[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3335484.3335491acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicbdcConference Proceedingsconference-collections
research-article

Identity Credibility Evaluation Method Based on User Behavior Analysis in Cloud Environment

Published: 10 May 2019 Publication History

Abstract

The openness, dynamics, randomness and other characteristics of cloud computing make the malicious attack in the cloud environment more destructive and influential than the traditional environment. Existing identity authentication technology can verify the legality of user identity in the cloud environment. But, it cannot prevent the malicious user who is stealing a legitimate identity to carry out an attack or legal user's illegal behavior. That is, the user identity is legal but we cannot guarantee that the user must be trusted. Therefore, in order to achieve a quantitative assessment of the user's identity credibility and identify the user type, this paper proposes an identity credibility evaluation method based on user behavior analysis. It is designed to analyze user behavior to determine its identity credibility. This method uses fuzzy analytic hierarchy process to weaken the subjectivity of credible evaluation, and uses multi-partite graph model to construct an intuitive credible judgment basis. At the same time, the identity credibility evaluation strategy is introduced to quantitatively analyze the credibility of user identity. Experiments show that this method can effectively evaluate the credibility of user identity, meet the needs of cloud service providers for user classification management, and achieve moderate security.

References

[1]
Xing, T., Xiong, Z., Qian, H., Medhi, D., & Huang, D. (2015). Cloud Security. Cloud Services, Networking, and Management. John Wiley & Sons, Inc.
[2]
Chuang, L., Wenbo S., Kun, M., Qu, L, and Weidong, L. (2013). Cloud computing security: Architecture, mechanism and modeling. Chinese journal of computers, 36(9), 1765--1784.
[3]
Hosseini, S. B., Shojaee, A., and Agheli, N. (2015, May). A new method for evaluating cloud computing user behavior trust. In Information and Knowledge Technology (IKT), 2015 7th Conference on (pp. 1--6). IEEE.
[4]
Xiaohui, L., Jiangsha, H., Bin, Z., Jiang, F., Yixuan, Z., and Hongxing, L. (2016). A method for trust quantification in cloud computing environments. International Journal of Distributed Sensor Networks, 12(2), 5052614.
[5]
Junjian, L., and Liqin, T. (2015, September). User's Behavior Trust Evaluate Algorithm Based on Cloud Model. In Instrumentation and Measurement, Computer, Communication and Control (IMCCC), 2015 Fifth International Conference on (pp. 556--561). IEEE.
[6]
Jie, M., and Yongsheng, Z. (2015, November). Research on Trusted Evaluation Method of User Behavior Based on AHP Algorithm. In Information Technology in Medicine and Education (ITME), 2015 7th International Conference on (pp. 588--592). IEEE.
[7]
Xin, L., and Yue, X. (2014, December). An user behavior credibility authentication model in cloud computing environment. In Information Technology and Electronic Commerce (ICITEC), 2014 2nd International Conference on (pp. 271--275). IEEE.
[8]
Hongquan, L., and Wei, W. (2013). Research of trust evaluation model based on dynamic Bayesian network. Journal on Communications, 34(9), 68--76.
[9]
Liqin, T., and Chuang, L. (2010). Evaluation mechanism for user behavior trust based on DSW. Journal of Tsinghua University Science and Technology, 50(5), 763--767.
[10]
Jijun, Z. (2000). Fuzzy analytical hierarchy process. Fuzzy systems and mathematics, 14(2), 80--88.
[11]
Saaty, T. L. (2004). Fundamentals of the analytic network process---Dependence and feedback in decision-making with a single network. Journal of Systems science and Systems engineering, 13(2), 129--157.
[12]
Yong, L., Xiaohong, H., and Jian, Q. (2005). An improved fuzzy AHP method {J}. Journal of Northwest University (Natural Science Edition), 1(003).
[13]
Junfeng, T., and Xun, C. (2013, August). A cloud user behavior authentication model based on multi-partite graphs. In Innovative Computing Technology (INTECH), 2013 Third International Conference on (pp. 106--112). IEEE.
[14]
Yang, R., and Yu, X. (2017, May). Research on Building the Credibility Evaluation's Indicator System of Cloud End User's Behavior. In Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), 2017 IEEE 3rd International Conference on (pp. 43--47). IEEE.

Index Terms

  1. Identity Credibility Evaluation Method Based on User Behavior Analysis in Cloud Environment

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICBDC '19: Proceedings of the 4th International Conference on Big Data and Computing
    May 2019
    353 pages
    ISBN:9781450362788
    DOI:10.1145/3335484
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • Shenzhen University: Shenzhen University
    • Sun Yat-Sen University

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 10 May 2019

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Cloud computing
    2. identity credibility
    3. user behavior analysis

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICBDC 2019

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 98
      Total Downloads
    • Downloads (Last 12 months)6
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 12 Dec 2024

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media