User Behaviour Authentication Model Based on Stochastic Petri Net in Cloud Environment

  • Peng Li
  • Cheng Yang
  • He Xu
  • Ting Fung LAU
  • Ruchuan Wang
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 729)


Cloud Computing has been developing rapidly and has impacted various aspects of our daily life. However, the growth of cloud service raises concerns about its security. This paper will be focussing on user identity authentication issues in the cloud environment. Through analysing and classifying user behaviours, we propose a Stochastic Petri net-based User Behaviour Authentication model (SPUBA), which uses the behaviour of a user while logging in and browsing to analyse user behaviour credibility. Also, in order to quantify user behaviour credibility, we have modified a K-modes algorithm to solve user habitual behavioural standard, proposed an algorithm for calculating user behaviour credibility. The user operational behaviours simulations has been performed in the cloud environment to analyse the execution time of the proposed model. The results regarding the detection and false positive rates shown are better than current models.


Cloud computing Stochastic Petri Net User’s behaviour trustworthy degree User behaviour authentication model 



The subject is sponsored by the National Natural Science Foundation of P. R. China (Nos. 61373017, 61572260, 61572261, 61672296, 61602261), the Natural Science Foundation of Jiangsu Province (Nos. BK20140886, BK20140888, BK20160089), Scientific & Technological Support Project of Jiangsu Province (Nos. BE2015702, BE2016777, BE2016185), China Postdoctoral Science Foundation (Nos. 2014M551636, 2014M561696), Jiangsu Planned Projects for Postdoctoral Research Funds (Nos. 1302090B, 1401005B), Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Foundation (No. WSNLBZY201508).


  1. 1.
    Liu, Y., (Lindsay) Sun, Y., et al.: A survey of security and privacy challenges in cloud computing: solutions and future directions. J. Comput. Sci. Eng. 9(3), 119–133 (2015)CrossRefGoogle Scholar
  2. 2.
    Nanda, M., Tyagi, A., et al.: Hindrances in the security of cloud computing. In: International Conference of Cloud System and Big Data Engineering, pp. 193–198 (2016)Google Scholar
  3. 3.
    Chen, C., et al.: Cloud Computing Security Architecture. Science Press, Beijing (2014). (in Chinese)Google Scholar
  4. 4.
    Hu, T., Feng, M., Tang, H.: Security Technology and Application in Cloud Computing. Publishing House of Electronics Industry, Beijing (2012). (in Chinese)Google Scholar
  5. 5.
    Wei, D., Zilong, J.: A study on analysis engine for large-scale user behavior based on cloud computing. Int. J. Multimed. Ubiquitous Eng. 9(12), 37–48 (2014)CrossRefGoogle Scholar
  6. 6.
    Tang, H., Mantao, W.: User identity authentication based on the combination of mouse and keyboard behavior. Int. J. Secur. Appl. 10(6), 29–36 (2016)Google Scholar
  7. 7.
    Senthil Kumar, T., Suresh, A., Karumathil, A.: Improvised classification model for cloud based authentication using keystroke dynamics. In: Frontier and Innovation in Future Computing and Communications (2014)Google Scholar
  8. 8.
    Zhao, C., Tu, S., Chen, H., et al.: Efficient association rule mining algorithm based on user behavior for cloud security auditing. In: IEEE International Conference of Online Analysis and Computing Science, pp. 145–149. IEEE (2016)Google Scholar
  9. 9.
    Chiu, C.Y., Yeh, C.T., Lee, Y.J.: Frequent pattern based user behavior anomaly detection for cloud system. In: Technologies and Applications of Artificial Intelligence, pp. 61–66. IEEE (2013)Google Scholar
  10. 10.
    Ahmed-Nacer, A., Ahmed-Nacer, M.: Strong authentication for mobile cloud computing. In: 13th International Conference on New Technologies for Distributed Systems. IEEE (2016)Google Scholar
  11. 11.
    Bakar, K.A.A., Haron, G.R.: Adaptive authentication based on analysis of user behavior. In: Science and Information Conference, London (2014)Google Scholar
  12. 12.
    Brosso, I., La Neve, A., et al.: A continuous authentication system based on user behavior analysis. In: 2010 International Conference on Availability, Reliability and Security. IEEE (2010)Google Scholar
  13. 13.
    Junfeng, T., Xun, C.: A cloud user behavior authentication model based on multi-partite graphs. J. Comput. Res. Develop., 51(10), 2308–2317 (2014). (in Chinese)Google Scholar
  14. 14.
    Chen, Y., Tian, L., Yang, Y.: Modeling and analysis of dynamic user behavior authentication scheme in cloud computing. J. Syst. Simul., 23(11): 2302–2307 (2011). (in Chinese)Google Scholar
  15. 15.
    Yarui, C., Liqin, T.: Modelling and performance analysis of user behavior authentication using stochastic Petri Nets. In: 2012 International Conference on Industrial Control and Electronics Engineering, pp. 1421–1425. IEEE (2012)Google Scholar
  16. 16.
    Lu, X., Xu, Y.: An user behavior credibility authentication model in cloud computing environment. In: 2nd International Conference on Information Technology and Electronic Commerce, pp. 271–275. IEEE (2014)Google Scholar
  17. 17.
    Jun-Jian, L., Li-Qin, T.: User’s behavior trust evaluate algorithm based on cloud model. In: 2015 Fifth International Conference on Instrumentation and Measurement, Computer, Communication and Control, pp. 556–561. IEEE (2015)Google Scholar
  18. 18.
    Hosseini, S.B., Shojaee, A., Agheli, N.: A new method for evaluating cloud computing user behavior trust. In: 2015 7th International Conference on Information and Knowledge Technology, pp. 1–6. IEEE (2015)Google Scholar
  19. 19.
    Fan, L.J., Wang, Y.Z., et al.: Privacy Petri Net and privacy leak software. J. Comput. Sci. Technol., 30(6): 1318–1343 (2015). (in Chinese)Google Scholar
  20. 20.
    Jie, F.: Mining analysis on user search behavior based on hadoop. Int. J. Database Theory Appl. 9(3), 81–86 (2016)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd 2017

Authors and Affiliations

  • Peng Li
    • 1
    • 2
  • Cheng Yang
    • 1
  • He Xu
    • 1
    • 2
  • Ting Fung LAU
    • 3
  • Ruchuan Wang
    • 1
    • 2
  1. 1.School of Computer ScienceNanjing University of Posts and TelecommunicationsNanjingChina
  2. 2.Jiangsu High Technology Research Key Laboratory for Wireless Sensor NetworksNanjingChina
  3. 3.School of Mathematics and Information SecurityRoyal Holloway, University of LondonSurreyUK

Personalised recommendations