User Behaviour Authentication Model Based on Stochastic Petri Net in Cloud Environment

Cloud Computing has been developing rapidly and has impacted various aspects of our daily life. However, the growth of cloud service raises concerns about its security. This paper will be focussing on user identity authentication issues in the cloud environment. Through analysing and classifying user behaviours, we propose a Stochastic Petri net-based User Behaviour Authentication model (SPUBA), which uses the behaviour of a user while logging in and browsing to analyse user behaviour credibility. Also, in order to quantify user behaviour credibility, we have modified a K-modes algorithm to solve user habitual behavioural standard, proposed an algorithm for calculating user behaviour credibility. The user operational behaviours simulations has been performed in the cloud environment to analyse the execution time of the proposed model. The results regarding the detection and false positive rates shown are better than current models.

[1]  Yongfeng Huang,et al.  Efficient association rule mining algorithm based on user behavior for cloud security auditing , 2016, 2016 IEEE International Conference of Online Analysis and Computing Science (ICOACS).

[2]  Tian Junfeng,et al.  A Cloud User Behavior Authentication Model Based on Multi-Partite Graphs , 2014 .

[3]  Anis Ahmed-Nacer,et al.  Strong authentication for mobile cloud computing , 2016, 2016 13th International Conference on New Technologies for Distributed Systems (NOTERE).

[4]  Yuh-Jye Lee,et al.  Frequent Pattern Based User Behavior Anomaly Detection for Cloud System , 2013, 2013 Conference on Technologies and Applications of Artificial Intelligence.

[5]  Chuang Lin,et al.  Privacy Petri Net and Privacy Leak Software , 2015, Journal of Computer Science and Technology.

[6]  Tian Li-qin,et al.  Modeling and Performance Analysis of User Behavior Authentication Using Stochastic Petri Nets , 2012, 2012 International Conference on Industrial Control and Electronics Engineering.

[7]  Aida Shojaee,et al.  A new method for evaluating cloud computing user behavior trust , 2015, 2015 7th Conference on Information and Knowledge Technology (IKT).

[8]  Athanasios V. Vasilakos,et al.  A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions , 2015, J. Comput. Sci. Eng..

[9]  Yang Yang Modeling and Analysis of Dynamic User Behavior Authentication Scheme in Cloud Computing , 2011 .

[10]  Graça Bressan,et al.  A Continuous Authentication System Based on User Behavior Analysis , 2010, 2010 International Conference on Availability, Reliability and Security.

[11]  Xin Lu,et al.  An user behavior credibility authentication model in cloud computing environment , 2014, Proceedings of 2nd International Conference on Information Technology and Electronic Commerce.

[12]  Karan Saxena,et al.  Hindrances in the security of Cloud Computing , 2016, 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence).

[13]  T. Senthil Kumar,et al.  Improvised Classification Model for Cloud Based Authentication Using Keystroke Dynamics , 2014, FCC.

[14]  Wei Dai,et al.  A Study on Analysis Engine for Large-scale User Behavior based on Cloud Computing , 2014, MUE 2014.

[15]  Galoh Rashidah Haron,et al.  Adaptive authentication based on analysis of user behavior , 2014, 2014 Science and Information Conference.

[16]  Jie Fang Mining Analysis on User Search Behavior Based on Hadoop , 2016 .

[17]  Li Jun-Jian,et al.  User's Behavior Trust Evaluate Algorithm Based on Cloud Model , 2015, 2015 Fifth International Conference on Instrumentation and Measurement, Computer, Communication and Control (IMCCC).

[18]  Haitao Tang,et al.  User Identity Authentication Based on the Combination of Mouse and Keyboard Behavior , 2016 .