Back to Search Start Over

A kind of user behavior authentication model and analysis in cloud computing.

Authors :
Tian, Li-Qin
Lin, Chuang
Yang, Ni
Duxiujuan
Source :
Energy Procedia; Dec2011, Vol. 13, p4099-4107, 9p
Publication Year :
2011

Abstract

Abstract: Currently, the cloud computing is welcome in scholars and enterprise, because of its good features such as low investment, easy maintenance, Flexibility and fast deployment, reliable service. However, when the cloud computing is implemented, the security and credibility is one of the biggest obstacles. In cloud computing, users directly use and operate software of cloud service providers, operating system, even programming environment and network infrastructure, so the impact and breakage users caused for cloud software and hardware resources more serious than the current Internet users to share resources. So whether the behavior and behavior subject is credible or not, how to authenticate and control user behavior, these are important parts of the cloud computing study. This paper presents the concept of user behavior authentication, discusses how to authenticate and control user behavior in the cloud computing environment according to the user''s behavior, include establishment of behavior authentication set, mechanisms of behavior authentication and control, corresponding mode of Stochastic Petri Nets, False Negative rates and algorithm performance etc. Paper lays the theoretical and practical foundation for the real application of cloud computing. [Copyright &y& Elsevier]

Details

Language :
English
ISSN :
18766102
Volume :
13
Database :
Supplemental Index
Journal :
Energy Procedia
Publication Type :
Academic Journal
Accession number :
85748910
Full Text :
https://doi.org/10.1016/j.egypro.2011.11.590