Computer Science ›› 2014, Vol. 41 ›› Issue (4): 120-125.

Previous Articles     Next Articles

User Behavior Analysis Model Based on Game Theory under Multi-clouds Environment

NIE Ting-ting and GUO Yu-cui   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Aiming at the situation of lacking research on Distributed Denial of Service (DDoS) attack under multi-clouds environment,a user behavior analysis model based on game theory under multi-clouds environment was proposed from the perspective of cloud service provider.The model firstly constructs a payoff matrix based on game theory,and then it judges user behavior through fuzzy membership function,and evaluates the resource consumption and profit of cloud service provider under non-cooperation and cooperation scenarios.Simulations show that the proposed cooperation model can reduce resource consumption,lower the risk of DDoS attack for cloud service providers,and prompt the profit of each resource unit for more than three times,which takes an effective significance.

Key words: Cloud computing,Multi-clouds,Fuzzy membership function,Game theory,Cooperation

[1] 陈康,郑纬民.云计算:系统实例与研究现状[J].软件学报,2009,20(5):1337-1348
[2] Alok T,Abhinav M.Cloud Computing Security Considerations[C]∥IEEE ISCPCC.Xian,China,2011:1-5
[3] AlZain M A,Pardede E,Soh B,et al.Cloud Computing Security:From Single to Multi-Clouds[C]∥HICSS.Hawaii,USA,2012:5490-5499
[4] AlZain M A,Soh B,Pardede E.MCDB:Using Multi-Clouds to Ensure Security in Cloud Computing[C]∥DASC. Sydney,Australia,2011:784-791
[5] Trostle J.Protecting Against Distributed Denial of service at-tacks Using Distributed Filtering[C]∥Securecomm and Workshops. Baltimore,USA,2006:1-11
[6] Bhaskaran M,Natrarajan A M,Sivanandam S N.Tracebacking the Spoofed IP Packets in Multi ISP Domains with Secured Communication[C]∥ICSCN.Chennai,India,2007:579-584
[7] Joshi B,Vijayan A S,Joshi B K.Securing Cloud Computing Environment Against DDoS Attacks[C]∥ ICCCI.Coimbatore,India,2012:1-5
[8] 陈亚睿,田立勤,杨扬.云计算环境下基于动态博弈论的用户行为模型与分析[J].电子学报,2011,8:1818-1823
[9] Niyato D,Vasilakos A V.Resource and Revenue Sharing withCoalition Formation of Cloud Providers:Game Theoretic Approach[C]∥CCGrid.Newport Beach,CA,USA,2011:215-224
[10] Karnwal T,Sivakumar T,Aghila G.A Comber Approach toProtect Cloud Copmputing against XML DDoS and HTTP DDoS attack[C]∥SCEECS,Bhopal,India,2012:1-5
[11] Chen Qi,Lin Wen-min,Dou Wan-chun,et al.CBF:A Packet Filtering Method for DDoS Attack Defense in Cloud Environment[C]∥DASC.Sydney,Australia,2011:427-434
[12] 谢立军,朱智强,孙磊,等.基于隶属度理论的云服务行为信任评估模型研究[J].计算机应用研究,2012,30(4):1051-1054
[13] Niyato D,Wang P,Hossain E,et al.Game Theoretic Modeling of Cooperation among Service Providers in Mobile Cloud Computing Environments[C]∥WCNC.Shanghai,China,2012:3128-3133
[14] 张维迎.博弈论与信息经济学[M].上海:上海人民出版社,2004

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!