Authentication and Prediction of User Behavior in Cloud Computing
CSTR:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    The traditional authentication technology showed some deficiencies in cloud computing, in order to decrease intrusion of untrustworthy user, this paper discusses a scheme for user behavior authentication in cloud computing environment which combines traditional authentication and behavior authentication. The paper presents the creation of the user behavior authentication set. The paper presents the realization process of the whole mechanism. The paper proposes Bayesian network model to predict the level of user behavior authentication based on the combination of the evidence of past transaction and real-time user behavior information. We give an example to demonstrate the effectiveness of the prediction model. This research is of theoretically and practically significant for enhancing user authentication and decreasing intrusion of untrustworthy user effectively.

    Reference
    Related
    Cited by
Get Citation

李良,田立勤,李君建.云计算环境下用户行为的认证与预测.计算机系统应用,2016,25(6):125-130

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:September 29,2015
  • Revised:November 11,2015
  • Adopted:
  • Online: June 14,2016
  • Published:
Article QR Code
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063