期刊文献+

云环境下面向隐私保护的用户行为分析

Analysis on the user behavior for privacy protection in cloud environment
下载PDF
导出
摘要 云环境下面向隐私保护的用户行为主要存在的就是隐私泄漏行为,为了更好地进行该项用户行为分析,将借助软件监测应用程序,调出相关的接口,从而对泄漏隐私的用户行为特点做出探究。文章对正常使用情况下的QQ软件以及植入木马病毒后QQ软件进行研究,分别建立全局PNN模型,研究该项模型的定性分析和定量分析等方面,从而对云环境下面向隐私保护的用户行为做出准确的分析研究。 Privacy-oriented user behavior exists in the cloud environment mainly for privacy leakage behavior. In order to better conduct the user behavior analysis, the software will be used to monitor the application program and bring up the relevant interfaces, so as to reveal the privacy of the user behavior characteristics make an inquiry. In this paper, the QQ software under normal use and the QQ software after the trojan virus implantation are researched, the global PNN model is established respectively, and the qualitative analysis and quantitative analysis of the model are studied. Thus, the privacy-oriented user behavior in cloud environment make accurate analysis and research.
作者 刘轩 杨全保
出处 《无线互联科技》 2018年第3期44-45,共2页 Wireless Internet Technology
关键词 云计算 PNN 用户行为 隐私泄露 性能 cloud computing probabilistic neural network user behavior privacy disclosure performance
  • 相关文献

参考文献3

二级参考文献110

  • 1李梦君,李舟军,陈火旺.基于进程代数安全协议验证的研究综述[J].计算机研究与发展,2004,41(7):1097-1103. 被引量:25
  • 2林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 3樊亚军,刘久文.TPM安全芯片设计与实现[J].信息安全与通信保密,2007,29(6):136-137. 被引量:5
  • 4罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 5张旻晋 桂文明 苏递生 等.从终端到网络的可信计算技术.信息技术快报,2006,4(2):21-34.
  • 6Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 7Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 8Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 9Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 10Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.

共引文献1353

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部