Fuzzy logic Approach Based on User behavior Trust in Cloud Security

被引:5
作者
Alruwaythi, Maryam [1 ]
Nygard, Kendall E. [1 ]
机构
[1] North Dakota State Univ, Dept Comp Sci, Fargo, ND 58105 USA
来源
2019 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY (EIT) | 2019年
关键词
cloud computing; trust evaluation; fuzzy logic; user behavior; cloud security;
D O I
10.1109/eit.2019.8834173
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
With cloud computing increasing in popularity by providing a massive number of services such as recourses and data center, the number of attacks on the cloud is increasing. Cloud platform security becomes an important factor in cloud development. Basic security protection such as traditional access control (TAC) is not able to satisfy the security requirements within the expansion of cloud computing. For example, TAC is not able to prevent a malicious user from accessing the cloud. Therefore, in this paper, we propose the fuzzy logic approach based on user behavior trust (FUBT). In this model we consider four types of evidence: login, security, operation, and performance to evaluate the cloud users. We start the model by building a user profile based on user' history behavior to compare it with current behavior. Moreover, we consider four types of trust: direct, history, indirect and comprehensive trust. We present a fuzzy approach to calculate direct and comprehensive trust values. FUBT is flexible and scalable as consider more evidence to monitor and evaluate user behavior. Finally, the simulation of FUBT shows that the model can effectively evaluate the users.
引用
收藏
页数:6
相关论文
共 15 条
[1]   Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems [J].
Achbarou, Omar ;
El Kiram, My Ahmed ;
El Bouanani, Salim .
INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE, 2017, 4 (03) :61-64
[2]  
[Anonymous], 2015, CLOUD USER BEHAV ASS, DOI DOI 10.1007/S13198-015-0411-1
[3]  
[Anonymous], 2017, US FED CLOUD COMP MA
[4]  
Bendale Y., 2013, International Journal of Computer Applications, P31, DOI DOI 10.5120/12122-8376
[5]   Trust evaluation model of cloud user based on behavior data [J].
Chen, Zhenguo ;
Tian, Liqin ;
Lin, Chuang .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (05)
[6]  
Giri M. S., 2015, INT J COMPUTER APPL, V122, P27, DOI DOI 10.5120/21674-4762
[7]   Analysis of DDoS Attacks and an Introduction of a Hybrid Statistical Model to Detect DDoS Attacks on Cloud Computing Environment [J].
Girma, Anteneh ;
Garuba, Moses ;
Li, Jiang ;
Liu, Chunmei .
2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS, 2015, :212-217
[8]  
Kim Jaekwang, 2008, 4 INT C INT ENV IE 0, DOI [10.1049/cp:20081126, DOI 10.1049/CP:20081126]
[9]  
Li Hong, 2010, KEY TECHNOLOGY REALI
[10]  
Li-Qin T., 2010, 2010 INT C COMP APPL