A cloud user behavior authentication model based on multi-partite graphs

被引:0
|
作者
Tian, Junfeng [1 ]
Cao, Xun [1 ]
机构
[1] Institute of Network Technology, Hebei University, Baoding,Hebei,071002, China
来源
Jisuanji Yanjiu yu Fazhan/Computer Research and Development | 2014年 / 51卷 / 10期
关键词
Authentication models - Behavior evidence - Building behavior - Cloud platforms - Normal behavior - Partite graphs - Trustiness - User behaviors;
D O I
10.7544/issn1000-1239.2014.20130619
中图分类号
学科分类号
摘要
Cloud computing is developing rapidly, and the trustiness of cloud platform is the key issue relating to its success or failure. The authentication of the trustiness of user behavior is an important part of ensuring the credibility of cloud platform. In order to solve the problem of trustiness of cloud users' behaviors, a cloud user behavior authentication model based on multi-partite graphs (BAM) is proposed. It includes the layer of user behavior evidence, the layer of building behavior multi-partite graphs and the layer of behavior authentication. The behavior evidence is the basis, the multi-partite graphs is the method and the behavior authentication is the purpose. In the layer of user behavior evidence, the model determines the type of evidence, collects behavior evidences and analyzes user behavior quantitatively; in the layer of building behavior multi-partite graphs, the model builds two multi-partite graphs based on the layer of behavior evidence and the knowledge of graph theory; in the layer of behavior authentication, the model builds the cloud user behavior authentication module to verify that users are trusted. Identity re-certification and risk game are introduced to enhance security and accuracy of the model. The analysis of small-scale cloud user behaviors in simulation experiments show that, the model is accurate and effective in measuring the normal behavior of cloud users and in distinguishing malicious user with the risk user, and it has higher detection ratio and lower false positive ratio.
引用
收藏
页码:2308 / 2317
相关论文
共 50 条
  • [31] Research on User Behavior Authentication Model Based on Stochastic Petri Nets
    Zhang, Chengyuan
    Xu, Haishui
    GREEN ENERGY AND SUSTAINABLE DEVELOPMENT I, 2017, 1864
  • [32] User identity authentication and identification based on multi-factor behavior features
    Ding, Xing
    Peng, Changgen
    Ding, Hongfa
    Wang, Maoni
    Yang, Hui
    Yu, Qinyong
    2019 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2019,
  • [33] Trust evaluation model of cloud user based on behavior data
    Chen, Zhenguo
    Tian, Liqin
    Lin, Chuang
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (05):
  • [34] Applying an Agent-Based User Authentication and Access Control Model for Cloud Servers
    Hajivali, Mostafa
    Moghaddam, Faraz Fatemi
    Alrashdan, Maen T.
    Alothmani, Abdualeem Z. M.
    2013 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC 2013): FUTURE CREATIVE CONVERGENCE TECHNOLOGIES FOR NEW ICT ECOSYSTEMS, 2013, : 809 - 814
  • [35] User authentication via behavior based passwords
    Yampolskiy, Roman V.
    2007 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE, 2007, : 10 - +
  • [36] Continuous Authentication Based on User Interaction Behavior
    Chen, Long
    Zhong, Yi
    Ai, Weidong
    Zhang, Difang
    2019 7TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS), 2019,
  • [37] Ensuring user authentication and data integrity in multi-cloud environment
    Megouache, Leila
    Zitouni, Abdelhafid
    Djoudi, Mahieddine
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2020, 10 (01)
  • [38] A User Authentication Scheme on Multi-Server Environments for Cloud Computing
    Yang, Jen-Ho
    Chang, Ya-Fen
    Huang, Chih-Cheng
    2013 9TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS AND SIGNAL PROCESSING (ICICS), 2013,
  • [39] An Authentication Method Based on User Specific Behavior
    Li, Nian-Feng
    Tian, Pei
    Wang, Jie
    PROCEEDINGS OF 2016 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), 2016, : 132 - 135
  • [40] Adaptive Authentication based on Analysis of User Behavior
    Abu Bakar, Khairul Azmi
    Haron, Galoh Rashidah
    2014 SCIENCE AND INFORMATION CONFERENCE (SAI), 2014, : 601 - 606