• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Tian Junfeng, Cao Xun. A Cloud User Behavior Authentication Model Based on Multi-Partite Graphs[J]. Journal of Computer Research and Development, 2014, 51(10): 2308-2317. DOI: 10.7544/issn1000-1239.2014.20130619
Citation: Tian Junfeng, Cao Xun. A Cloud User Behavior Authentication Model Based on Multi-Partite Graphs[J]. Journal of Computer Research and Development, 2014, 51(10): 2308-2317. DOI: 10.7544/issn1000-1239.2014.20130619

A Cloud User Behavior Authentication Model Based on Multi-Partite Graphs

More Information
  • Published Date: September 30, 2014
  • Cloud computing is developing rapidly, and the trustiness of cloud platform is the key issue relating to its success or failure. The authentication of the trustiness of user behavior is an important part of ensuring the credibility of cloud platform. In order to solve the problem of trustiness of cloud users’ behaviors, a cloud user behavior authentication model based on multi-partite graphs (BAM) is proposed. It includes the layer of user behavior evidence, the layer of building behavior multi-partite graphs and the layer of behavior authentication. The behavior evidence is the basis, the multi-partite graphs is the method and the behavior authentication is the purpose. In the layer of user behavior evidence, the model determines the type of evidence, collects behavior evidences and analyzes user behavior quantitatively; in the layer of building behavior multi-partite graphs, the model builds two multi-partite graphs based on the layer of behavior evidence and the knowledge of graph theory; in the layer of behavior authentication, the model builds the cloud user behavior authentication module to verify that users are trusted. Identity re-certification and risk game are introduced to enhance security and accuracy of the model. The analysis of small-scale cloud user behaviors in simulation experiments show that, the model is accurate and effective in measuring the normal behavior of cloud users and in distinguishing malicious user with the risk user, and it has higher detection ratio and lower false positive ratio.
  • Related Articles

    [1]Lu Xiaokai, Feng Jun, Han Yongqiang, Wang Hao, Chen Enhong. GraphMLP-Mixer: A Graph-MLP Architecture for Efficient Multi-Behavior Sequential Recommendation Method[J]. Journal of Computer Research and Development, 2024, 61(8): 1917-1929. DOI: 10.7544/issn1000-1239.202440137
    [2]Yao Hailong, Wang Caifen, Xu Qinbai, Li Wenting. A Distributed Biometric Authentication Protocol Based on Homomorphic Encryption[J]. Journal of Computer Research and Development, 2019, 56(11): 2375-2383. DOI: 10.7544/issn1000-1239.2019.20190293
    [3]Zhang Xiaoliang, Tu Yongce, Ma Hengtai, Yang Zhian, Hu Xiaohui. An End-to-End Authentication Protocol for Satellite Communication Network[J]. Journal of Computer Research and Development, 2013, 50(3): 540-547.
    [4]Xu Jian, Zhou Fucai, Yang Muzhou, Li Fuxiang, Zhu Zhiliang. Hierarchical Hash List for Distributed Query Authentication[J]. Journal of Computer Research and Development, 2012, 49(7): 1533-1544.
    [5]Tian Junfeng, Han Jine, Du Ruizhong, and Wang Yong. Creditability Evaluation Model Based on Software Behavior Trace[J]. Journal of Computer Research and Development, 2012, 49(7): 1514-1524.
    [6]Tian Junfeng, Li Zhen, Liu Yuling. An Design Approach of Trustworthy Software and Its Trustworthiness Evaluation[J]. Journal of Computer Research and Development, 2011, 48(8): 1447-1454.
    [7]Tian Junfeng, Du Ruizhong, Liu Yuling. Trust Evaluation Model Based on Node Behavior Character[J]. Journal of Computer Research and Development, 2011, 48(6): 934-944.
    [8]Liu Ying, Zhang Yichuan, Zhang Bin, Zhang Mingwei, Zhu Zhiliang. Analysis of Service Replaceability on Behavior Effect[J]. Journal of Computer Research and Development, 2010, 47(8): 1442-1449.
    [9]Lin Chuang, Tian Liqin, Wang Yuanzhuo. Research on User Behavior Trust in Trustworthy Network[J]. Journal of Computer Research and Development, 2008, 45(12): 2033-2043.
    [10]Wang Lunwei, Liao Xiangke, and Wang Huaimin. Research on Authentication Trustworthiness Theory[J]. Journal of Computer Research and Development, 2005, 42(3).

Catalog

    Article views (1127) PDF downloads (789) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return