Improved Access Control Based on Analytic Hierarchy Process

被引:0
作者
Zheng, Chengfeng [1 ]
Long, Sijie [1 ]
Liu, Jingyi [1 ]
Wu, Canliu [1 ]
Qi, Tianyi [1 ]
Zhu, Yongsheng [1 ]
Li, Xiaojie [1 ]
Xie, Zefeng [1 ]
Shuai, Jia [1 ]
Chen, Zhongyuan [1 ]
Jiang, Wei [1 ]
机构
[1] Wuhan Univ Technol, Sch Comp Sci & Technol, Wuhan 430070, Hubei, Peoples R China
来源
2018 IEEE 4TH INTERNATIONAL CONFERENCE ON CONTROL SCIENCE AND SYSTEMS ENGINEERING (ICCSSE 2018) | 2018年
关键词
cloud computing; user behavior trust; access control; IPv6; analytic hierarchy process;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing security issues are increasingly serious. Behavioral trust is the trust relationship established by the entity based on its past experience of interaction. It can be either direct interaction or indirectly recommended by third parties. User behavior trust assessment using analytic hierarchy process, by collecting historical behavior information to obtain the user's behavior trust evidence, according to the characteristics of trust evidence is divided into different trust attributes which, through the analytic hierarchy process and the relative weight of each trust attribute calculated by the user Behavioral trust value. Combined with IPv6 protocol, using IPv6 extended header, the evaluation value is placed in the header for transmission and verification, making this article practical.
引用
收藏
页码:338 / 341
页数:4
相关论文
共 15 条
[1]  
[Anonymous], LNCS
[2]  
Cao Sisi, 2018, BIG DAT AN ICBDA 201
[3]  
Jameel H, 2005, IEEE INT SYM MULTIM, P674
[4]  
Jin Xiaotian, 2017, 2017 IEEE INT S PAR
[5]  
JOSANG A, 1996, P WORKSH NEW SEC PAR
[6]  
Li Xiaoyong, 2009, J COMPUTERS, V32, P405
[7]  
Quan Chen, 2009, COMPUTER APPL, V2, P2562
[8]   COMPUTING IN THE CLOUD [J].
Smith, Roger .
RESEARCH-TECHNOLOGY MANAGEMENT, 2009, 52 (05) :65-68
[9]  
Song S, 2004, LECT NOTES COMPUT SC, V3222, P9
[10]   On trust models and trust evaluation metrics for ad hoc networks [J].
Theodorakopoulos, G ;
Baras, JS .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) :318-328