Abstract
Cloud Computing has been developing rapidly and has impacted various aspects of our daily life. However, the growth of cloud service raises concerns about its security. This paper will be focussing on user identity authentication issues in the cloud environment. Through analysing and classifying user behaviours, we propose a Stochastic Petri net-based User Behaviour Authentication model (SPUBA), which uses the behaviour of a user while logging in and browsing to analyse user behaviour credibility. Also, in order to quantify user behaviour credibility, we have modified a K-modes algorithm to solve user habitual behavioural standard, proposed an algorithm for calculating user behaviour credibility. The user operational behaviours simulations has been performed in the cloud environment to analyse the execution time of the proposed model. The results regarding the detection and false positive rates shown are better than current models.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Liu, Y., (Lindsay) Sun, Y., et al.: A survey of security and privacy challenges in cloud computing: solutions and future directions. J. Comput. Sci. Eng. 9(3), 119–133 (2015)
Nanda, M., Tyagi, A., et al.: Hindrances in the security of cloud computing. In: International Conference of Cloud System and Big Data Engineering, pp. 193–198 (2016)
Chen, C., et al.: Cloud Computing Security Architecture. Science Press, Beijing (2014). (in Chinese)
Hu, T., Feng, M., Tang, H.: Security Technology and Application in Cloud Computing. Publishing House of Electronics Industry, Beijing (2012). (in Chinese)
Wei, D., Zilong, J.: A study on analysis engine for large-scale user behavior based on cloud computing. Int. J. Multimed. Ubiquitous Eng. 9(12), 37–48 (2014)
Tang, H., Mantao, W.: User identity authentication based on the combination of mouse and keyboard behavior. Int. J. Secur. Appl. 10(6), 29–36 (2016)
Senthil Kumar, T., Suresh, A., Karumathil, A.: Improvised classification model for cloud based authentication using keystroke dynamics. In: Frontier and Innovation in Future Computing and Communications (2014)
Zhao, C., Tu, S., Chen, H., et al.: Efficient association rule mining algorithm based on user behavior for cloud security auditing. In: IEEE International Conference of Online Analysis and Computing Science, pp. 145–149. IEEE (2016)
Chiu, C.Y., Yeh, C.T., Lee, Y.J.: Frequent pattern based user behavior anomaly detection for cloud system. In: Technologies and Applications of Artificial Intelligence, pp. 61–66. IEEE (2013)
Ahmed-Nacer, A., Ahmed-Nacer, M.: Strong authentication for mobile cloud computing. In: 13th International Conference on New Technologies for Distributed Systems. IEEE (2016)
Bakar, K.A.A., Haron, G.R.: Adaptive authentication based on analysis of user behavior. In: Science and Information Conference, London (2014)
Brosso, I., La Neve, A., et al.: A continuous authentication system based on user behavior analysis. In: 2010 International Conference on Availability, Reliability and Security. IEEE (2010)
Junfeng, T., Xun, C.: A cloud user behavior authentication model based on multi-partite graphs. J. Comput. Res. Develop., 51(10), 2308–2317 (2014). (in Chinese)
Chen, Y., Tian, L., Yang, Y.: Modeling and analysis of dynamic user behavior authentication scheme in cloud computing. J. Syst. Simul., 23(11): 2302–2307 (2011). (in Chinese)
Yarui, C., Liqin, T.: Modelling and performance analysis of user behavior authentication using stochastic Petri Nets. In: 2012 International Conference on Industrial Control and Electronics Engineering, pp. 1421–1425. IEEE (2012)
Lu, X., Xu, Y.: An user behavior credibility authentication model in cloud computing environment. In: 2nd International Conference on Information Technology and Electronic Commerce, pp. 271–275. IEEE (2014)
Jun-Jian, L., Li-Qin, T.: User’s behavior trust evaluate algorithm based on cloud model. In: 2015 Fifth International Conference on Instrumentation and Measurement, Computer, Communication and Control, pp. 556–561. IEEE (2015)
Hosseini, S.B., Shojaee, A., Agheli, N.: A new method for evaluating cloud computing user behavior trust. In: 2015 7th International Conference on Information and Knowledge Technology, pp. 1–6. IEEE (2015)
Fan, L.J., Wang, Y.Z., et al.: Privacy Petri Net and privacy leak software. J. Comput. Sci. Technol., 30(6): 1318–1343 (2015). (in Chinese)
Jie, F.: Mining analysis on user search behavior based on hadoop. Int. J. Database Theory Appl. 9(3), 81–86 (2016)
Acknowledgments
The subject is sponsored by the National Natural Science Foundation of P. R. China (Nos. 61373017, 61572260, 61572261, 61672296, 61602261), the Natural Science Foundation of Jiangsu Province (Nos. BK20140886, BK20140888, BK20160089), Scientific & Technological Support Project of Jiangsu Province (Nos. BE2015702, BE2016777, BE2016185), China Postdoctoral Science Foundation (Nos. 2014M551636, 2014M561696), Jiangsu Planned Projects for Postdoctoral Research Funds (Nos. 1302090B, 1401005B), Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Foundation (No. WSNLBZY201508).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd
About this paper
Cite this paper
Li, P., Yang, C., Xu, H., LAU, T.F., Wang, R. (2017). User Behaviour Authentication Model Based on Stochastic Petri Net in Cloud Environment. In: Chen, G., Shen, H., Chen, M. (eds) Parallel Architecture, Algorithm and Programming. PAAP 2017. Communications in Computer and Information Science, vol 729. Springer, Singapore. https://doi.org/10.1007/978-981-10-6442-5_6
Download citation
DOI: https://doi.org/10.1007/978-981-10-6442-5_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6441-8
Online ISBN: 978-981-10-6442-5
eBook Packages: Computer ScienceComputer Science (R0)