Computer Science ›› 2017, Vol. 44 ›› Issue (12): 105-113.doi: 10.11896/j.issn.1002-137X.2017.12.021

Previous Articles     Next Articles

Safety Assessment of User Behaviors under Environment of Cloud Computing Based on Improved VIKOR Method

LI Cun-bin, LIN Shuai-shuai and XU Fang-qiu   

  • Online:2018-12-01 Published:2018-12-01

Abstract: Cloud computing brings great convenience and reduces the cost to the cloud users for the use of resources.But it also makes it possible for illegal users to get core and privacy data easily.Therefore,the analysis and evaluation of user behavior is the key to effectively improve the security of the cloud.Firstly,according to the characteristics of user behavior under the environment of cloud computing,the evaluation index system was established.Then,an improved VIKOR method based on AHP-entropy weight method was proposed to overcome the shortcomings of subjective and objective weighting method.Finally,five users was selected for case analysis.Comparative analysis with other comprehensive evaluation methods shows that the proposed method is scientific and effective,and has some advantages.

Key words: Cloud computing,Behavior safety,VIKOR,Ranking

[1] CHANG V,WALTERS R J,WILLS G B.Organisational sus-tainability modelling An emerging service and analytics model for evaluating Cloud Computing adoption with two case studies [J].International Journal of Information Management,2016,36(1):167-179.
[2] JERMAIN C L,ROWLANDS G E,BUHRMAN R A.GPU-accelerated micromagnetic simulations using cloud computing [J].Journal of Magnetism and Magnetic Materials,2016,401(1):320-322.
[3] WANG D W.Basic Framework and Key Technology for a New Generation of Data Center in Electric Power Corporation Based on Cloud Computation[J].Automation of Electric Power System,2012,6(11):15-19.(in Chinese) 王德文.基于云计算的电力数据中心基础架构及其关键技术[J].电力系统自动化,2012,6(11):15-19.
[4] YANG S L,LUO H,DING S.Survey on multi-sources information service system based on cloud computing[J].Journal of Management Science in China,2012,15(5):83-96.(in Chinese) 杨善林,罗贺,丁帅.基于云计算的多源信息服务系统研究综述[J].管理科学学报,2012,15(5):83-96.
[5] BETH T,BORCHERDING M,KLEINlein B.Valuation of trust in open networks[M]∥Computer Security-ESORICS’94.Springer Berlin Heidelberg,1994:3-18.
[6] JOSANG A.The right type of trust for distributed systems[C]∥Proceedings of the Workshop on New Security Paradigms.Lake Arrowhead,Ca,United States,1996:119-131.
[7] SHAMELI-SENDI A,CHERIET M.Cloud Computing:A Risk Assessment Model[C]∥2014 IEEE International Conference on Cloud Engineering.2014:147-152.
[8] THEODORAKOPOULOS G.Distributed trust evaluation in adhoc networks[D].Maryland:University of Maryland,2004.
[9] THEODORAKOPOULOS G,BARAS J S.On trust models and trust evaluation metrics for adhoc networks[J].IEEE Journal on Selected Areas in Communications,2006,24(2):318-328.
[10] FURUNCU E,SOGUKPINAR I.Scalable risk assessment me-thod for cloud computing using game theory(CCRAM)[J].Computer Standards & Interfaces,2015,8(2):44-50.
[11] LI X Y,GUI X L.Trust Quantitative Model with Multiple Decision Factors in Trusted Network[J].Chinese Journal of Computers,2009,2(3):405-416.(in Chinese) 李小勇,桂小林.可信网络中基于多维决策属性的信任量化模型[J].计算机学报,2009,32(3):405-416.
[12] CHEN H.An Information Security Risk Assessment Frame-work For Cloud Computing [J].Advanced Materials Research,2013,756-759:1469-1473.
[13] LV Y X,TIAN L Q,SUN S S.Trust Evaluation and Control Analysis of FANP-based User Behavior in Cloud Computing Environment[J].Computer Science,2013,0(1):132-135.(in Chinese) 吕艳霞,田立勤,孙珊珊.云计算环境下基于FANP 的用户行为的可信评估与控制分析[J].计算机科学,2013,40(1):132-135.
[14] GUO S K,TIAN L Q,SHEN X L.Research on FAHP method in user behaviour trust computation[J].Computer Engineering and Applications,2011,7(12):59-61.(in Chinese) 郭树凯,田立勤,沈学利.FAHP在用户行为信任评价中的研究[J].计算机工程与应用,2011,47(12):59-61.
[15] SUO W L.Method for uncertain linguistic multiple attributegroup decision making based on extended VIKOR[J].Control and Decision,2013,28(9):1431-1440.(in Chinese)索玮岚.基于扩展VIKOR的不确定语言多属性群决策方法.[J].控制与决策,2013,28(9):1431-1440.
[16] ZHANG S,WANG T,GU X P.Synthetic Evaluation of Power Grid Operating States Based on Intuitionistic Fuzzy Analytic Hie-rarchy Process[J].Automation of Electric Power System,2016(4):41-49.(in Chinese) 张尚,王涛,顾雪平.基于直觉模糊层次分析法的电网运行状态综合评估[J].电力系统自动化,2016(4):41-49.
[17] XIE M,DENG J L,LIU M B,et al.Temperature-lowering Load Estimation Method Based on Meteorological Data and Entropy Weight Theory[J].Automation of Electric Power System,2016(3):135-139.(in Chinese) 谢敏,邓佳梁,刘明波,等.基于气象信息和熵权理论的降温负荷估算方法[J].电力系统自动化,2016(3):135-139.
[18] WANG C.Trust Evaluation Based on User’s Behavion in Cloud Computing[D].Baotou:Inner Mongolia University of Science & Technology,2015.(in Chinese) 王超.云计算环境下基于用户行为的信任评估研究[D].包头:内蒙古科技大学,2015.
[19] LOURENZUTTI R,KROHLING R A.A generalized TOPSIS method for group decision making with heterogeneous information in a dynamic environment[J].Information Sciences,2016,330:1-18.
[20] LI C B,YUAN J H ,QI Z Q.Investment Risk-Based Decision of Distributed Generation Based on Grey Cumulative Prospect Theory [J].East China Electric Power,2014,42(5):993-998.(in Chinese) 李存斌,苑嘉航,祁之强.基于灰色累积前景理论分布式电源投资风险型决策[J].华东电力,2014,2(5):993-998.
[21] XU W H,CHEN H Y,ZHANG Y P,et al.Fuzzy Comprehensive Evaluation Method Based on Measure of Medium Truth Degree [J].Computer Science,2016,43(2):204-209.(in Chinese) 徐文华,陈海燕,张育平,等.一种基于中介真值程度度量的模糊综合评价方法[J].计算机科学,2016,3(2):204-209.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!