Chandan Banerjee, A. Kundu, Moitree Basu, P. Deb, Devtapa Nag, R. Dattagupta
{"title":"基于服务的云安全信任管理分类器方法","authors":"Chandan Banerjee, A. Kundu, Moitree Basu, P. Deb, Devtapa Nag, R. Dattagupta","doi":"10.1109/ICACT.2013.6710519","DOIUrl":null,"url":null,"abstract":"In this paper, we have proposed a framework for cloud data security which is capable of securing users' data, such that malicious user is detected quickly. The domain remains unaffected in worst case scenario. In this method, we have introduced a new constant value for classification that can automatically be redirected to access the requests for the corresponding cluster. Each service type has its own range of action value based on the user. Weight of the action has been calculated and once a user of trusted or innocent region does the same malicious work repeatedly, the user would be directly transferred to non-trusted user region and the data would remain un-available to the user, if and only if the threshold value of tolerance is reached. In this work, a service based trust management classifier approach is proposed for cloud security.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"A service based trust management classifier approach for cloud security\",\"authors\":\"Chandan Banerjee, A. Kundu, Moitree Basu, P. Deb, Devtapa Nag, R. Dattagupta\",\"doi\":\"10.1109/ICACT.2013.6710519\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we have proposed a framework for cloud data security which is capable of securing users' data, such that malicious user is detected quickly. The domain remains unaffected in worst case scenario. In this method, we have introduced a new constant value for classification that can automatically be redirected to access the requests for the corresponding cluster. Each service type has its own range of action value based on the user. Weight of the action has been calculated and once a user of trusted or innocent region does the same malicious work repeatedly, the user would be directly transferred to non-trusted user region and the data would remain un-available to the user, if and only if the threshold value of tolerance is reached. In this work, a service based trust management classifier approach is proposed for cloud security.\",\"PeriodicalId\":302640,\"journal\":{\"name\":\"2013 15th International Conference on Advanced Computing Technologies (ICACT)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 15th International Conference on Advanced Computing Technologies (ICACT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICACT.2013.6710519\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACT.2013.6710519","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A service based trust management classifier approach for cloud security
In this paper, we have proposed a framework for cloud data security which is capable of securing users' data, such that malicious user is detected quickly. The domain remains unaffected in worst case scenario. In this method, we have introduced a new constant value for classification that can automatically be redirected to access the requests for the corresponding cluster. Each service type has its own range of action value based on the user. Weight of the action has been calculated and once a user of trusted or innocent region does the same malicious work repeatedly, the user would be directly transferred to non-trusted user region and the data would remain un-available to the user, if and only if the threshold value of tolerance is reached. In this work, a service based trust management classifier approach is proposed for cloud security.