Username   Password       Forgot your password?  Forgot your username? 


A Behavior Trust Model based on Fuzzy Logic in Cloud Environment

Volume 14, Number 4, April 2018, pp. 665-672
DOI: 10.23940/ijpe.18.04.p9.665672

Zhangwei Yanga,b,c and Juan Luob

aInstitute of Information and Computer Science, Pingxiang University, Pingxiang, 337000, China
bSchool of Computer Science and Engineering, Hunan University, Changsha, 410082, China
cEngineering Research Centre for Cyberspace Security, Pingxiang, 337000, China

(Submitted on January 3, 2018; Revised on January 31, 2018; Accepted on March 5, 2018)


Authentication technology in the cloud environment cannot completely prevent the destruction of malicious users to cloud resources. The analysis and evaluation of the user behavior has become the key to effectively improve the security of cloud. This paper improves a multi-parameter behavior trust model (MTEM), which based on Beth model and Josang model. The MTEM model introduces a number of parameters involved in the transaction process of users and cloud service providers. Furthermore, we calculate the behavior weight value by using AHP, through fuzzy logic analysis of user behavior. According to the principle of maximum membership degree, we verified the feasibility and validity of the model by simulation. The simulation results show that the MTEM model can improve the detection accuracy of user's malicious behavior and the effectiveness of the users.


References: 18

    1. M. Alhamad, T.S. Dillon, T.S. Change. “Conceptual SLA Framework for Cloud Computing,” Proceedings of the 4th IEEE International Conference on Digital Ecosystems and Technologies. Piscataway: IEEE,2010:606-610
    2. T. Beth, M. Borcherding, B. Kein . “Open Net Works,” Proceedings European Symposium Security(ESORICS), BrightonSpringer-Vergag,l999:59~63
    3. A. M. Dillon, T. S. CHANG . “ SLA-based Trust Model for Cloud Computing,” Proceedings of 2010 13th International Conference on Network-Based Information Systems. pp.321-324, 2010.
    4. D.G. Feng, M. Zhang, Y. Zhang. “Cloud Computing Security Research,” Journal of Software. 2011,22(1):71-83.
    5. I. Foster, “The Anatomy of the Grid: Enabling Scalable Virtual Organizations,” International Journal of High Performance Computing Applications, vol.15, pp.200-222, Aug. 2001
    6. S.K. Guo, L.Q .Tian, X.L. Shen. “Research on FAHP Method in User Behavior Trust Computation,” Computer Engineering and Application. Vol. 47. pp.59-61, Dec,2011.
    7. T. Hassan B.D. James. A. Joshi,. “Security and Privacy Challenges in Cloud Computing Environments,” IEEE Security& Privacy,vol.8.pp.24-31, Jun,2010
    8. H. Jameel. “A Trust Model for Ubiquitous Systems based on Vectors of Trust Values,” In: The 7th IEEE Int’1 Symp. on Multimedia, IEEE Computer Society Press, Washington. pp.674–679, 2005
    9. A. Josang , R. Ismail, C. Body. “A Survey of Trust and Reputation Systems for Online Service Provision,” Decision Support Systems, 2007, 43(2): 618-644.
    10. X. Y. Li, X. L. Gui. “Trust Quantitative Model with Multiple Decision Factors in Trusted Network,” Chinese Journal of Computers, vol.32, pp. 405-416, May. 2009.
    11. Q. Li, X. Zheng. “Research Survey of Cloud Computing,” Computer Science,2011,38(4):32-37
    12. S. Song ,H. Wang , H. Mac, M. wan. “Fuzzy Trust Integration for Security Enforcement in Grid Computing,” Lecture Notes in Computer Science, vol.3. pp. 9-21.Jan, 2004.
    13. Y.S. Tan, C. Wang. “Trust Evaluation Based on User Behavior in Cloud Computing,” Microelectronics & Computer vol.11.pp.147-151. Nov, 2015
    14. W. Tang, J.B. Hu, Z. Chen. “Research on a Fuzzy Logic-Based Subjective Trust Management Model,” Journal of Computer Research and Development. vol.42. pp. 1654-1659, Oct, 2005
    15. L.Q. Tian, C. Lin. “User Behavior Trust Evaluation Mechanism based on Double Sliding Window ,” Journal of Tsinghua University(Science and Technology) .2010(5): 763-767.
    16. Z.H. Wang, H.B. Pang, Z.B. Li. “An Access Control Scheme for Hadoop Cloud Platform,” Journal of Tsinghua University(Science and Technology). Vol.54.pp.53-59, Jan, 2014.
    17. H. Xia, Z.P. Jia, H.M. Edwin. “Research of Trust Model based on Fuzzy Theory in Mobile ad Hoc Networks,” IET information security,2014,8(2).
    18. X. Zhou, J. Yu. “Defense System Model based on Trust for Cloud Computing,” Journal of Computer Applications, vol. 31.pp.1531-1535, Jun, 2011


      Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

      This site uses encryption for transmitting your passwords.