Skip to main content

User Behaviour Authentication Model Based on Stochastic Petri Net in Cloud Environment

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 729))

Abstract

Cloud Computing has been developing rapidly and has impacted various aspects of our daily life. However, the growth of cloud service raises concerns about its security. This paper will be focussing on user identity authentication issues in the cloud environment. Through analysing and classifying user behaviours, we propose a Stochastic Petri net-based User Behaviour Authentication model (SPUBA), which uses the behaviour of a user while logging in and browsing to analyse user behaviour credibility. Also, in order to quantify user behaviour credibility, we have modified a K-modes algorithm to solve user habitual behavioural standard, proposed an algorithm for calculating user behaviour credibility. The user operational behaviours simulations has been performed in the cloud environment to analyse the execution time of the proposed model. The results regarding the detection and false positive rates shown are better than current models.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Liu, Y., (Lindsay) Sun, Y., et al.: A survey of security and privacy challenges in cloud computing: solutions and future directions. J. Comput. Sci. Eng. 9(3), 119–133 (2015)

    Article  Google Scholar 

  2. Nanda, M., Tyagi, A., et al.: Hindrances in the security of cloud computing. In: International Conference of Cloud System and Big Data Engineering, pp. 193–198 (2016)

    Google Scholar 

  3. Chen, C., et al.: Cloud Computing Security Architecture. Science Press, Beijing (2014). (in Chinese)

    Google Scholar 

  4. Hu, T., Feng, M., Tang, H.: Security Technology and Application in Cloud Computing. Publishing House of Electronics Industry, Beijing (2012). (in Chinese)

    Google Scholar 

  5. Wei, D., Zilong, J.: A study on analysis engine for large-scale user behavior based on cloud computing. Int. J. Multimed. Ubiquitous Eng. 9(12), 37–48 (2014)

    Article  Google Scholar 

  6. Tang, H., Mantao, W.: User identity authentication based on the combination of mouse and keyboard behavior. Int. J. Secur. Appl. 10(6), 29–36 (2016)

    Google Scholar 

  7. Senthil Kumar, T., Suresh, A., Karumathil, A.: Improvised classification model for cloud based authentication using keystroke dynamics. In: Frontier and Innovation in Future Computing and Communications (2014)

    Google Scholar 

  8. Zhao, C., Tu, S., Chen, H., et al.: Efficient association rule mining algorithm based on user behavior for cloud security auditing. In: IEEE International Conference of Online Analysis and Computing Science, pp. 145–149. IEEE (2016)

    Google Scholar 

  9. Chiu, C.Y., Yeh, C.T., Lee, Y.J.: Frequent pattern based user behavior anomaly detection for cloud system. In: Technologies and Applications of Artificial Intelligence, pp. 61–66. IEEE (2013)

    Google Scholar 

  10. Ahmed-Nacer, A., Ahmed-Nacer, M.: Strong authentication for mobile cloud computing. In: 13th International Conference on New Technologies for Distributed Systems. IEEE (2016)

    Google Scholar 

  11. Bakar, K.A.A., Haron, G.R.: Adaptive authentication based on analysis of user behavior. In: Science and Information Conference, London (2014)

    Google Scholar 

  12. Brosso, I., La Neve, A., et al.: A continuous authentication system based on user behavior analysis. In: 2010 International Conference on Availability, Reliability and Security. IEEE (2010)

    Google Scholar 

  13. Junfeng, T., Xun, C.: A cloud user behavior authentication model based on multi-partite graphs. J. Comput. Res. Develop., 51(10), 2308–2317 (2014). (in Chinese)

    Google Scholar 

  14. Chen, Y., Tian, L., Yang, Y.: Modeling and analysis of dynamic user behavior authentication scheme in cloud computing. J. Syst. Simul., 23(11): 2302–2307 (2011). (in Chinese)

    Google Scholar 

  15. Yarui, C., Liqin, T.: Modelling and performance analysis of user behavior authentication using stochastic Petri Nets. In: 2012 International Conference on Industrial Control and Electronics Engineering, pp. 1421–1425. IEEE (2012)

    Google Scholar 

  16. Lu, X., Xu, Y.: An user behavior credibility authentication model in cloud computing environment. In: 2nd International Conference on Information Technology and Electronic Commerce, pp. 271–275. IEEE (2014)

    Google Scholar 

  17. Jun-Jian, L., Li-Qin, T.: User’s behavior trust evaluate algorithm based on cloud model. In: 2015 Fifth International Conference on Instrumentation and Measurement, Computer, Communication and Control, pp. 556–561. IEEE (2015)

    Google Scholar 

  18. Hosseini, S.B., Shojaee, A., Agheli, N.: A new method for evaluating cloud computing user behavior trust. In: 2015 7th International Conference on Information and Knowledge Technology, pp. 1–6. IEEE (2015)

    Google Scholar 

  19. Fan, L.J., Wang, Y.Z., et al.: Privacy Petri Net and privacy leak software. J. Comput. Sci. Technol., 30(6): 1318–1343 (2015). (in Chinese)

    Google Scholar 

  20. Jie, F.: Mining analysis on user search behavior based on hadoop. Int. J. Database Theory Appl. 9(3), 81–86 (2016)

    Article  Google Scholar 

Download references

Acknowledgments

The subject is sponsored by the National Natural Science Foundation of P. R. China (Nos. 61373017, 61572260, 61572261, 61672296, 61602261), the Natural Science Foundation of Jiangsu Province (Nos. BK20140886, BK20140888, BK20160089), Scientific & Technological Support Project of Jiangsu Province (Nos. BE2015702, BE2016777, BE2016185), China Postdoctoral Science Foundation (Nos. 2014M551636, 2014M561696), Jiangsu Planned Projects for Postdoctoral Research Funds (Nos. 1302090B, 1401005B), Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Foundation (No. WSNLBZY201508).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Peng Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd

About this paper

Cite this paper

Li, P., Yang, C., Xu, H., LAU, T.F., Wang, R. (2017). User Behaviour Authentication Model Based on Stochastic Petri Net in Cloud Environment. In: Chen, G., Shen, H., Chen, M. (eds) Parallel Architecture, Algorithm and Programming. PAAP 2017. Communications in Computer and Information Science, vol 729. Springer, Singapore. https://doi.org/10.1007/978-981-10-6442-5_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6442-5_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6441-8

  • Online ISBN: 978-981-10-6442-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics