云计算中基于用户行为和推荐的信任计算框架

T. Mujawar, L. B. Bhajantri
{"title":"云计算中基于用户行为和推荐的信任计算框架","authors":"T. Mujawar, L. B. Bhajantri","doi":"10.1109/ICACCS.2019.8728484","DOIUrl":null,"url":null,"abstract":"Cloud computing provides shared environment for different resources and services that are available for users at anytime and from anywhere. Cloud computing has gained considerable attention of users and businesses. However, security concern is one of the major hurdles for acceptance of cloud computing. In order to guarantee security of data, it is necessary to grant access of data, only to authorized users. The traditional system applies different access policies and permission while granting access to any user. The analysis of user behavior is also important aspect, which can be integrated into access control model. In this paper, the trust computation model is presented that takes user behavior into consideration while providing access to the cloud data. The recommendation for the user is also one of the important components to assess user behavior. The proposed model evaluates trustworthiness of user on basis of reputation and recommendation. With the advent in machine learning techniques, applying learning based techniques in security domain has gained lots of popularity. In the proposed method, the machine learning technique (k-means clustering Algorithm) is incorporated in the trust computation process and the users are classified according their trust values.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Trust Computation Framework based on User Behavior and Recommendation in Cloud Computing\",\"authors\":\"T. Mujawar, L. B. Bhajantri\",\"doi\":\"10.1109/ICACCS.2019.8728484\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing provides shared environment for different resources and services that are available for users at anytime and from anywhere. Cloud computing has gained considerable attention of users and businesses. However, security concern is one of the major hurdles for acceptance of cloud computing. In order to guarantee security of data, it is necessary to grant access of data, only to authorized users. The traditional system applies different access policies and permission while granting access to any user. The analysis of user behavior is also important aspect, which can be integrated into access control model. In this paper, the trust computation model is presented that takes user behavior into consideration while providing access to the cloud data. The recommendation for the user is also one of the important components to assess user behavior. The proposed model evaluates trustworthiness of user on basis of reputation and recommendation. With the advent in machine learning techniques, applying learning based techniques in security domain has gained lots of popularity. In the proposed method, the machine learning technique (k-means clustering Algorithm) is incorporated in the trust computation process and the users are classified according their trust values.\",\"PeriodicalId\":249139,\"journal\":{\"name\":\"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)\",\"volume\":\"91 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICACCS.2019.8728484\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACCS.2019.8728484","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

云计算为用户随时随地可用的不同资源和服务提供共享环境。云计算已经引起了用户和企业的广泛关注。然而,安全问题是接受云计算的主要障碍之一。为了保证数据的安全性,有必要将数据的访问权限授予授权用户。传统的系统在授予任何用户访问权限时,采用不同的访问策略和权限。用户行为分析也是一个重要方面,可以将其集成到访问控制模型中。本文在提供对云数据的访问时,提出了考虑用户行为的信任计算模型。对用户的推荐也是评估用户行为的重要组成部分之一。该模型基于信誉和推荐对用户的可信度进行评估。随着机器学习技术的出现,基于学习的技术在安全领域的应用得到了广泛的应用。该方法将机器学习技术(k-means聚类算法)引入到信任计算过程中,并根据用户的信任值对用户进行分类。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Trust Computation Framework based on User Behavior and Recommendation in Cloud Computing
Cloud computing provides shared environment for different resources and services that are available for users at anytime and from anywhere. Cloud computing has gained considerable attention of users and businesses. However, security concern is one of the major hurdles for acceptance of cloud computing. In order to guarantee security of data, it is necessary to grant access of data, only to authorized users. The traditional system applies different access policies and permission while granting access to any user. The analysis of user behavior is also important aspect, which can be integrated into access control model. In this paper, the trust computation model is presented that takes user behavior into consideration while providing access to the cloud data. The recommendation for the user is also one of the important components to assess user behavior. The proposed model evaluates trustworthiness of user on basis of reputation and recommendation. With the advent in machine learning techniques, applying learning based techniques in security domain has gained lots of popularity. In the proposed method, the machine learning technique (k-means clustering Algorithm) is incorporated in the trust computation process and the users are classified according their trust values.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Object Detection and Tracking Approaches for Video Surveillance Over Camera Network A Systematic Literature Review for Early Detection of Type II Diabetes Agricultural Field Monitoring using IoT A Methodical Overview on Phishing Detection along with an Organized Way to Construct an Anti-Phishing Framework Mobile Edge Communication An overview of MEC in 5G
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1