Trust evaluation model of cloud user based on behavior data

In the process of using the cloud platform, how to ensure the safety of users is a matter we must concern. The user authentication can provide a certain degree of security, but when the user information was leaked, this method will not be effective. Therefore, this article proposes a trust evaluatio...

Full description

Bibliographic Details
Main Authors: Zhenguo Chen, Liqin Tian, Chuang Lin
Format: Article
Language:English
Published: SAGE Publishing 2018-05-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1177/1550147718776924
id doaj-bb17142a24fe4ce2b6ff59b1076dad8b
record_format Article
spelling doaj-bb17142a24fe4ce2b6ff59b1076dad8b2020-11-25T02:59:01ZengSAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772018-05-011410.1177/1550147718776924Trust evaluation model of cloud user based on behavior dataZhenguo Chen0Liqin Tian1Chuang Lin2College of Computer Science and Engineering, Northeastern University, Shenyang, ChinaHebei Engineering Technology Research Center for IOT Data acquisition & Processing, North China Institute of Science and Technology, East Yanjiao, Beijing, ChinaDepartment of Computer Science and Technology, Tsinghua University, Beijing, ChinaIn the process of using the cloud platform, how to ensure the safety of users is a matter we must concern. The user authentication can provide a certain degree of security, but when the user information was leaked, this method will not be effective. Therefore, this article proposes a trust evaluation model based on user behavior data. In this model, the user’s historical behavior will be used to construct a set of trusted behavior of the cloud users. On this basis, the direct trust of the user’s behavior can be obtained. Then, the recommendation trust can be calculated by the interaction between the users and other cloud users. Given the current historical trust, the comprehensive trust can be obtained using the weighted average method. Among them, the initial value of historical trust is set to a constant and then updated by the comprehensive trust. In order to control the user’s abnormal behavior more effectively, the suspicious threshold value and the abnormal threshold value were defined, which are used to punish the historical trust. Through the simulation of the virtual digital library cloud platform, the method can effectively evaluate the cloud users.https://doi.org/10.1177/1550147718776924
collection DOAJ
language English
format Article
sources DOAJ
author Zhenguo Chen
Liqin Tian
Chuang Lin
spellingShingle Zhenguo Chen
Liqin Tian
Chuang Lin
Trust evaluation model of cloud user based on behavior data
International Journal of Distributed Sensor Networks
author_facet Zhenguo Chen
Liqin Tian
Chuang Lin
author_sort Zhenguo Chen
title Trust evaluation model of cloud user based on behavior data
title_short Trust evaluation model of cloud user based on behavior data
title_full Trust evaluation model of cloud user based on behavior data
title_fullStr Trust evaluation model of cloud user based on behavior data
title_full_unstemmed Trust evaluation model of cloud user based on behavior data
title_sort trust evaluation model of cloud user based on behavior data
publisher SAGE Publishing
series International Journal of Distributed Sensor Networks
issn 1550-1477
publishDate 2018-05-01
description In the process of using the cloud platform, how to ensure the safety of users is a matter we must concern. The user authentication can provide a certain degree of security, but when the user information was leaked, this method will not be effective. Therefore, this article proposes a trust evaluation model based on user behavior data. In this model, the user’s historical behavior will be used to construct a set of trusted behavior of the cloud users. On this basis, the direct trust of the user’s behavior can be obtained. Then, the recommendation trust can be calculated by the interaction between the users and other cloud users. Given the current historical trust, the comprehensive trust can be obtained using the weighted average method. Among them, the initial value of historical trust is set to a constant and then updated by the comprehensive trust. In order to control the user’s abnormal behavior more effectively, the suspicious threshold value and the abnormal threshold value were defined, which are used to punish the historical trust. Through the simulation of the virtual digital library cloud platform, the method can effectively evaluate the cloud users.
url https://doi.org/10.1177/1550147718776924
work_keys_str_mv AT zhenguochen trustevaluationmodelofclouduserbasedonbehaviordata
AT liqintian trustevaluationmodelofclouduserbasedonbehaviordata
AT chuanglin trustevaluationmodelofclouduserbasedonbehaviordata
_version_ 1724704089885900800