An improved authentication mechanism based on dynamic game behavior in cloud computing

Li, Haixia and Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 (2016) An improved authentication mechanism based on dynamic game behavior in cloud computing. Journal of Computational and Theoretical Nanoscience, 13 (2). pp. 1211-1219. ISSN 1546-1955

[thumbnail of An improved authentication mechanism based on dynamic game behavior in cloud computing.pdf] PDF
An improved authentication mechanism based on dynamic game behavior in cloud computing.pdf - Accepted Version
Restricted to Repository staff only

Download (296kB)

Abstract

With the cloud computing model being widely recognized, the concerns about cloud computing security are growing. Traditional static security measures could not solve the security problems in dynamic cloud computing, because cloud computing is different from the traditional IT technology in service mode, operation mode, and exchange mode. This study proposed a user dynamic game behavior based authentication security control mechanism, which considers adequately the effective range of properties of each evidence, and provides the layer’s behavior authentication evidence. The method has the self binding, can make the system potentially untrusted users sending malicious requests probabilistic stability at a relatively low level, the method provides a strong basis for cloud service providers to take accurate measures. According to the characteristics of service model in cloud computing, it defines the user behavior authentication sets consisting of attributes, definition and classification, studies the user behavioral evidence collection, normalizes the process and learning method, and makes out the behavior certification strategies and management strategies, thus improving effectively the cloud computing security.

Item Type: Article
Identifier: 10.1166/jctn.2016.5033
Keywords: BEHAVIOR AUTHENTICATION; CLOUD COMPUTING; DYNAMIC GAME; NASH EQUILIBRIUM
Subjects: Computing > Information security > Cyber security
Computing > Information security
Depositing User: Shanyu Tang
Date Deposited: 26 Sep 2017 23:30
Last Modified: 06 Feb 2024 15:54
URI: https://repository.uwl.ac.uk/id/eprint/3942

Actions (login required)

View Item View Item

Menu