A kind of user behavior authentication model and analysis in cloud computing
Currently, the cloud computing is welcome in scholars and enterprise, because of its good features such as low investment, easy maintenance, Flexibility and fast deployment, reliable service. However, when the cloud computing is implemented, the security and credibility is one of the biggest obstacles. In cloud computing, users directly use and operate software of cloud service providers, operating system, even programming environment and network infrastructure, so the impact and breakage users caused for cloud software and hardware resources more serious than the current Internet users to share resources. So whether the behavior and behavior subject is credible or not, how to authenticate and control user behavior, these are important parts of the cloud computing study. This paper presents the concept of user behavior authentication, discusses how to authenticate and control user behavior in the cloud computing environment according to the users behavior, include establishment of behavior authentication set, mechanisms of behavior authentication and control, corresponding mode of Stochastic Petri Nets, False Negative rates and algorithm performance etc. Paper lays the theoretical and practical foundation for the real application of cloud computing.
Cloud Computing Behavior Authentication Authentication Mode Property Analysis
TIAN Li-Qin LIN Chuang NI Yang
North China Institute of Science and Technology, Beijing East, China Department of Computer Science Department of Computer Science and Technology Tsinghua University Beijing China College of Electronics and Information Engineering Liaoning Technical University Huludao, China
国际会议
2011 International Conference on Security Science and Technology(ICSST 2011) (2011年安全科学与技术国际会议)
重庆
英文
17-21
2011-01-21(万方平台首次上网日期,不代表论文的发表时间)