2018 International Conference on Computational Science and Computational Intelligence (CSCI) 2018
DOI: 10.1109/csci46756.2018.00259
|View full text |Cite
|
Sign up to set email alerts
|

User Behavior Trust Modeling in Cloud Security

Abstract: With the cloud computing increasing in popularity by providing a massive number of services such as recourses and data center, the number of attacks is increasing. Security is a basic concern in cloud computing, and threats can occur both internally and externally. Users can access the cloud infrastructure for software, operating systems, and network infrastructure provided by the cloud service providers (CSPs). Evaluating users' behavior in the cloudcomputing infrastructure is becoming more important for both… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 51 publications
0
1
0
Order By: Relevance
“…How might a system know if a user is trustworthy even if authenticated and granted access? One approach is to monitor specific user behaviors [1]. The list below illustrates some behaviors on the part of a user that could easily be associated with untrustworthiness.…”
Section: Monitoring Systems and Trustmentioning
confidence: 99%
“…How might a system know if a user is trustworthy even if authenticated and granted access? One approach is to monitor specific user behaviors [1]. The list below illustrates some behaviors on the part of a user that could easily be associated with untrustworthiness.…”
Section: Monitoring Systems and Trustmentioning
confidence: 99%