User's Behavior Trust Evaluate Algorithm Based On Cloud Model

被引:5
|
作者
Li Jun-Jian [1 ]
Tian Li-Qin [2 ]
机构
[1] Qinghai Normal Univ, Coll Comp, Xining, Qinghai, Peoples R China
[2] North China Inst Sci & Technol, Dept Comp, Beijing East, Peoples R China
来源
2015 FIFTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC) | 2015年
关键词
Cloud Computing; User's Behavior; Dynamic Trust Evaluation;
D O I
10.1109/IMCCC.2015.123
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is developing rapidly and the open environment in cloud computing is much more complex and unpredictable than other applications, so just providing the identity certification cannot ensure the security of cloud user and cloud service provider, in order to find a effective way to ensure cloud security, we have to solve the problem of trustiness of cloud user's behavior first, in this paper, we propose a dynamic trust evaluate method to deal with cloud user's bahavior, through using Entropy Method to reflect the essential regular patterm of user's behavior evidence, making the evaluate way become a dynamic model, weaken the subjectivity of simply using AHP, moreover, still need AHP to make the result fit people's subjective experience, so we also put forward a integrate algorithm that combine Entropy Method and AHP, in this way, the final evaluate value will keep the balance between objective and subjective and provide quantitative analysis foundation for security control, The simulation shows that the dynamic trust evaluate method can effectively distinguish user's abnormal behavior.
引用
收藏
页码:555 / 560
页数:6
相关论文
共 50 条
  • [21] Review of cloud based trust model
    Gu, Xin
    Xu, Zheng-Quan
    Liu, Jin
    Tongxin Xuebao/Journal on Communications, 2011, 32 (07): : 176 - 181
  • [22] A SPIT Detection Algorithm Based on User's Call Behavior
    Ben Chikha, Randa Jabeur
    Abbes, Tarek
    Bouhoula, Adel
    2013 21ST INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM 2013), 2013, : 225 - 229
  • [23] Efficient Association Rule Mining Algorithm Based on User Behavior for Cloud Security Auditing
    Zhao, Chunye
    Tu, Shanshan
    Chen, Haoyu
    Huang, Yongfeng
    2016 IEEE INTERNATIONAL CONFERENCE OF ONLINE ANALYSIS AND COMPUTING SCIENCE (ICOACS), 2016, : 145 - 149
  • [24] A Collaborative Filtering Algorithm Based on User Similarity and Trust
    Wu, Qingzhou
    Huang, Mengxing
    Mu, Yangzi
    2017 14TH WEB INFORMATION SYSTEMS AND APPLICATIONS CONFERENCE (WISA 2017), 2017, : 263 - 266
  • [25] Recommendation algorithm based on community structure and user trust
    Lei, Guo
    Sheng, Yang
    Shaozi, Li
    Qingshou, Wu
    Wensen, Yu
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (20):
  • [26] A cloud user behavior authentication model based on multi-partite graphs
    Tian, Junfeng
    Cao, Xun
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2014, 51 (10): : 2308 - 2317
  • [27] A cloud-user behavior assessment based dynamic access control model
    Jing X.
    Liu Z.
    Li S.
    Qiao B.
    Tan G.
    International Journal of System Assurance Engineering and Management, 2017, 8 (Suppl 3) : 1966 - 1975
  • [28] User-centered Privacy and Trust Model in Cloud Computing Systems
    Dehghantanha, Ali
    Mahmod, Ramlan
    Udzir, Nur Izura
    Zulkarnain, Zoriati Ahmad
    ICCNT 2009: PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND NETWORK TECHNOLOGY, 2010, : 326 - +
  • [29] Self-organizing evaluation model and algorithm for manufacturing cloud services driven by user behavior
    Shenquan Huang
    Yarong Chen
    Hongming Zhou
    Xinjian Gu
    The International Journal of Advanced Manufacturing Technology, 2018, 95 : 1549 - 1565
  • [30] Self-organizing evaluation model and algorithm for manufacturing cloud services driven by user behavior
    Huang, Shenquan
    Chen, Yarong
    Zhou, Hongming
    Gu, Xinjian
    INTERNATIONAL JOURNAL OF ADVANCED MANUFACTURING TECHNOLOGY, 2018, 95 (1-4): : 1549 - 1565