As a new software paradigm, cloud computing provides services dynamically according to user requirements. However, it is difficult to control personal privacy information because of the opening, virtualization, multi-tenancy and service outsourcing characters. Therefore, how to protect user privacy information has become a research focus. In this paper, we propose requirement-oriented privacy protection theory analysis architecture and implementation platform. Firstly, the theory analysis architecture is depicted as layers, and we analyze the function and key technologies of every layer. Secondly, we address the privacy property description method with ontology and description logic, and then analyze the theory modules of privacy items conflict checking layer, privacy policy negotiation layer and privacy agreement forensics layer. Thirdly, according to theory architecture, we design the implementation platform of requirement-oriented privacy protection, and discuss the function and workflow. In the end, we conclude and point out the future work. Index Terms-Privacy protection, privacy items, privacy policy, privacy property, cloud computing I. INTRODUCTION Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction [1]. There are some characters, such as service outsourcing, virtualization, distribution and multi-tenancy. These characters enhance the service quality and save the computing resources, for example, service outsourcing enhances the service capability and specialization through service composition [2]. However, the transparency of privacy information to the outsourcing service provider, make users worry that privacy data be illegally propagated and used.