A cloud user behavior authentication model based on multi-partite graphs

被引:0
|
作者
Tian, Junfeng [1 ]
Cao, Xun [1 ]
机构
[1] Institute of Network Technology, Hebei University, Baoding,Hebei,071002, China
来源
Jisuanji Yanjiu yu Fazhan/Computer Research and Development | 2014年 / 51卷 / 10期
关键词
Authentication models - Behavior evidence - Building behavior - Cloud platforms - Normal behavior - Partite graphs - Trustiness - User behaviors;
D O I
10.7544/issn1000-1239.2014.20130619
中图分类号
学科分类号
摘要
Cloud computing is developing rapidly, and the trustiness of cloud platform is the key issue relating to its success or failure. The authentication of the trustiness of user behavior is an important part of ensuring the credibility of cloud platform. In order to solve the problem of trustiness of cloud users' behaviors, a cloud user behavior authentication model based on multi-partite graphs (BAM) is proposed. It includes the layer of user behavior evidence, the layer of building behavior multi-partite graphs and the layer of behavior authentication. The behavior evidence is the basis, the multi-partite graphs is the method and the behavior authentication is the purpose. In the layer of user behavior evidence, the model determines the type of evidence, collects behavior evidences and analyzes user behavior quantitatively; in the layer of building behavior multi-partite graphs, the model builds two multi-partite graphs based on the layer of behavior evidence and the knowledge of graph theory; in the layer of behavior authentication, the model builds the cloud user behavior authentication module to verify that users are trusted. Identity re-certification and risk game are introduced to enhance security and accuracy of the model. The analysis of small-scale cloud user behaviors in simulation experiments show that, the model is accurate and effective in measuring the normal behavior of cloud users and in distinguishing malicious user with the risk user, and it has higher detection ratio and lower false positive ratio.
引用
收藏
页码:2308 / 2317
相关论文
共 50 条
  • [21] ISOMORPHIC FACTORIZATIONS OF MULTI-PARTITE DIRECTED-GRAPHS - THE PROOF OF CONJECTURE OF HARARY, ROBINSON AND WORMALD ON ISOMORPHIC FACTORIZATIONS OF DIRECTED-GRAPHS
    WANG, JF
    SCIENTIA SINICA SERIES A-MATHEMATICAL PHYSICAL ASTRONOMICAL & TECHNICAL SCIENCES, 1983, 26 (11): : 1167 - 1177
  • [22] Multi User Authentication in Reliable Data Storage in Cloud
    Yakoob, Sk
    Reddy, V. Krishna
    Dastagiraiah, C.
    COMPUTER COMMUNICATION, NETWORKING AND INTERNET SECURITY, 2017, 5 : 531 - 539
  • [23] User authentication method design based on biometrics in a multi-cloud environment
    Song, Seokhwa
    Lee, Jae Seung
    Lee, Jaesik
    Jun, Moon-Seog
    Lecture Notes in Electrical Engineering, 2015, 373 : 283 - 288
  • [24] Network User Behavior Authentication Based on Hidden Markov Model
    Wu, Zenan
    Tian, Liqin
    Wang, Zhigang
    Wang, Yan
    2021 IEEE INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND SOFTWARE ENGINEERING (ICICSE 2021), 2021, : 76 - 82
  • [25] Author Correction: Multi-qubit Quantum Rabi Model and Multi-partite Entangled States in a Circuit QED System
    Jialun Li
    Gangcheng Wang
    Ruoqi Xiao
    Chunfang Sun
    Chunfeng Wu
    Kang Xue
    Scientific Reports, 9
  • [26] Strengthening Cloud Security: An Innovative Multi-Factor Multi-Layer Authentication Framework for Cloud User Authentication
    Mostafa, Ayman Mohamed
    Ezz, Mohamed
    Elbashir, Murtada K.
    Alruily, Meshrif
    Hamouda, Eslam
    Alsarhani, Mohamed
    Said, Wael
    APPLIED SCIENCES-BASEL, 2023, 13 (19):
  • [27] Authentication graphs: Analyzing user behavior within an enterprise network
    Kent, Alexander D.
    Liebrock, Lone M.
    Neil, Joshua C.
    COMPUTERS & SECURITY, 2015, 48 : 150 - 166
  • [28] User Behaviour Authentication Model Based on Stochastic Petri Net in Cloud Environment
    Li, Peng
    Yang, Cheng
    Xu, He
    Lau, Ting Fung
    Wang, Ruchuan
    PARALLEL ARCHITECTURE, ALGORITHM AND PROGRAMMING, PAAP 2017, 2017, 729 : 59 - 69
  • [29] A Lightweight Multi-User Authentication Scheme based on Cellular Automata in Cloud Environment
    Shin, Sang-Ho
    Kim, Dong-Hyun
    Yoo, Kee-Young
    2012 IEEE 1ST INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (CLOUDNET), 2012,
  • [30] Superadiabatic-based shortcuts for the fast generation of multi-partite W states of distant transmon qubits
    Zhang, Ai-ping
    Pang, Qing
    Zhao, Jin
    Wang, Yan-Yang
    Xin, Hong
    PHYSICS LETTERS A, 2024, 511