Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User behavior based cross-cloud authentication service method

A service method and cloud certification technology, which is applied in the field of cloud service security certification, can solve problems such as hazards and trust evaluation results that are not stable and representative, and achieve the effect of improving security assurance

Active Publication Date: 2014-12-10
GUANGXI UNIV
View PDF4 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The technical problem to be solved by the present invention is to overcome the lack of prevention of malicious users with legitimate identities who have been hiding their identities to carry out harmful behaviors in the prior art, as well as the lack of stability and representativeness of the trust evaluation results due to insufficient user interaction behavior data, etc., Provide a safe and reliable identity authentication method and mechanism to solve the identity authentication problem between users and multiple different cloud service platforms, and collect user interaction behaviors of users on different cloud service platforms, provide reliable user behavior credit evaluation, and be able to Reduce the risk of illegal access to cloud service platform resources by legitimate users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User behavior based cross-cloud authentication service method
  • User behavior based cross-cloud authentication service method
  • User behavior based cross-cloud authentication service method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention is described in detail below in conjunction with accompanying drawing

[0040] like figure 1 As shown, the whole authentication process of the user behavior-based identity authentication service of the present invention is as follows:

[0041] (1) Accept identity authentication requests by providing user authentication interfaces for each cloud service platform;

[0042](2) Obtain the latest behavior data of the user, and send a request to the cloud service platform to collect the latest behavior data of the specified user, and each cloud service platform analyzes the user's latest interactive behavior and extracts its real-time behavior data and uses it as the legality judgment of the user's identity According to, the real-time behavior data of the user is pushed to the user authentication interface module, and the interface analyzes and processes the received user behavior data;

[0043] (3) The user authentication module classifies and organiz...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a user behavior based cross-cloud authentication service method. The method includes the steps of collecting user behavior data, performing user trust management based on user behaviors, and providing a user behavior based identity authentication service. In order to achieve mutual trust between users and service providers in the cloud computing mode, a handling scheme is provided in terms of user behavior analysis, user behavior learning, user behavior authentication and the like, and the user behavior based cross-cloud authentication service method is established. Behaviors of users under different cloud service platforms are collected, overall trusts of the users are estimated, and accordingly, the problem that the users have different trusts in different public clouds is solved and reliable basis is provided for access control for users crossing multiple cloud service platforms. Meanwhile, in order to solve the problem that user identities are trustable but behaviors are not necessarily trustable, a solution for user behavior identity authentication according to the behaviors of users under different cloud service platforms is provided, and a trusted safeguard infrastructure is provided for a cloud application system.

Description

technical field [0001] The invention provides a cloud authentication service method based on user behavior, which belongs to the field of cloud service security authentication. Background technique [0002] Cloud computing is an Internet-based computing generic that can provide hardware services, infrastructure services, platform services, software services, storage services, etc. to various Internet applications. In the cloud computing model, data is stored in the cloud, and applications and services are stored in the cloud, making full use of cloud computing capabilities to meet user business needs. During the promotion and application of cloud computing, security risks have been valued by all parties. Cloud computing security protection includes basic security services such as authority control, authentication services, security audits, and configuration management. The trust issue between cloud users and cloud service providers is one of the key issues in the developme...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 陈宁江朱莉蓉黄汝维谭瑛何子龙李湘贾炅昊
Owner GUANGXI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products