计算机科学 ›› 2017, Vol. 44 ›› Issue (12): 105-113.doi: 10.11896/j.issn.1002-137X.2017.12.021

• 信息安全 • 上一篇    下一篇

基于改进VIKOR法的云计算环境下用户行为安全的评估研究

李存斌,蔺帅帅,徐方秋   

  1. 华北电力大学经济与管理学院 北京102206,华北电力大学经济与管理学院 北京102206,华北电力大学经济与管理学院 北京102206
  • 出版日期:2018-12-01 发布日期:2018-12-01
  • 基金资助:
    本文受国家自然科学基金(71671065,4),国家电网公司总部科技项目:含大规模新能源和高压直流输电的电力系统风险评估研究(5204BB1600CN),中央高校基本科研业务费专项资助

Safety Assessment of User Behaviors under Environment of Cloud Computing Based on Improved VIKOR Method

LI Cun-bin, LIN Shuai-shuai and XU Fang-qiu   

  • Online:2018-12-01 Published:2018-12-01

摘要: 云计算极大地方便了云端用户对资源的使用,降低了用户为使用存储资源耗费的成本,但也使用户的核心和隐私数据极有可能被非法用户利用,因此对用户行为进行分析评估是有效提升云安全的关键。首先,根据云计算环境下用户行为的特点,建立了评价指标体系;然后,提出了一种基于AHP-熵权法的改进VIKOR法的多属性决策方法,克服了主客观赋权法的缺点;最后,以5个用户为例进行算例分析,并将所提方法与其他综合评价方法进行了对比分析。结果表明,所提出的方法是科学、有效的,具有一定的优越性。

关键词: 云计算,行为安全,VIKOR,排序

Abstract: Cloud computing brings great convenience and reduces the cost to the cloud users for the use of resources.But it also makes it possible for illegal users to get core and privacy data easily.Therefore,the analysis and evaluation of user behavior is the key to effectively improve the security of the cloud.Firstly,according to the characteristics of user behavior under the environment of cloud computing,the evaluation index system was established.Then,an improved VIKOR method based on AHP-entropy weight method was proposed to overcome the shortcomings of subjective and objective weighting method.Finally,five users was selected for case analysis.Comparative analysis with other comprehensive evaluation methods shows that the proposed method is scientific and effective,and has some advantages.

Key words: Cloud computing,Behavior safety,VIKOR,Ranking

[1] CHANG V,WALTERS R J,WILLS G B.Organisational sus-tainability modelling An emerging service and analytics model for evaluating Cloud Computing adoption with two case studies [J].International Journal of Information Management,2016,36(1):167-179.
[2] JERMAIN C L,ROWLANDS G E,BUHRMAN R A.GPU-accelerated micromagnetic simulations using cloud computing [J].Journal of Magnetism and Magnetic Materials,2016,401(1):320-322.
[3] WANG D W.Basic Framework and Key Technology for a New Generation of Data Center in Electric Power Corporation Based on Cloud Computation[J].Automation of Electric Power System,2012,6(11):15-19.(in Chinese) 王德文.基于云计算的电力数据中心基础架构及其关键技术[J].电力系统自动化,2012,6(11):15-19.
[4] YANG S L,LUO H,DING S.Survey on multi-sources information service system based on cloud computing[J].Journal of Management Science in China,2012,15(5):83-96.(in Chinese) 杨善林,罗贺,丁帅.基于云计算的多源信息服务系统研究综述[J].管理科学学报,2012,15(5):83-96.
[5] BETH T,BORCHERDING M,KLEINlein B.Valuation of trust in open networks[M]∥Computer Security-ESORICS’94.Springer Berlin Heidelberg,1994:3-18.
[6] JOSANG A.The right type of trust for distributed systems[C]∥Proceedings of the Workshop on New Security Paradigms.Lake Arrowhead,Ca,United States,1996:119-131.
[7] SHAMELI-SENDI A,CHERIET M.Cloud Computing:A Risk Assessment Model[C]∥2014 IEEE International Conference on Cloud Engineering.2014:147-152.
[8] THEODORAKOPOULOS G.Distributed trust evaluation in adhoc networks[D].Maryland:University of Maryland,2004.
[9] THEODORAKOPOULOS G,BARAS J S.On trust models and trust evaluation metrics for adhoc networks[J].IEEE Journal on Selected Areas in Communications,2006,24(2):318-328.
[10] FURUNCU E,SOGUKPINAR I.Scalable risk assessment me-thod for cloud computing using game theory(CCRAM)[J].Computer Standards & Interfaces,2015,8(2):44-50.
[11] LI X Y,GUI X L.Trust Quantitative Model with Multiple Decision Factors in Trusted Network[J].Chinese Journal of Computers,2009,2(3):405-416.(in Chinese) 李小勇,桂小林.可信网络中基于多维决策属性的信任量化模型[J].计算机学报,2009,32(3):405-416.
[12] CHEN H.An Information Security Risk Assessment Frame-work For Cloud Computing [J].Advanced Materials Research,2013,756-759:1469-1473.
[13] LV Y X,TIAN L Q,SUN S S.Trust Evaluation and Control Analysis of FANP-based User Behavior in Cloud Computing Environment[J].Computer Science,2013,0(1):132-135.(in Chinese) 吕艳霞,田立勤,孙珊珊.云计算环境下基于FANP 的用户行为的可信评估与控制分析[J].计算机科学,2013,40(1):132-135.
[14] GUO S K,TIAN L Q,SHEN X L.Research on FAHP method in user behaviour trust computation[J].Computer Engineering and Applications,2011,7(12):59-61.(in Chinese) 郭树凯,田立勤,沈学利.FAHP在用户行为信任评价中的研究[J].计算机工程与应用,2011,47(12):59-61.
[15] SUO W L.Method for uncertain linguistic multiple attributegroup decision making based on extended VIKOR[J].Control and Decision,2013,28(9):1431-1440.(in Chinese)索玮岚.基于扩展VIKOR的不确定语言多属性群决策方法.[J].控制与决策,2013,28(9):1431-1440.
[16] ZHANG S,WANG T,GU X P.Synthetic Evaluation of Power Grid Operating States Based on Intuitionistic Fuzzy Analytic Hie-rarchy Process[J].Automation of Electric Power System,2016(4):41-49.(in Chinese) 张尚,王涛,顾雪平.基于直觉模糊层次分析法的电网运行状态综合评估[J].电力系统自动化,2016(4):41-49.
[17] XIE M,DENG J L,LIU M B,et al.Temperature-lowering Load Estimation Method Based on Meteorological Data and Entropy Weight Theory[J].Automation of Electric Power System,2016(3):135-139.(in Chinese) 谢敏,邓佳梁,刘明波,等.基于气象信息和熵权理论的降温负荷估算方法[J].电力系统自动化,2016(3):135-139.
[18] WANG C.Trust Evaluation Based on User’s Behavion in Cloud Computing[D].Baotou:Inner Mongolia University of Science & Technology,2015.(in Chinese) 王超.云计算环境下基于用户行为的信任评估研究[D].包头:内蒙古科技大学,2015.
[19] LOURENZUTTI R,KROHLING R A.A generalized TOPSIS method for group decision making with heterogeneous information in a dynamic environment[J].Information Sciences,2016,330:1-18.
[20] LI C B,YUAN J H ,QI Z Q.Investment Risk-Based Decision of Distributed Generation Based on Grey Cumulative Prospect Theory [J].East China Electric Power,2014,42(5):993-998.(in Chinese) 李存斌,苑嘉航,祁之强.基于灰色累积前景理论分布式电源投资风险型决策[J].华东电力,2014,2(5):993-998.
[21] XU W H,CHEN H Y,ZHANG Y P,et al.Fuzzy Comprehensive Evaluation Method Based on Measure of Medium Truth Degree [J].Computer Science,2016,43(2):204-209.(in Chinese) 徐文华,陈海燕,张育平,等.一种基于中介真值程度度量的模糊综合评价方法[J].计算机科学,2016,3(2):204-209.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!