Font Size: a A A

A Cloud User Behavior Authentication Model Based On Multi-partite Graphs

Posted on:2015-09-19Degree:MasterType:Thesis
Country:ChinaCandidate:X CaoFull Text:PDF
GTID:2298330422969999Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Cloud computing is developing rapidly; it will bring a fundamental change in life,production methods and business models. The trustiness of cloud platform is the key issuesrelating to its success or failure, and the authentication of the trustiness of user behavior is animportant part of ensuring the credibility of cloud platform.In order to solve the problem of trustiness of cloud users’ behaviors, a cloud userbehavior authentication model based on multi-partite graphs (BAM) is proposed, includingthe layer of user behavior evidence, the layer of building behavior multi-partite graphs and thelayer of behavior authentication, the behavior evidence is the basis, the multi-partite graphs isthe method and the behavior authentication is the purpose. In the layer of user behaviorevidence, the model determines the type of evidence, collects behavior evidences andanalyzes user behavior quantitatively; in the layer of building behavior multi-partite graphs,the model builds two multi-partite graphs based on the layer of behavior evidence and theknowledge of graph theory; in the layer of behavior authentication, the model builds the clouduser behavior authentication module to verify that users are trusted. Identity re-certificationand Risk Game are introduced to enhance security and accuracy of the model.The analysis of small-scale cloud user behaviors in simulation experiments show that,the model is accurate and effective in measuring the normal behavior of cloud users and indistinguishing malicious user with the risk user, and has a higher detection ratio and a lowerfalse positive ratio.
Keywords/Search Tags:Cloud Computing, Behavior Evidence, Behavior Multi-partite Graphs, Trustiness, Behavior Authentication
PDF Full Text Request
Related items