skip to main content
10.1145/3056662.3056677acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicscaConference Proceedingsconference-collections
research-article

Research on way of evaluating cloud end user behavior's credibility based on the methodology of multilevel fuzzy comprehensive evaluation

Published:26 February 2017Publication History

ABSTRACT

The development of cloud computing technology and the popularization of cloud services have a great impact on the industry. On the one hand, cloud technology enhances network's operation efficiency and reduces the cost. On the other hand, the cloud resource can be accessed by any network equipment. It increases the chances that the identity of user is misrepresented and then led to many security problems. Therefore, the actual needs of security can't be fully satisfied with controlling the malicious user access to the cloud resource by login authentication that relies solely on current user identity. User is the requester and provider of cloud resources. User behavior's credibility relates to the safety of cloud directly. So it's very important to evaluate whether user behaviors can be trusted or not on cloud. In this paper, the method is studied based on the multilevel fuzzy comprehensive evaluation. And in this evaluation study, indicators of user behavior credibility are carried on a thorough discussion.

References

  1. Khaled M. Khan and Qutaibah Malluhi: Establishing Trust in Cloud Computing,IEEE Computer Society,2010Google ScholarGoogle Scholar
  2. Foster, Zhao Yong, Lu Shiyong, Cloud computing and gridcomputing 360-degree compared{C}.Proceedings of Grid Computing Environments Workshop, 2008.GCE 08.2008, IEEE: Austin, TX.p.1--10Google ScholarGoogle Scholar
  3. Guo Qiang.Modeling and evaluation of trust in cloud computing environments{C}.Proceedings of 2011 3rd International Conference on Advanced Computer Control, China IEEE Computer Society, 2011:112--1Google ScholarGoogle Scholar
  4. Marsh Stephen Paul. Formalising trust ag a computational concept{D}. Scodand: Department of Computing Science and Mathematics.University of Stifling, 1994.Google ScholarGoogle Scholar
  5. Changxiang Shen, Huanguo Zhang, Huaiming Wang. Research and development of trusted computing {J}. China science: Information science, 2010(02) : 139--166.Google ScholarGoogle Scholar
  6. Chuang Lin, Liqing Tian, Yuanzhuo Wang. The credible research of user behavior in trusted network, Research and development of the computer, 2008,45(12) : 2033--2043.Google ScholarGoogle Scholar
  7. Hassan Takabi, Morteza Amini, Rasool Jalili. Trust-Based User-Role Assignment in Role-Based Access Control{C}// 2007 IEEE/ACS International Conference on Computer Systems and Applications. IEEE Computer Society, 2007:807--814.Google ScholarGoogle Scholar
  8. Tieguo Ji, Liqing Tian, Zhixing Hu. A method of user behavior assessment based on A H P in trusted network { J } . Computer engineering and application, 2007,43(19):123 -- 126.Google ScholarGoogle Scholar

Index Terms

  1. Research on way of evaluating cloud end user behavior's credibility based on the methodology of multilevel fuzzy comprehensive evaluation

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Other conferences
                ICSCA '17: Proceedings of the 6th International Conference on Software and Computer Applications
                February 2017
                339 pages
                ISBN:9781450348577
                DOI:10.1145/3056662

                Copyright © 2017 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 26 February 2017

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader