Trust evaluation model of cloud user based on behavior data
In the process of using the cloud platform, how to ensure the safety of users is a matter we must concern. The user authentication can provide a certain degree of security, but when the user information was leaked, this method will not be effective. Therefore, this article proposes a trust evaluatio...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
SAGE Publishing
2018-05-01
|
Series: | International Journal of Distributed Sensor Networks |
Online Access: | https://doi.org/10.1177/1550147718776924 |
id |
doaj-bb17142a24fe4ce2b6ff59b1076dad8b |
---|---|
record_format |
Article |
spelling |
doaj-bb17142a24fe4ce2b6ff59b1076dad8b2020-11-25T02:59:01ZengSAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772018-05-011410.1177/1550147718776924Trust evaluation model of cloud user based on behavior dataZhenguo Chen0Liqin Tian1Chuang Lin2College of Computer Science and Engineering, Northeastern University, Shenyang, ChinaHebei Engineering Technology Research Center for IOT Data acquisition & Processing, North China Institute of Science and Technology, East Yanjiao, Beijing, ChinaDepartment of Computer Science and Technology, Tsinghua University, Beijing, ChinaIn the process of using the cloud platform, how to ensure the safety of users is a matter we must concern. The user authentication can provide a certain degree of security, but when the user information was leaked, this method will not be effective. Therefore, this article proposes a trust evaluation model based on user behavior data. In this model, the user’s historical behavior will be used to construct a set of trusted behavior of the cloud users. On this basis, the direct trust of the user’s behavior can be obtained. Then, the recommendation trust can be calculated by the interaction between the users and other cloud users. Given the current historical trust, the comprehensive trust can be obtained using the weighted average method. Among them, the initial value of historical trust is set to a constant and then updated by the comprehensive trust. In order to control the user’s abnormal behavior more effectively, the suspicious threshold value and the abnormal threshold value were defined, which are used to punish the historical trust. Through the simulation of the virtual digital library cloud platform, the method can effectively evaluate the cloud users.https://doi.org/10.1177/1550147718776924 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Zhenguo Chen Liqin Tian Chuang Lin |
spellingShingle |
Zhenguo Chen Liqin Tian Chuang Lin Trust evaluation model of cloud user based on behavior data International Journal of Distributed Sensor Networks |
author_facet |
Zhenguo Chen Liqin Tian Chuang Lin |
author_sort |
Zhenguo Chen |
title |
Trust evaluation model of cloud user based on behavior data |
title_short |
Trust evaluation model of cloud user based on behavior data |
title_full |
Trust evaluation model of cloud user based on behavior data |
title_fullStr |
Trust evaluation model of cloud user based on behavior data |
title_full_unstemmed |
Trust evaluation model of cloud user based on behavior data |
title_sort |
trust evaluation model of cloud user based on behavior data |
publisher |
SAGE Publishing |
series |
International Journal of Distributed Sensor Networks |
issn |
1550-1477 |
publishDate |
2018-05-01 |
description |
In the process of using the cloud platform, how to ensure the safety of users is a matter we must concern. The user authentication can provide a certain degree of security, but when the user information was leaked, this method will not be effective. Therefore, this article proposes a trust evaluation model based on user behavior data. In this model, the user’s historical behavior will be used to construct a set of trusted behavior of the cloud users. On this basis, the direct trust of the user’s behavior can be obtained. Then, the recommendation trust can be calculated by the interaction between the users and other cloud users. Given the current historical trust, the comprehensive trust can be obtained using the weighted average method. Among them, the initial value of historical trust is set to a constant and then updated by the comprehensive trust. In order to control the user’s abnormal behavior more effectively, the suspicious threshold value and the abnormal threshold value were defined, which are used to punish the historical trust. Through the simulation of the virtual digital library cloud platform, the method can effectively evaluate the cloud users. |
url |
https://doi.org/10.1177/1550147718776924 |
work_keys_str_mv |
AT zhenguochen trustevaluationmodelofclouduserbasedonbehaviordata AT liqintian trustevaluationmodelofclouduserbasedonbehaviordata AT chuanglin trustevaluationmodelofclouduserbasedonbehaviordata |
_version_ |
1724704089885900800 |