A cloud user behavior authentication model based on multi-partite graphs

被引:0
|
作者
Tian, Junfeng [1 ]
Cao, Xun [1 ]
机构
[1] Institute of Network Technology, Hebei University, Baoding,Hebei,071002, China
来源
Jisuanji Yanjiu yu Fazhan/Computer Research and Development | 2014年 / 51卷 / 10期
关键词
Authentication models - Behavior evidence - Building behavior - Cloud platforms - Normal behavior - Partite graphs - Trustiness - User behaviors;
D O I
10.7544/issn1000-1239.2014.20130619
中图分类号
学科分类号
摘要
Cloud computing is developing rapidly, and the trustiness of cloud platform is the key issue relating to its success or failure. The authentication of the trustiness of user behavior is an important part of ensuring the credibility of cloud platform. In order to solve the problem of trustiness of cloud users' behaviors, a cloud user behavior authentication model based on multi-partite graphs (BAM) is proposed. It includes the layer of user behavior evidence, the layer of building behavior multi-partite graphs and the layer of behavior authentication. The behavior evidence is the basis, the multi-partite graphs is the method and the behavior authentication is the purpose. In the layer of user behavior evidence, the model determines the type of evidence, collects behavior evidences and analyzes user behavior quantitatively; in the layer of building behavior multi-partite graphs, the model builds two multi-partite graphs based on the layer of behavior evidence and the knowledge of graph theory; in the layer of behavior authentication, the model builds the cloud user behavior authentication module to verify that users are trusted. Identity re-certification and risk game are introduced to enhance security and accuracy of the model. The analysis of small-scale cloud user behaviors in simulation experiments show that, the model is accurate and effective in measuring the normal behavior of cloud users and in distinguishing malicious user with the risk user, and it has higher detection ratio and lower false positive ratio.
引用
收藏
页码:2308 / 2317
相关论文
共 50 条
  • [41] A Multi-Feature User Authentication Model Based on Mobile App Interactions
    Ashibani, Yosef
    Mahmoud, Qusay H.
    IEEE ACCESS, 2020, 8 : 96322 - 96339
  • [42] User's Behavior Trust Evaluate Algorithm Based On Cloud Model
    Li Jun-Jian
    Tian Li-Qin
    2015 FIFTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2015, : 555 - 560
  • [43] An ID-Based User Authentication Scheme for Cloud Computing
    Yang, Jen-Ho
    Lin, Pei-Yu
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 98 - 101
  • [44] ID-Based User Authentication Scheme for Cloud Computing
    Ping-Liang Chen
    Jen-Ho Yang
    Ching-I Lin
    Journal of Electronic Science and Technology, 2013, (02) : 221 - 224
  • [45] Biometric based User Authentication Protocol for Mobile Cloud Environment
    Vivekanandan, Manojkumar
    Sastry, V. N.
    Reddy, U. Srinivasalu
    2019 5TH IEEE INTERNATIONAL CONFERENCE ON IDENTITY, SECURITY, AND BEHAVIOR ANALYSIS (ISBA 2019), 2019,
  • [46] ID-Based User Authentication Scheme for Cloud Computing
    PingLiang Chen
    JenHo Yang
    ChingI Lin
    JournalofElectronicScienceandTechnology, 2013, 11 (02) : 221 - 224
  • [47] Research on User Safety Authentication Based on Biometrics in Cloud Manufacturing
    Xie, Xiaolan
    Zhou, Xiao
    Liu, Yarong
    ADVANCED HYBRID INFORMATION PROCESSING, 2018, 219 : 50 - 55
  • [48] A User Authentication Scheme Based on Trusted Platform for Cloud Computing
    Mo, Jiaqing
    Hu, Zhongwang
    Lin, Yuhua
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 122 - 130
  • [49] Detecting Latent Terrorist Communities Testing a Gower's Similarity-Based Clustering Algorithm for Multi-partite Networks
    Campedelli, Gian Maria
    Cruickshank, Iain
    Carley, Kathleen M.
    COMPLEX NETWORKS AND THEIR APPLICATIONS VII, VOL 1, 2019, 812 : 292 - 303
  • [50] Resource allocation in cloud using multi bidding model with user centric behavior analysis
    Vijayaraj N.
    Murugan T.S.
    Recent Advances in Computer Science and Communications, 2020, 13 (05) : 1008 - 1019