Abstract
Traditional access control, simple methods for virus detection, and intrusion detection are unable to manage variety of malicious and network attacks. The number of users might get hacked because of limitation in basic security protection. To implement a secure, reliable, and safe cloud-computing environment, we need to consider the trust issue. A trusted cloud is guaranteed to be safe from user terminals; combined with the concept of a trusted network, it evaluates, forecasts, monitors, and manages the user’s behavior to eliminate malicious datacenter attacks which are performed by unwanted cloud users and hackers; as a result, there is improved cloud security. In this chapter, we propose a Framework for Monitoring the User’s Behavior and Computing the User’s trust (FMUBCT). This model detects abnormal user behavior by creating user-behavior history patterns and compares them with current user behavior. The outcome of the comparison is sent to a trust computation center to calculate a user trust value. FMUBCT is flexible and scalable as it considers more evidence to monitor and evaluate user behavior. Finally, the simulation of FMUBCT shows that the model can effectively evaluate the users.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
P. Paganini, Cost of cybercrime will grow from $3 trillion (2015) to $6 trillion by 2021, [Online]. Available: http://securityaffairs.co/wordpress/50680/cyber-crime/global-cost-of-cybercrime.html. Accessed 15 May 2019
P. Mell, T. Grance, The NIST Definition of Cloud Computing (NIST special publication, 2011), p. 2
U.S. Federal Cloud Computing Market Forecast 2018–2023, Market Research Media, [Online]. Available: www.marketresearchmedia.com/?p=145. Accessed 11 Apr 2018
Q. Zhang, L. Cheng, R. Boutaba, Cloud computing: State-of-the-art and research challenges. Internet Serv. Appl., 7–18 (2010). https://doi.org/10.1007/s13174-0100007-6
L. Tian, C. Lin, Y. Ni, Evaluation of user behavior trust in cloud computing, in 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), (2010), pp. 567–572, https://doi.org/10.1109/ICCASM.2010.5620636
B. Dewangan, P. Shende, The sliding window method: An environment to evaluate user behavior trust in cloud technology. Int. J. Adv. Res. Comput. Commun. Eng. 2(2), 1158–1162 (2013)
Y. Bendale, S. Shah, User level trust evaluation in cloud computing. Int. J. Comput. Appl. 8376, 31–35 (2013). https://doi.org/10.5120/12122
J. Ma, Y. Zhang, Research on trusted evaluation method of user behavior based on AHP algorithm, in 2015 7th International Conference on Information Technology in Medicine and Education (ITME), (2015), pp. 588–592. https://doi.org/10.1109/ITME.2015.39
M. Xiaoxue, W. Zixian, B. Jing, L. Fei, Trust model based on rewards and punishment mechanism, in 2010 2nd International Workshop on Education Technology and Computer Science, (2010), pp. 182–185. https://doi.org/10.1109/ETCS.2010.337
R. Banyal, V. Jain, P. Jain, Dynamic trust based access control framework for securing multi-cloud environment, in Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies, ICTCS ’14, (2014), pp. 291–298. https://doi.org/10.1145/2677855.2677884
X. Jing, Z. Liu, S. Li, B. Qiao, G. Tan, A cloud-user behavior assessment based dynamic access control model. Int. J. Syst. Assur. Eng. Manag. 8, 1966–1975 (2017). https://doi.org/10.1007/s13198-015-0411-1
M. Alruwaythi, K. Kambhampaty, K.E. Nygard, User behavior trust modeling in cloud security, in The 5 Annual Conference on Computational Science & Computational Intelligence, Las Vegas, NV, 2018
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Alruwaythi, M., Nygard, K. (2021). Framework for Monitoring the User’s Behavior and Computing the User’s Trust. In: Arabnia, H.R., et al. Advances in Parallel & Distributed Processing, and Applications. Transactions on Computational Science and Computational Intelligence. Springer, Cham. https://doi.org/10.1007/978-3-030-69984-0_80
Download citation
DOI: https://doi.org/10.1007/978-3-030-69984-0_80
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-69983-3
Online ISBN: 978-3-030-69984-0
eBook Packages: Computer ScienceComputer Science (R0)