A Credible Cloud Service Model based on Behavior Graphs and Tripartite Decision-Making Mechanism

The credibility of cloud service is the key to the success of the application of cloud services. The dual servers of master server and backup server are applied to cloud services, which can improve the availability of cloud services. In the past, the failures between master server and backup server could be detected by heartbeat algorithm. Because of lacking cloud user's evaluation, the authors put forward a credible cloud service model based on behavior Graphs and tripartite decision-making mechanism. By the quantitative of cloud users' behaviors evidences, the construction of behavior Graphs and the judgment of behavior, they select the most credible cloud user. They combine the master server, the backup server and the selected credible cloud user to determine the credibility of cloud service by the tripartite decision-making mechanism. Finally, according to the result of credible judgment, the authors could decide whether it will be switched from the master server to the backup server.

[1]  S. Srinivasan,et al.  Cloud Computing Security , 2014 .

[2]  James A. Thom,et al.  Cloud Computing Security: From Single to Multi-clouds , 2012, 2012 45th Hawaii International Conference on System Sciences.

[3]  Lin Chuang,et al.  Quantitative Analysis of Trust Evidence in Internet , 2006, 2006 International Conference on Communication Technology.

[4]  Walid Saad,et al.  Game theoretic modeling of cooperation among service providers in mobile cloud computing environments , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).

[5]  Ching-Hsien Hsu,et al.  Cloud Computing Technology and Science , 2013, Int. J. Grid High Perform. Comput..

[6]  Wei Jie,et al.  Cloud Computing Security: Opportunities and Pitfalls , 2012, Int. J. Grid High Perform. Comput..

[7]  Yang Yang Model and Analysis of User Behavior Based on Dynamic Game Theory in Cloud Computing , 2011 .

[8]  Jonathan T. Trostle,et al.  Protecting Against Distributed Denial of Service (DDoS) Attacks Using Distributed Filtering , 2006, 2006 Securecomm and Workshops.

[9]  Yin Cheng-guo Evaluating network user behavior trust based on multiple decisions attributes , 2011 .

[10]  Pan Ning Research on behavior trust evaluation model of cloud services based on membership theory , 2013 .

[11]  Sun Shan-shan Trust Evaluation and Control Analysis of FANP-based User Behavior in Cloud Computing Environment , 2013 .

[12]  Graça Bressan,et al.  A Continuous Authentication System Based on User Behavior Analysis , 2010, 2010 International Conference on Availability, Reliability and Security.

[13]  Markus Jakobsson,et al.  Implicit Authentication through Learning User Behavior , 2010, ISC.

[14]  Xiao De-bao,et al.  Design and Implementation of Cloud Monitoring System Based on Server Clusters , 2012 .