Research Article

International Law Protection of Cross-Border Transmission of Personal Information Based on Cloud Computing and Big Data

Table 1

Evaluation index system of cloud service selection.

Evaluation index systemLife cycle dataPrivacy security mechanism at all stages

Privacy protection capability (CoPP)Data generation GAccess control protocol selection (P1)
Autonomous access control (P2)
Anonymous access control (P3)
Data transmission TDigital certificate (P4)
Transmission encryption (P5)
Data storage SVirtual machine isolation (P6)
Legal storage (P7)
Storage encryption (P8)
Data access AcIdentity authentication (P9)
Trusted execution of access control policy (P10)
Data derivation reuse RData derivation (P11)
Safety measures (P12)
Data archiving ArTrack encryption (P13)
Offsite storage (P14)
Recovery mechanism (P15)
Data destruction DDisk replication (P16)
Data destruction method (P17)