WSEAS Transactions on Computers
Print ISSN: 1109-2750, E-ISSN: 2224-2880
Volume 14, 2015
Trusted Access Control Based on FCE of User Behavior in Cloud Environment
Author:
Abstract: In a complex dynamic cloud computing environment, both analyses of abnormal behavior of users and confirming incredible users are effective security measures. Fuzzy mathematics is used to reflect the ambiguous judgment of experts, and AHP method is used to compute the weight for each attribute of network users’ behavior. So a comprehensive way is used to evaluate user’s trust value based on FCE in this study. Experimental results show that the trust in different types of users can be evaluated effectively, service rejection rate for malicious nodes is improved, and success rate of service interactions is also improved for integrity users. So the evaluation method helps to quantitative analysis of dynamic trust-based security controls, and provides a reliable evidence for service providers in response to user’s request.
Search Articles
Keywords: cloud platform, user behavior, access control, Fuzzy Comprehensive Evaluation, trust evaluation
Pages: 629-637
WSEAS Transactions on Computers, ISSN / E-ISSN: 1109-2750 / 2224-2880, Volume 14, 2015, Art. #62