4 TRUST HIERARCHY BASED
ON BEHAVIOR MODELING
4.1 The Basic Idea of Trust Model
based on Behavior
Trust hierarchy based on behavior model's basic idea
is through behavior, or is the result of an entity
arising out of acts, the trusted values obtained from
the General computing entity, and on this basis to
determine or change the trust level of an entity,
further changes to the current entity roles and
permissions, in order to achieve a single entity or
even the whole cloud computing systems are
monitored and protected. Principle is shown in
Figure 1.
4.2 Trust Model based on Behavior
Management Strategies
This model in cloud server in the of entity of trust
grade by a Trust Center to unified management,
dang user login cloud server completed identity
validation Hou, Trust Center will view user of
current trust grade, if trust grade below minimum
service grade (minimum service grade, that critical
grade, if trust grade again declined, server on
refused to the user using), is cloud server will
refused to for user through cloud service; actual
operations in the, dang user trust grade was reduced
to minimum service grade Shi will received warned
information If trust levels belonging to the service
level, Trust Center will notify the cloud continues to
provide cloud services. Cloud in cloud services to
provide users in the process also will monitor and
audit user actions, users of a variety of risk
behaviors (such as entity attempts unauthorized
operations) can be recorded, through analysis and
calculations, changing the user's trusted, and has the
potential to affect the trust level, and change the user
role properties, permissions will be reassigned.
Adoption of this model is the core of credible entity
acts as well as changes in trust level, which affects
the user permissions.
5 USER-TRUSTED VALUE
CALCULATION METHOD
5.1 User Behavioral Evidence
Acquisition
Credible terms in this article are based on entity
behaviors, or is an entity acts as a result of the entity.
Cloud services providers can be based directly on
hardware and software detection method to obtain
the user's behavior, to quantitative assessment of
consumer confidence in the overall behavior of
Foundation for cloud computing services value the
result itself is objective, does not have the subjective
characteristics of trust. Cloud computing service
provider has the right to full control over cloud
resources, trade secrets and privacy of users and
cloud-based services as well as external purposes
provided by considering the cloud service providers
must not view the user's data content, are virtually
impossible to vast amounts of data for detailed
inspection. However, the huge monitor relies on user
behavior characteristic of network traffic and find
statistics of users ' behavior. Currently available for
obtaining user behavior evidence there are main
methods of the following kinds:
(1) use network traffic monitoring and analysis
tools, such as the Bandwidthdl, each gateway
protocols are available for more lP flow, view
network status, such as: the rate of packet
transmission and reception.
(2) use intrusion detection systems currently
available, such as RealSecttr, can obtain access
times, operating failures and delays.
(3) using the audit trail system to generate system
event log and record user behavior, including system
Ft log Ft log records, applications, network
management, and audit logs capture user data
packets, and accordingly records.
(4) according to the Protocol (for example,
RMON,SNMP) of developed software.
(5) with hardware access to evidence, such as the
NetScout2 company's hardware probe
(6) not detected evidence that other methods may
be used for research, for example, can be based on
evidence of previous users reasoning and prediction.
5.2 User Behavior Trust Hierarchy
Entity representation of the result mainly in the
following three ways:
(1) percentages. Including user behavior and a
similar level expressed as a percentage of the
common attacks, less qualified, credible level
percentage greater trust levels higher.
(2) a Boolean. Only two trust levels. Exists, then
the trusted level 1 of the project; does not exist, then
the project credible level of 0.
(3) specific value within a certain range.
According to an action by a range of properties for
ranking.
ISME 2015 - Information Science and Management Engineering III
102