Research on the Application of User Behavior Auditing Based on Hidden Markov Model in Cloud Environment

被引:0
|
作者
Zhang, Kejun [1 ]
Jiang, Chen [1 ]
Yang, Yunsong [1 ]
Wang, Yu [1 ]
Zhang, Guoliang [2 ]
机构
[1] Beijing Elect Sci & Technol Inst, Dept Comp Sci & Technol, Beijing, Peoples R China
[2] Xidian Univ, Sch Comp Sci & Technol, Xian, Peoples R China
关键词
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In this paper, cloud environment security issues, cloud storage environment as the research object, focusing on the audit mechanism of user behavior in cloud environment. According to the security features of cluster data in cloud storage environment, a user behavior auditing model is proposed, and the data acquisition and preprocessing of user behavior audit are studied. This paper analyzes the source of the user behavior audit analysis data. In the process of audit data analysis and processing, a feature vector method is proposed to extract valuable information from audit data. A user behavior modeling method based on Hidden Markov model is proposed in this paper, the user behavior model is used to identify the validity of the user's operation, and to ensure the security of the data of the cloud platform.
引用
收藏
页码:125 / 129
页数:5
相关论文
共 50 条
  • [31] Identification of highway dangerous driving behavior based on Hidden Markov Model
    Wang, Jian
    Li, Jun
    Hu, Xiaowei
    CIVIL ENGINEERING AND URBAN PLANNING III, 2014, : 199 - 202
  • [32] Application of Hidden Markov Model to Identify Disease Progression Process in Medical Research
    Madadizadeh, Farzan
    Yarahmadi, Mohammad
    Zeraati, Hojjat
    IRANIAN JOURNAL OF PUBLIC HEALTH, 2020, 49 (06) : 1200 - 1201
  • [33] Research of IOT Intrusion Detection System Based on Hidden Markov Model
    Jiang, Xuesong
    Wei, Xiumei
    Wang, Xingang
    2011 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND APPLICATIONS, 2011, : 151 - 155
  • [34] HIDDEN MARKOV MODEL FOR PARAMETER ESTIMATION OF A RANDOM WALK IN A MARKOV ENVIRONMENT
    Andreoletti, Pierre
    Loukianova, Dasha
    Matias, Catherine
    ESAIM-PROBABILITY AND STATISTICS, 2015, 19 : 605 - 625
  • [35] Research of IOT Intrusion Detection System Based on Hidden Markov Model
    Wei, Xiumei
    Jiang, Xuesong
    Wang, Xingang
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 2949 - 2952
  • [36] Research on Russian Cultural Transliteration Algorithm Based on Hidden Markov Model
    Wang, Hongling
    Liu, Chunfu
    PROCEEDINGS OF 2024 INTERNATIONAL CONFERENCE ON MACHINE INTELLIGENCE AND DIGITAL APPLICATIONS, MIDA2024, 2024, : 62 - 69
  • [37] Construction and application based on compressing depiction in Profile Hidden Markov Model
    Zhou, Zhijian
    Li, Daoliang
    Li, Li
    Fu, Zetian
    COMPUTER AND COMPUTING TECHNOLOGIES IN AGRICULTURE, VOL 2, 2008, 259 : 1291 - +
  • [38] Primary User Channel State Prediction Based on Time Series and Hidden Markov Model
    Mikaeil, Ahmed Mohammed
    Guo, Bin
    Bai, Xuemei
    Wang, Zhijun
    2014 2ND INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2014, : 866 - 870
  • [39] A HIDDEN MARKOV MODEL FOR INDOOR USER TRACKING BASED ON WIFI FINGERPRINTING AND STEP DETECTION
    Hoang, M. K.
    Schmalenstroeer, J.
    Drueke, C.
    Vu, D. H. Tran
    Haeb-Umbach, R.
    2013 PROCEEDINGS OF THE 21ST EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2013,
  • [40] Trust evaluation model of cloud user based on behavior data
    Chen, Zhenguo
    Tian, Liqin
    Lin, Chuang
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (05):