Research on the Application of User Behavior Auditing Based on Hidden Markov Model in Cloud Environment

被引:0
|
作者
Zhang, Kejun [1 ]
Jiang, Chen [1 ]
Yang, Yunsong [1 ]
Wang, Yu [1 ]
Zhang, Guoliang [2 ]
机构
[1] Beijing Elect Sci & Technol Inst, Dept Comp Sci & Technol, Beijing, Peoples R China
[2] Xidian Univ, Sch Comp Sci & Technol, Xian, Peoples R China
关键词
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In this paper, cloud environment security issues, cloud storage environment as the research object, focusing on the audit mechanism of user behavior in cloud environment. According to the security features of cluster data in cloud storage environment, a user behavior auditing model is proposed, and the data acquisition and preprocessing of user behavior audit are studied. This paper analyzes the source of the user behavior audit analysis data. In the process of audit data analysis and processing, a feature vector method is proposed to extract valuable information from audit data. A user behavior modeling method based on Hidden Markov model is proposed in this paper, the user behavior model is used to identify the validity of the user's operation, and to ensure the security of the data of the cloud platform.
引用
收藏
页码:125 / 129
页数:5
相关论文
共 50 条
  • [21] Autoregressive State Prediction Model Based on Hidden Markov and the Application
    Zhao, Zhiguo
    Wang, Yeqin
    Feng, Mengqi
    Peng, Guangqin
    Liu, Jinguo
    Jason, Beth
    Tao, Yukai
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2018, 102 (04) : 2403 - 2416
  • [22] Application and Realization of Indoor Localization Based on Hidden Markov Model
    Ding, Xinlang
    Chen, Yubin
    Gui, Qiao
    Xiong, Chong
    [J]. ADVANCES IN WIRELESS SENSOR NETWORKS, CWSN 2013, 2014, 418 : 303 - 312
  • [23] Autoregressive State Prediction Model Based on Hidden Markov and the Application
    Zhiguo Zhao
    Yeqin Wang
    Mengqi Feng
    Guangqin Peng
    Jinguo Liu
    Beth Jason
    Yukai Tao
    [J]. Wireless Personal Communications, 2018, 102 : 2403 - 2416
  • [24] A Hidden Markov Model Combined With Markov Games for Intrusion Detection in Cloud
    Narwal, Priti
    Kumar, Deepak
    Singh, Shailendra N.
    [J]. JOURNAL OF CASES ON INFORMATION TECHNOLOGY, 2019, 21 (04) : 14 - 26
  • [25] A novel model for user clicks identification based on hidden semi-Markov
    Xu, C.
    Du, C.
    Zhao, G. F.
    Yu, S.
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (02) : 791 - 798
  • [26] A Hidden Markov Model Based Dynamic Scheduling Approach for Mobile Cloud Telemonitoring
    Wang, Xiaoliang
    Xu, Wenyao
    Jin, Zhanpeng
    [J]. 2017 IEEE EMBS INTERNATIONAL CONFERENCE ON BIOMEDICAL & HEALTH INFORMATICS (BHI), 2017, : 273 - 276
  • [27] A User-Based Trust Model for Cloud Computing Environment
    Saeed, Othman
    Shaikh, Riaz Ahmed
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (03) : 337 - 346
  • [28] Detection and Prediction of Abnormal Behavior Based on User Profile in Ubiquitous Home Network Using Hierarchical Hidden Markov Model
    Shin, Jaewan
    Shin, Dongkyoo
    Shin, Dongil
    Kim, Cheonsik
    Park, Jonghyuk
    [J]. SENSOR LETTERS, 2013, 11 (09) : 1814 - 1819
  • [29] A study of individual characteristics of driving behavior based on hidden markov model
    Zhang, Xingjian
    Zhao, Xiaohua
    Rong, Jian
    [J]. Sensors and Transducers, 2014, 167 (03): : 194 - 202
  • [30] Application of Hidden Markov Model to Identify Disease Progression Process in Medical Research
    Madadizadeh, Farzan
    Yarahmadi, Mohammad
    Zeraati, Hojjat
    [J]. IRANIAN JOURNAL OF PUBLIC HEALTH, 2020, 49 (06) : 1200 - 1201