Abstract

The openness, dynamics, randomness and other characteristics of cloud computing make the malicious attack in the cloud environment more destructive and influential than the traditional environment. Existing identity authentication technology can verify the legality of user identity in the cloud environment. But, it cannot prevent the malicious user who is stealing a legitimate identity to carry out an attack or legal user's illegal behavior. That is, the user identity is legal but we cannot guarantee that the user must be trusted. Therefore, in order to achieve a quantitative assessment of the user's identity credibility and identify the user type, this paper proposes an identity credibility evaluation method based on user behavior analysis. It is designed to analyze user behavior to determine its identity credibility. This method uses fuzzy analytic hierarchy process to weaken the subjectivity of credible evaluation, and uses multi-partite graph model to construct an intuitive credible judgment basis. At the same time, the identity credibility evaluation strategy is introduced to quantitatively analyze the credibility of user identity. Experiments show that this method can effectively evaluate the credibility of user identity, meet the needs of cloud service providers for user classification management, and achieve moderate security.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.