Font Size: a A A

Identity Credibility Evaluation Method Based On User Behavior Analysis In Cloud Environment

Posted on:2020-06-24Degree:MasterType:Thesis
Country:ChinaCandidate:J J JinFull Text:PDF
GTID:2428330590471750Subject:Computer technology
Abstract/Summary:PDF Full Text Request
More and more individuals and enterprises are exposed to the convenience of cloud computing.Users only need to use the network to remotely access resources,deploy environments,and store data in the cloud.While being convenient,the security of cloud computing is further exposed.The openness,dynamics,and randomness of cloud computing make the destructive power and influence of malicious attacks in the cloud environment far exceed the traditional environment.In the cloud computing environment,the existing identity authentication technology can determine the legality of the user identity who entering the cloud,but this cannot prevent identity theft or malicious destruction of legitimate users.In order to prevent the above situation,it is necessary to evaluate the credibility of the user identity as an additional security information to achieve user identification and rights management.This thesis proposes an identity credibility evaluation method based on user behavior analysis in cloud environment.Since the user behavior can objectively reflect the impact of the user's actual operation on the cloud environment,the user behavior analysis is used to judge the user's identity credibility,thus realizing the identification and control of the user.The main research contents of this thesis include:1.Analyzing the trusted requirements in the cloud environment and establishing the trusted relationship between the cloud service provider and users.By collecting the evidence of behavior when users interact with cloud service providers,a hierarchical trust evaluation system is constructed.The user behavior is comprehensively measured by fuzzy analytic hierarchy process,and it is used as the basis for user identity credibility evaluation.2.Constructing a multi-part graph model and mapping each user as a node in the model by using the characteristics of the multi-part graph model.Integrating the trusted features of each user to complete Comprehensive assessment.The multi-part graph model is used to analyze the credible upper bound and the credible lower bound of user behavior.3.Basing on the results of the multi-part graph model analysis,combining with credibility evaluation reward and punishment strategy,time decay strategy and other credibility evaluation strategies to quantify user identity credibility.Using the obtaineduser identity credibility,this thesis presents an access control model which based on user identity credibility.The basis of this model is the role access control model.In this thesis,the identity credibility is introduced into it,and the credibility is used as the basis for the user to activate the corresponding role.Then the user's trusted level is used to authorize the role which owned by the user,and the dynamic management of the user's authority is realized.
Keywords/Search Tags:cloud computing, user behavior analysis, identity credibility, access control
PDF Full Text Request
Related items