Skip to main content
Top

2021 | OriginalPaper | Chapter

Framework for Monitoring the User’s Behavior and Computing the User’s Trust

Authors : Maryam Alruwaythi, Kendall Nygard

Published in: Advances in Parallel & Distributed Processing, and Applications

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Traditional access control, simple methods for virus detection, and intrusion detection are unable to manage variety of malicious and network attacks. The number of users might get hacked because of limitation in basic security protection. To implement a secure, reliable, and safe cloud-computing environment, we need to consider the trust issue. A trusted cloud is guaranteed to be safe from user terminals; combined with the concept of a trusted network, it evaluates, forecasts, monitors, and manages the user’s behavior to eliminate malicious datacenter attacks which are performed by unwanted cloud users and hackers; as a result, there is improved cloud security. In this chapter, we propose a Framework for Monitoring the User’s Behavior and Computing the User’s trust (FMUBCT). This model detects abnormal user behavior by creating user-behavior history patterns and compares them with current user behavior. The outcome of the comparison is sent to a trust computation center to calculate a user trust value. FMUBCT is flexible and scalable as it considers more evidence to monitor and evaluate user behavior. Finally, the simulation of FMUBCT shows that the model can effectively evaluate the users.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference P. Mell, T. Grance, The NIST Definition of Cloud Computing (NIST special publication, 2011), p. 2 P. Mell, T. Grance, The NIST Definition of Cloud Computing (NIST special publication, 2011), p. 2
6.
go back to reference B. Dewangan, P. Shende, The sliding window method: An environment to evaluate user behavior trust in cloud technology. Int. J. Adv. Res. Comput. Commun. Eng. 2(2), 1158–1162 (2013) B. Dewangan, P. Shende, The sliding window method: An environment to evaluate user behavior trust in cloud technology. Int. J. Adv. Res. Comput. Commun. Eng. 2(2), 1158–1162 (2013)
10.
go back to reference R. Banyal, V. Jain, P. Jain, Dynamic trust based access control framework for securing multi-cloud environment, in Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies, ICTCS ’14, (2014), pp. 291–298. https://doi.org/10.1145/2677855.2677884 CrossRef R. Banyal, V. Jain, P. Jain, Dynamic trust based access control framework for securing multi-cloud environment, in Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies, ICTCS ’14, (2014), pp. 291–298. https://​doi.​org/​10.​1145/​2677855.​2677884 CrossRef
12.
go back to reference M. Alruwaythi, K. Kambhampaty, K.E. Nygard, User behavior trust modeling in cloud security, in The 5 Annual Conference on Computational Science & Computational Intelligence, Las Vegas, NV, 2018 M. Alruwaythi, K. Kambhampaty, K.E. Nygard, User behavior trust modeling in cloud security, in The 5 Annual Conference on Computational Science & Computational Intelligence, Las Vegas, NV, 2018
Metadata
Title
Framework for Monitoring the User’s Behavior and Computing the User’s Trust
Authors
Maryam Alruwaythi
Kendall Nygard
Copyright Year
2021
DOI
https://doi.org/10.1007/978-3-030-69984-0_80