4 TRUST HIERARCHY BASED 
ON BEHAVIOR MODELING 
4.1  The Basic Idea of Trust Model 
based on Behavior  
Trust hierarchy based on behavior model's basic idea 
is through behavior, or is the result of an entity 
arising out of acts, the trusted values obtained from 
the General computing entity, and on this basis to 
determine or change the trust level of an entity, 
further changes to the current entity roles and 
permissions, in order to achieve a single entity or 
even the whole cloud computing systems are 
monitored and protected. Principle is shown in 
Figure 1. 
4.2  Trust Model based on Behavior 
Management Strategies 
 This model in cloud server in the of entity of trust 
grade by a Trust Center to unified management, 
dang user login cloud server completed identity 
validation Hou, Trust Center will view user of 
current trust grade, if trust grade below minimum 
service grade (minimum service grade, that critical 
grade, if trust grade again declined, server on 
refused to the user using), is cloud server will 
refused to for user through cloud service; actual 
operations in the, dang user trust grade was reduced 
to minimum service grade Shi will received warned 
information If trust levels belonging to the service 
level, Trust Center will notify the cloud continues to 
provide cloud services. Cloud in cloud services to 
provide users in the process also will monitor and 
audit user actions, users of a variety of risk 
behaviors (such as entity attempts unauthorized 
operations) can be recorded, through analysis and 
calculations, changing the user's trusted, and has the 
potential to affect the trust level, and change the user 
role properties, permissions will be reassigned. 
Adoption of this model is the core of credible entity 
acts as well as changes in trust level, which affects 
the user permissions. 
5 USER-TRUSTED VALUE 
CALCULATION METHOD 
5.1  User Behavioral Evidence 
Acquisition 
Credible terms in this article are based on entity  
behaviors, or is an entity acts as a result of the entity. 
Cloud services providers can be based directly on 
hardware and software detection method to obtain 
the user's behavior, to quantitative assessment of 
consumer confidence in the overall behavior of 
Foundation for cloud computing services value the 
result itself is objective, does not have the subjective 
characteristics of trust. Cloud computing service 
provider has the right to full control over cloud 
resources, trade secrets and privacy of users and 
cloud-based services as well as external purposes 
provided by considering the cloud service providers 
must not view the user's data content, are virtually 
impossible to vast amounts of data for detailed 
inspection. However, the huge monitor relies on user 
behavior characteristic of network traffic and find 
statistics of users ' behavior. Currently available for 
obtaining user behavior evidence there are main 
methods of the following kinds: 
(1) use network traffic monitoring and analysis 
tools, such as the Bandwidthdl, each gateway 
protocols are available for more lP flow, view 
network status, such as: the rate of packet 
transmission and reception. 
 (2) use intrusion detection systems currently 
available, such as RealSecttr, can obtain access 
times, operating failures and delays. 
 (3) using the audit trail system to generate system 
event log and record user behavior, including system 
Ft log Ft log records, applications, network 
management, and audit logs capture user data 
packets, and accordingly records. 
 (4) according to the Protocol (for example, 
RMON,SNMP) of developed software. 
 (5) with hardware access to evidence, such as the 
NetScout2 company's hardware probe 
 (6) not detected evidence that other methods may 
be used for research, for example, can be based on 
evidence of previous users reasoning and prediction. 
5.2  User Behavior Trust Hierarchy  
Entity representation of the result mainly in the 
following three ways: 
(1) percentages. Including user behavior and a 
similar level expressed as a percentage of the 
common attacks, less qualified, credible level 
percentage greater trust levels higher. 
 (2) a Boolean. Only two trust levels. Exists, then 
the trusted level 1 of the project; does not exist, then 
the project credible level of 0. 
 (3) specific value within a certain range. 
According to an action by a range of properties for 
ranking.
ISME 2015 - Information Science and Management Engineering III
102