Skip to main content

Framework for Monitoring the User’s Behavior and Computing the User’s Trust

  • Conference paper
  • First Online:
Advances in Parallel & Distributed Processing, and Applications

Abstract

Traditional access control, simple methods for virus detection, and intrusion detection are unable to manage variety of malicious and network attacks. The number of users might get hacked because of limitation in basic security protection. To implement a secure, reliable, and safe cloud-computing environment, we need to consider the trust issue. A trusted cloud is guaranteed to be safe from user terminals; combined with the concept of a trusted network, it evaluates, forecasts, monitors, and manages the user’s behavior to eliminate malicious datacenter attacks which are performed by unwanted cloud users and hackers; as a result, there is improved cloud security. In this chapter, we propose a Framework for Monitoring the User’s Behavior and Computing the User’s trust (FMUBCT). This model detects abnormal user behavior by creating user-behavior history patterns and compares them with current user behavior. The outcome of the comparison is sent to a trust computation center to calculate a user trust value. FMUBCT is flexible and scalable as it considers more evidence to monitor and evaluate user behavior. Finally, the simulation of FMUBCT shows that the model can effectively evaluate the users.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 379.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. P. Paganini, Cost of cybercrime will grow from $3 trillion (2015) to $6 trillion by 2021, [Online]. Available: http://securityaffairs.co/wordpress/50680/cyber-crime/global-cost-of-cybercrime.html. Accessed 15 May 2019

  2. P. Mell, T. Grance, The NIST Definition of Cloud Computing (NIST special publication, 2011), p. 2

    Google Scholar 

  3. U.S. Federal Cloud Computing Market Forecast 2018–2023, Market Research Media, [Online]. Available: www.marketresearchmedia.com/?p=145. Accessed 11 Apr 2018

  4. Q. Zhang, L. Cheng, R. Boutaba, Cloud computing: State-of-the-art and research challenges. Internet Serv. Appl., 7–18 (2010). https://doi.org/10.1007/s13174-0100007-6

  5. L. Tian, C. Lin, Y. Ni, Evaluation of user behavior trust in cloud computing, in 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), (2010), pp. 567–572, https://doi.org/10.1109/ICCASM.2010.5620636

  6. B. Dewangan, P. Shende, The sliding window method: An environment to evaluate user behavior trust in cloud technology. Int. J. Adv. Res. Comput. Commun. Eng. 2(2), 1158–1162 (2013)

    Google Scholar 

  7. Y. Bendale, S. Shah, User level trust evaluation in cloud computing. Int. J. Comput. Appl. 8376, 31–35 (2013). https://doi.org/10.5120/12122

    Article  Google Scholar 

  8. J. Ma, Y. Zhang, Research on trusted evaluation method of user behavior based on AHP algorithm, in 2015 7th International Conference on Information Technology in Medicine and Education (ITME), (2015), pp. 588–592. https://doi.org/10.1109/ITME.2015.39

    Chapter  Google Scholar 

  9. M. Xiaoxue, W. Zixian, B. Jing, L. Fei, Trust model based on rewards and punishment mechanism, in 2010 2nd International Workshop on Education Technology and Computer Science, (2010), pp. 182–185. https://doi.org/10.1109/ETCS.2010.337

    Chapter  Google Scholar 

  10. R. Banyal, V. Jain, P. Jain, Dynamic trust based access control framework for securing multi-cloud environment, in Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies, ICTCS ’14, (2014), pp. 291–298. https://doi.org/10.1145/2677855.2677884

    Chapter  Google Scholar 

  11. X. Jing, Z. Liu, S. Li, B. Qiao, G. Tan, A cloud-user behavior assessment based dynamic access control model. Int. J. Syst. Assur. Eng. Manag. 8, 1966–1975 (2017). https://doi.org/10.1007/s13198-015-0411-1

    Article  Google Scholar 

  12. M. Alruwaythi, K. Kambhampaty, K.E. Nygard, User behavior trust modeling in cloud security, in The 5 Annual Conference on Computational Science & Computational Intelligence, Las Vegas, NV, 2018

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kendall Nygard .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Alruwaythi, M., Nygard, K. (2021). Framework for Monitoring the User’s Behavior and Computing the User’s Trust. In: Arabnia, H.R., et al. Advances in Parallel & Distributed Processing, and Applications. Transactions on Computational Science and Computational Intelligence. Springer, Cham. https://doi.org/10.1007/978-3-030-69984-0_80

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-69984-0_80

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-69983-3

  • Online ISBN: 978-3-030-69984-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics