Trusted Access Control Based on FCE of User Behavior in Cloud Environment
نویسنده
چکیده
In a complex dynamic cloud computing environment, both analyses of abnormal behavior of users and confirming incredible users are effective security measures. Fuzzy mathematics is used to reflect the ambiguous judgment of experts, and AHP method is used to compute the weight for each attribute of network users’ behavior. So a comprehensive way is used to evaluate user’s trust value based on FCE in this study. Experimental results show that the trust in different types of users can be evaluated effectively, service rejection rate for malicious nodes is improved, and success rate of service interactions is also improved for integrity users. So the evaluation method helps to quantitative analysis of dynamic trust-based security controls, and provides a reliable evidence for service providers in response to user’s request. Key-Words: cloud platform, user behavior, access control, Fuzzy Comprehensive Evaluation, trust evaluation.
منابع مشابه
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملBandwidth and Delay Optimization by Integrating of Software Trust Estimator with Multi-User Cloud Resource Competence
Trust Establishment is one of the significant resources to enhance the scalability and reliability of resources in the cloud environment. To establish a novel trust model on SaaS (Software as a Service) cloud resources and to optimize the resource utilization of multiple user requests, an integrated software trust estimator with multi-user resource competence (IST-MRC) optimization mechanism is...
متن کاملRESCUE: Reputation based Service for Cloud User Environment
Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...
متن کاملEvaluation of Behavioral Security in Cloud Computing
Currently, the cloud computing is hot research both in scholars and enterprise, because of its good features such as low investment, easy maintenance, flexibility and fast deployment, reliable service. But to truly implement cloud computing, we need to gradually improve it in academic, legal and institutional. Especially, the issue of trust is one of the biggest obstacles for the development of...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کامل