou
d Com
p
u
t
ing Applicati
on of Person
al Info
rm
ation's Securit
y
in Network… (Q
iong Sun
)
7337
By compa
r
in
g the a
bove
table, the d
e
g
ree
of mem
bership
theo
ry prop
osed i
n
the
pape
r
clea
rly distin
gui
she
s
the
tru
s
t d
e
g
ree
of
clou
d
se
rvice
s
. Cl
oud se
rvice
provide
r
s
1
h
a
s
highe
r level
o
f
trust tha
n
cl
oud
se
rvice
p
r
ovide
r
2;
If the u
s
e
r
requi
r
es hig
her tra
n
smi
ssi
on
rat
e
,
for the experi
m
ental re
sult
s, refer to Fig
u
re 4.
Figure 4. Tru
s
t Level wh
en
High Tran
sm
issi
on Rate is Requi
red
It can be learnt from Figure 4, the clou
d se
rvi
c
e 1 h
a
s hig
her tru
s
t level, which doe
s
not confli
ct wi
th the result
s of
Figure 3, becau
se for
different us
er, different attributes p
r
ovid
ed
by cloud
se
rvices i
s
requi
red.
When th
e user n
eed
s highe
r tran
smissi
on rate,
cloud
se
rvice
provide
r
s 1 h
a
s hig
h
e
r
de
gree
of trust,
If acco
rdin
g to the Qo
s evaluation,
it ca
nnot distin
gui
sh
trust de
gre
e
of various
clo
ud se
rvice
s
.
5. Conclusio
n
The possibilit
y of disclosure of
personal
information i
s
very
serious impact to i
n
ternet
sale
s. It ne
e
d
s
urg
ently solve t
he
personal i
n
form
ation
se
curity e
x
isting in
the
intern
et sale
s.
The internet sale
s chan
ne
l have many modes,
the
mercha
nts m
u
st ma
ke the right ch
oice
based on thei
r actual
situat
ion. Curre
n
tly using t
he re
putable
sale
s platform is the be
st choi
ce
for merch
ant
s. Personal i
n
formatio
n secu
rity is the
premi
s
e for better ope
ra
tion of intern
et
sale
s. Th
ere
are
many
wa
ys to imp
r
ove
inform
ati
on
secu
rity deg
re
e of inte
rnet
sale
s. Se
cu
rity
is the pre
r
e
quisite for th
e use
r
to select
cl
oud
comp
uting. T
he se
cu
rity policy of clo
ud
c
o
mputing can ver
y
w
e
ll ens
u
r
e
of data secur
i
ty, so the
pap
er i
n
trodu
ce
s se
curity
poli
cy
of
clou
d com
put
ing into intern
et sale
s ch
an
nels.
The
pap
er is ba
sed
o
n
p
e
rsonal
info
rmation
se
cu
ri
ty in the i
n
te
rnet
sal
e
s to
study
confid
entiality and securit
y
of data pri
v
acy. It di
vid
e
s the p
e
rso
nal inform
ation into critical
informatio
n a
nd gen
eral in
formation to
ensure t
hat the private da
ta does n
o
t leak o
u
t and i
s
store
d
by
pri
v
ate clo
ud. P
e
rsonal
info
rmation i
s
to
be
store
d
by
clou
d, so info
rmation
security
degree de
pe
nds e
n
tirely o
n
the cloud
service p
r
ov
id
er. The pa
per also adopt
s
the membe
r
ship
degree to
det
ermin
e
the
se
lection
of tru
s
t clou
d.
And
compa
r
e
expe
rimental
re
sul
t
and th
e tru
s
t
clou
d re
sult selecte
d
with
Qos eval
uatio
n, t
he paper
can achieve b
e
tter
re
sults a
s
expe
cted.
Referen
ces
[1]
Liu
Z
.
Internet
sales
situati
o
n
an
d
d
e
ve
lopm
ent strateg
y
of
our
enter
prise
.
Beiji
ng
T
e
ch
nol
ogy
an
d
Business Univ
ersity
. 2009; 4(
5): 29–3
4 .
[2]
Joshu
a
G
.
Protection i
n
the c
l
ou
d: risk
man
agem
ent an
d i
n
sura
nce for cl
oud c
o
mputi
n
g
.
Journal of
Internet Law
. 2012; 5(1
2
): 1–2
8.
[3]
Harol
d
L, Joh
n
s
on D. Are ho
me-bas
ed sal
e
s repres
e
n
tativ
e
s a
w
ar
e an
d proactiv
e
regar
din
g
securit
y
risks in the internet era.
Journ
a
l of Internet C
o
mmerce
. 20
0
8
; 7(3) :40–
46.
[4]
W
ijeseker
a
D,
Jajo
di
a S. A
prop
osit
i
ona
l
pol
ic
y a
l
ge
br
a for acc
e
ss
control.
A
C
M T
r
ans. on
Information and System
Security
. 2003; 6(2):
286–
32
5.
[5]
Nares
h
K. A cr
oss sectio
n
of the issu
es
and
res
earc
h
activ
i
ties re
late
d to
both i
n
formati
o
n secur
i
t
y
and cl
ou
d com
putin
g.
IETE te
chnical review
. 2011; 2
8
(4): 8
0–8
9.
[6]
Shafiq B, G
hafoor A. Secure i
n
terop
e
rati
on i
n
a multi-dom
a
i
n envir
onm
ent
emplo
y
i
ng RB
AC polic
ies.
IEEE T
r
ans. on Know
ledg
e an
d Data Eng
i
n
e
e
rin
g
. 200
5; 17
(11): 155
7–
157
7.
0
1
2
3
4
5
cloud
ser
v
ice 1
cloud
ser
v
ice 2
Grade of
Membership
Qos Evaluation
Evaluation Warning : The document was created with Spire.PDF for Python.
e-ISSN: 2
087-278X
TELKOM
NIKA
Vol. 11, No
. 12, Dece
mb
er 201
3: 733
1 – 7338
7338
[7]
Z
hang J, Gu Z
,
Z
heng C. Clo
ud comp
utin
g researc
h
overvi
e
w
.
A
ppl
icatio
n
Researc
h
on
Co
mp
uter
.
201
0; 27(2): 42
9–4
33.
[8]
Qu D. D
y
n
a
mic
trust computin
g mode
l bas
ed
on conte
x
t se
n
s
ing.
Co
mputer
Engin
eer
ing
a
nd Des
i
g
n
.
2
00
9; 30(7) :16
47–
16
49.
[9]
Che
ng F
.
La
i
W
,
Creating
envir
onme
n
t for t
he pr
os
perit
y of cl
ou
d comp
utin
g
techno
lo
g
y
.
T
E
LKOMNIKA Indon
esi
an Jou
r
nal of Electric
al Eng
i
ne
eri
ng.
2012; 1(4):
878
–88
6.
[10]
Rimal
B, Juk
an A, Kats
ar
os D. Arch
ite
c
tu
ral re
qu
ire
m
ents for cl
o
ud com
puti
n
g
s
y
stems:
an
enterpr
ise clo
u
d
appr
oac
h.
Journa
l of grid co
mp
utin
g
. 201
1; 9(11): 77–
89.
[11]
Lijuan Z, Hui
W,
Wang W. Parallel
implement
ation of c
l
assification
algorithms
bas
ed on cloud
computi
ng e
n
v
i
ronme
n
t.
T
E
LKOMNIKA Indones
ian J
ourn
a
l of
Electric
al
Engin
eer
ing.
201
2; 10(5):
135
3–
136
2.
[12]
Yang
X, N
a
sse
r B, Surri
dge
M
,
Middl
eton
S.
A
bus
iness-
ori
ented
clo
u
d
fe
derati
on m
o
d
e
l
for re
al-time
app
licati
ons.
F
u
ture Gener
ati
ons Co
mputer
Systems
. 20
12
; 28(8): 123
–13
4.
[13]
Merc
y A. A st
ud
y
on c
l
o
ud
securit
y
Issu
e
s
an
d ch
al
len
ges.
Intern
atio
nal
Jour
na
l of
Co
mpute
r
T
e
chno
logy an
d
Appl
icatio
ns
. 201
2; 3(01):5
5
–70.
Evaluation Warning : The document was created with Spire.PDF for Python.