###
计算机系统应用英文版:2016,25(6):125-130
本文二维码信息
码上扫一扫!
云计算环境下用户行为的认证与预测
(1.青海师范大学 计算机学院, 西宁 810008;2.华北科技学院 计算机学院, 北京 101601)
Authentication and Prediction of User Behavior in Cloud Computing
(1.School of computer Science and Technology, Qinghai Normal University, Xining 810008, China;2.School of computer Science and Technology, North China Institute of Science and Technology, Beijing 101601, China)
摘要
图/表
参考文献
相似文献
本文已被:浏览 1274次   下载 2284
Received:September 29, 2015    Revised:November 11, 2015
中文摘要: 云计算环境下,传统的身份认证技术表现出一定的缺陷,为了遏制不可信用户的入侵行为,本文结合传统的身份认证和行为认证,论述了云计算环境下的用户行为认证机制.建立了用户行为认证集,论述了整个机制的实现过程.建立了预测用户行为认证等级的贝叶斯网络模型,并结合历史和实时用户行为信息实现对用户行为认证等级的预测.通过实例分析论证了预测模型的有效性.论文理论分析表明该研究对增强用户认证,有效遏制不可信用户的入侵行为具有重要的理论和实际指导意义.
Abstract:The traditional authentication technology showed some deficiencies in cloud computing, in order to decrease intrusion of untrustworthy user, this paper discusses a scheme for user behavior authentication in cloud computing environment which combines traditional authentication and behavior authentication. The paper presents the creation of the user behavior authentication set. The paper presents the realization process of the whole mechanism. The paper proposes Bayesian network model to predict the level of user behavior authentication based on the combination of the evidence of past transaction and real-time user behavior information. We give an example to demonstrate the effectiveness of the prediction model. This research is of theoretically and practically significant for enhancing user authentication and decreasing intrusion of untrustworthy user effectively.
文章编号:     中图分类号:    文献标志码:
基金项目:福建省自然科学基金(2013J01223);福建师范大学"网络与信息安全关键理论和技术"校创新团队(IRTL1207)
引用文本:
李良,田立勤,李君建.云计算环境下用户行为的认证与预测.计算机系统应用,2016,25(6):125-130
LI Liang,TIAN Li-Qin,LI Jun-Jian.Authentication and Prediction of User Behavior in Cloud Computing.COMPUTER SYSTEMS APPLICATIONS,2016,25(6):125-130