Research on the Application of User Behavior Auditing Based on Hidden Markov Model in Cloud Environment

被引:0
|
作者
Zhang, Kejun [1 ]
Jiang, Chen [1 ]
Yang, Yunsong [1 ]
Wang, Yu [1 ]
Zhang, Guoliang [2 ]
机构
[1] Beijing Elect Sci & Technol Inst, Dept Comp Sci & Technol, Beijing, Peoples R China
[2] Xidian Univ, Sch Comp Sci & Technol, Xian, Peoples R China
关键词
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In this paper, cloud environment security issues, cloud storage environment as the research object, focusing on the audit mechanism of user behavior in cloud environment. According to the security features of cluster data in cloud storage environment, a user behavior auditing model is proposed, and the data acquisition and preprocessing of user behavior audit are studied. This paper analyzes the source of the user behavior audit analysis data. In the process of audit data analysis and processing, a feature vector method is proposed to extract valuable information from audit data. A user behavior modeling method based on Hidden Markov model is proposed in this paper, the user behavior model is used to identify the validity of the user's operation, and to ensure the security of the data of the cloud platform.
引用
收藏
页码:125 / 129
页数:5
相关论文
共 50 条
  • [11] Cloud Resource Autoscaling System based on Hidden Markov Model (HMM)
    Nikravesh, Ali Yadavar
    Ajila, Samuel A.
    Lung, Chung-Horng
    2014 IEEE INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING (ICSC), 2014, : 124 - 127
  • [12] A User Behavior Perception Model Based on Markov Process
    Shi, Zhan
    Li, Yuhong
    Han, Li
    Ma, Jian
    WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, 5854 : 508 - +
  • [13] Hidden Markov Model based Spot price prediction for Cloud Computing
    Liu, Duan
    Cai, Zhicheng
    Li, Xiaoping
    2017 15TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS AND 2017 16TH IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND COMMUNICATIONS (ISPA/IUCC 2017), 2017, : 996 - 1003
  • [14] Efficient Association Rule Mining Algorithm Based on User Behavior for Cloud Security Auditing
    Zhao, Chunye
    Tu, Shanshan
    Chen, Haoyu
    Huang, Yongfeng
    2016 IEEE INTERNATIONAL CONFERENCE OF ONLINE ANALYSIS AND COMPUTING SCIENCE (ICOACS), 2016, : 145 - 149
  • [15] Research on the Optimal Resource Allocation Policy based on User Characteristics and Behavior under the Environment of Cloud
    Wang, Rong
    Rao, Bin
    PROCEEDINGS OF THE 2015 CONFERENCE ON INFORMATIZATION IN EDUCATION, MANAGEMENT AND BUSINESS, 2015, 20 : 161 - 165
  • [16] Software Abnormal Behavior Detection Based on Hidden Markov Model
    Zhao, Jingling
    Huang, Guoxiao
    Liu, Tianyu
    Cui, Baojiang
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2017, 2018, 612 : 929 - 940
  • [17] Research on model of user behavior habit authentication in cloud computing
    Guo, F. (313919864@qq.com), 1600, Huazhong University of Science and Technology (41):
  • [18] Research on Height Constraint Algorithm Based on Hidden Markov Model
    Wang, Ruirong
    Song, Chunlei
    Wei, Chenchen
    Yu, Pei
    PROCEEDINGS OF THE 39TH CHINESE CONTROL CONFERENCE, 2020, : 3275 - 3280
  • [19] Hidden Markov Model Variants and their Application
    Stephen Winters-Hilt
    BMC Bioinformatics, 7
  • [20] Hidden Markov model variants and their application
    Winters-Hilt, Stephen
    BMC BIOINFORMATICS, 2006, 7 (Suppl 2)