ABSTRACT
The development of cloud computing technology and the popularization of cloud services have a great impact on the industry. On the one hand, cloud technology enhances network's operation efficiency and reduces the cost. On the other hand, the cloud resource can be accessed by any network equipment. It increases the chances that the identity of user is misrepresented and then led to many security problems. Therefore, the actual needs of security can't be fully satisfied with controlling the malicious user access to the cloud resource by login authentication that relies solely on current user identity. User is the requester and provider of cloud resources. User behavior's credibility relates to the safety of cloud directly. So it's very important to evaluate whether user behaviors can be trusted or not on cloud. In this paper, the method is studied based on the multilevel fuzzy comprehensive evaluation. And in this evaluation study, indicators of user behavior credibility are carried on a thorough discussion.
- Khaled M. Khan and Qutaibah Malluhi: Establishing Trust in Cloud Computing,IEEE Computer Society,2010Google Scholar
- Foster, Zhao Yong, Lu Shiyong, Cloud computing and gridcomputing 360-degree compared{C}.Proceedings of Grid Computing Environments Workshop, 2008.GCE 08.2008, IEEE: Austin, TX.p.1--10Google Scholar
- Guo Qiang.Modeling and evaluation of trust in cloud computing environments{C}.Proceedings of 2011 3rd International Conference on Advanced Computer Control, China IEEE Computer Society, 2011:112--1Google Scholar
- Marsh Stephen Paul. Formalising trust ag a computational concept{D}. Scodand: Department of Computing Science and Mathematics.University of Stifling, 1994.Google Scholar
- Changxiang Shen, Huanguo Zhang, Huaiming Wang. Research and development of trusted computing {J}. China science: Information science, 2010(02) : 139--166.Google Scholar
- Chuang Lin, Liqing Tian, Yuanzhuo Wang. The credible research of user behavior in trusted network, Research and development of the computer, 2008,45(12) : 2033--2043.Google Scholar
- Hassan Takabi, Morteza Amini, Rasool Jalili. Trust-Based User-Role Assignment in Role-Based Access Control{C}// 2007 IEEE/ACS International Conference on Computer Systems and Applications. IEEE Computer Society, 2007:807--814.Google Scholar
- Tieguo Ji, Liqing Tian, Zhixing Hu. A method of user behavior assessment based on A H P in trusted network { J } . Computer engineering and application, 2007,43(19):123 -- 126.Google Scholar
Index Terms
- Research on way of evaluating cloud end user behavior's credibility based on the methodology of multilevel fuzzy comprehensive evaluation
Recommendations
User Behavior Credibility Evaluation Model Based on Intuitionistic Fuzzy Analysis Hierarchy Process
Artificial Intelligence and SecurityAbstractBased on the research of network user behavior, this paper studies and proposes an evaluation model of user behavior credibility. Firstly, the behavior evaluation index system is constructed by AHP analytic hierarchy process. Then, the information ...
Identity Credibility Evaluation Method Based on User Behavior Analysis in Cloud Environment
ICBDC '19: Proceedings of the 4th International Conference on Big Data and ComputingThe openness, dynamics, randomness and other characteristics of cloud computing make the malicious attack in the cloud environment more destructive and influential than the traditional environment. Existing identity authentication technology can verify ...
An Adaptive Resource Scheduling Mechanism Based on User Behavior Feedback in Cloud Computing
PDCAT '12: Proceedings of the 2012 13th International Conference on Parallel and Distributed Computing, Applications and TechnologiesScheduling mechanism in cloud computing environment concerns more about the needs of users due to the commercial purpose of cloud computing. In response to this user-oriented feature, an Adaptive Resource Scheduling Mechanism based on User Behavior ...
Comments