Research Article
International Law Protection of Cross-Border Transmission of Personal Information Based on Cloud Computing and Big Data
Table 1
Evaluation index system of cloud service selection.
| | Evaluation index system | Life cycle data | Privacy security mechanism at all stages |
| | Privacy protection capability (CoPP) | Data generation G | Access control protocol selection (P1) | | Autonomous access control (P2) | | Anonymous access control (P3) | | Data transmission T | Digital certificate (P4) | | Transmission encryption (P5) | | Data storage S | Virtual machine isolation (P6) | | Legal storage (P7) | | Storage encryption (P8) | | Data access Ac | Identity authentication (P9) | | Trusted execution of access control policy (P10) | | Data derivation reuse R | Data derivation (P11) | | Safety measures (P12) | | Data archiving Ar | Track encryption (P13) | | Offsite storage (P14) | | Recovery mechanism (P15) | | Data destruction D | Disk replication (P16) | | Data destruction method (P17) |
|
|