Machine Learning Theory and Practice, 2025, 5(1); doi: 10.38007/ML.2025.050108.
Chenwei Chang
Independent Researcher, WA 98011, USA
With the popularization of cloud computing and web infrastructure, the demand for cloud data storage and processing has surged. However, data privacy issues (such as internal theft and data leakage caused by external attacks, accounting for 25% of cloud environment threats) have a significant impact on personal, enterprise, and national security. Efficiently compiling declarative privacy policies, such as access control and data usage restrictions, into executable policies is a key challenge. This study combines searchable encryption (SSE/PEKS), secret sharing, index optimization, and computation protocol design to construct a policy compilation framework: proposes a false positive free fuzzy keyword search scheme, and combines Shamir secret sharing to achieve multi-user, multi-keyword, dynamic update, and verification functions, which is more efficient than symmetric encryption schemes and ensures 100% accuracy; Design a low-level index structure, combined with point/range intersection determination technology, to construct a dynamic multi-dimensional range search system that improves search and update efficiency while ensuring single dimensional privacy; Improve the privacy data calculation function, design protocols for mean, variance, correlation, etc., and support complex analysis needs in policy implementation; In addition, extending the discrete logarithm problem to semigroup and proposing a solution algorithm to enhance the security of cryptographic primitives. Future research will focus on the Top-k problem of fuzzy search (returning the most relevant top k results), dynamically updated forward/backward privacy protection (preventing historical policies from leaking new data or subsequent queries from accessing deleted data), and exploring the discrete logarithm problem on the half loop to improve the efficiency and security of privacy policy enforcement.
Declarative Privacy Policy; Cloud infrastructure; Searchable encryption; Dynamic range query; Privacy Computing Protocol
Chenwei Chang. Compiling Declarative Privacy Policies into Runtime Enforcement for Cloud and Web Infrastructure. Machine Learning Theory and Practice (2025), Vol. 5, Issue 1: 76-86. https://doi.org/10.38007/ML.2025.050108.
[1] Yang D, Liu X. Collaborative Algorithm for User Trust and Data Security Based on Blockchain and Machine Learning[J]. Procedia Computer Science, 2025, 262: 757-765.
[2] Llamas, J. M., Vranckaert, K., Preuveneers, D., & Joosen, W. (2025). Balancing Security and Privacy: Web Bot Detection, Privacy Challenges, and Regulatory Compliance under the GDPR and AI Act. Open Research Europe, 5, 76.
[3] Wang, Y., Cai, C., **ao, Z., & Lam, P. E. (2025). LLM Access Shield: Domain-Specific LLM Framework for Privacy Policy Compliance. arxiv preprint arxiv:2505.17145.
[4] Zhu, Z. (2025). Cutting-Edge Challenges and Solutions for the Integration of VectLu, C. (2025). The Application of Point Cloud Data Registration Algorithm Optimization in Smart City Infrastructure. European Journal of Engineering and Technologies, 1(1), 39-45.
[5] Silva, C., Felisberto, J., Barraca, J. P., & Salvador, P. (2025). ASAP 2.0: Autonomous & proactive detection of malicious applications for privacy quantification in 6G network services. Computer Communications, 237, 108145.
[6] Pan, H. (2025). Development and Optimization of Social Network Systems on Machine Learning. European Journal of AI, Computing & Informatics, 1(2), 73-79.
[7] Tang X, Wu X, Bao W. Intelligent Prediction-Inventory-Scheduling Closed-Loop Nearshore Supply Chain Decision System[J]. Advances in Management and Intelligent Technologies, 2025, 1(4).
[8] Prabowo, S., Putrada, A. G., Oktaviani, I. D., Abdurohman, M., Janssen, M., Nuha, H. H., & Sutikno, S. (2025). Privacy-Preserving Tools and Technologies: Government Adoption and Challenges. Ieee Access.
[9] Wang, C. (2025). Exploration of Optimization Paths Based on Data Modeling in Financial Investment Decision-Making. European Journal of Business, Economics & Management, 1(3), 17-23.
[10] Xu, H. (2025). Research on the Implementation Path of Resource Optimization and Sustainable Development of Supply Chain. International Journal of Humanities and Social Science, 1(2), 12-18.
[11] Ali, M., Arunasalam, A., & Farrukh, H. (2025, May). Understanding Users' Security and Privacy Concerns and Attitudes Towards Conversational AI Platforms. In 2025 IEEE Symposium on Security and Privacy (SP) (pp. 298-316). IEEE.
[12] Zhu, Z. (2025). Application of Database Performance Optimization Technology in Large-Scale AI Infrastructure. European Journal of Engineering and Technologies, 1(1), 60-67.
[13] Wei, X. (2025). Practical Application of Data Analysis Technology in Startup Company Investment Evaluation. Economics and Management Innovation, 2(4), 33-38.
[14] Deng, H. W., Salek, M. S., Rahman, M., Chowdhury, M., Shue, M., & Apon, A. W. (2025). Leveraging public cloud infrastructure for real-time connected vehicle speed advisory at a signalized corridor. International Journal of Transportation Science and Technology, 17, 131-147.
[15] Li, W. (2025). Research on Optimization of M&A Financial Due Diligence Process Based on Data Analysis. Journal of Computer, Signal, and System Research, 2(5), 115-121.
[16] Huang, J. (2025). Research on Resource Prediction and Load Balancing Strategies Based on Big Data in Cloud Computing Platform. Artificial Intelligence and Digital Technology, 2(1), 49-55.
[17] Xu, H. (2025). Supply Chain Digital Transformation and Standardized Processes Enhance Operational Efficiency. Journal of Computer, Signal, and System Research, 2(5), 101-107.
[18] Li W. Building a Credit Risk Data Management and Analysis System for Financial Markets Based on Blockchain Data Storage and Encryption Technology[C]//2025 3rd International Conference on Data Science and Network Security (ICDSNS). IEEE, 2025: 1-7.