期刊文献+

云计算环境用户行为信任评估模型构建研究 被引量:2

Construction method of user behavior trust evaluation model in cloud computing environment
下载PDF
导出
摘要 针对传统云计算环境信任模型预测精度过低的问题,提出一种基于深度学习的云计算环境用户行为评估模型构建方法。采用预测-残差框架的长短期记忆网络对用户在云计算环境中交互行为集进行时序特征提取,在此基础上结合误差机制修正特征向量,构建云计算环境用户行为信任评估模型。该模型能够实现云计算环境用户访问行为安全的实时监控,解决云计算环境用户实时信任度评估精度过低的问题。根据试验数据表明,云计算环境用户行为信任评估模型构建方法能够有效提升用户可信度实时评估的准确率,可为安全态势分析和推演提供有效的数据支撑。 Aiming at the problem that the prediction accuracy of traditional trust model in cloud computing environment is too low,this paper proposes a method to build user behavior evaluation model in cloud computing environment based on deep learning.The long-term and short-term memory network of prediction residual framework is used to extract the temporal features of users’access behavior in the cloud computing environment.On this basis,combined with the error mechanism to modify the feature vector,the trust evaluation model of users’behavior in the cloud computing environment is constructed.The model can realize real-time monitoring of user behavior security in cloud computing environment,and solve the problem of low trust evaluation of users in cloud computing environment.Experimental results show that the proposed method can effectively improve the accuracy of real-time evaluation of user credibility,and provide data support for later security situation deduction.
作者 王娜 赵波 李昂 WANG Na;ZHAO Bo;LI Ang(Intelligence Network&Innovation Center,China United Network Communications Corporation Limited,Beijing 100044,China;Information Security Department of JD Group,Beijing 100176,China)
出处 《信息通信技术与政策》 2021年第8期86-91,共6页 Information and Communications Technology and Policy
关键词 云计算环境 信任评估 预测-残差框架 长短期记忆网络 cloud computing environment trust assessment prediction-residual framework long-term and short-term memory network
  • 相关文献

参考文献10

二级参考文献51

  • 1Trusted Mobile Platform Protocol Specification Document.
  • 2International Organization for Standardization,International Electrotechnical Commission. Information Technology-Security Techniques-Information Security Management Systems-Requirements[M].Switzerland:ISO copyright office,2005.
  • 3IT Governance Institute. Control Objectives for Information and related Technology 4.1[M].USA:IT Governance Institute,2007.
  • 4National Institute of Standards and Technology,U.S.Department of Commerce. NIST Special Publication 800 series[Z].
  • 5PCI Security Standards Council LLC. PCI DSS Requirements and Security Assessment Procedures,Version 2.0[Z].2010.
  • 6Trusted Computing Group.Trusted Computing Group TPM specification Version 1.2. http://www.trustedcomputinggroup.org . 2003
  • 7陈驰,于晶.云计算安全体系[M].北京:科学出版社,2014.
  • 8沈昌祥,张兴,于昇,祝璐,周明,周艺华.一种可信网络接入框架[P]. 中国专利:CN101136928,
  • 9(美) 查利纳 (Challener,D.) 等,著.可信计算[M]. 机械工业出版社, 2008
  • 10Trusted Computing Group.TCG TNC IF-T: Protocol Binding for Tunneled EAPMethods specification version1.0. http://www.trustedcomputinggroup.org/ .

共引文献149

同被引文献13

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部