Abstract
In the process of using the cloud platform, how to ensure the safety of users is a matter we must concern. The user authentication can provide a certain degree of security, but when the user information was leaked, this method will not be effective. Therefore, this article proposes a trust evaluation model based on user behavior data. In this model, the user’s historical behavior will be used to construct a set of trusted behavior of the cloud users. On this basis, the direct trust of the user’s behavior can be obtained. Then, the recommendation trust can be calculated by the interaction between the users and other cloud users. Given the current historical trust, the comprehensive trust can be obtained using the weighted average method. Among them, the initial value of historical trust is set to a constant and then updated by the comprehensive trust. In order to control the user’s abnormal behavior more effectively, the suspicious threshold value and the abnormal threshold value were defined, which are used to punish the historical trust. Through the simulation of the virtual digital library cloud platform, the method can effectively evaluate the cloud users.
Introduction
Cloud computing presents a new service model, connected by a huge system pool together, to provide users with a variety of storage and computing resources. It has become one of the major trends in today’s IT development. Because of its ease of use, easy to expand, on-demand features, it attracted a lot of personal and business users. In the course of its use, safety is a major challenge. On one hand is credible, reliable cloud service provider problem, and the other is faced with security threats cloud users. 1 Thus, in the process of application and research of cloud computing, how to solve the security problems faced will be a long and important research priority.
The cloud platform is a service-oriented architecture and contains three standard models: infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). With the explosive growth of cloud users and service content, the security of the cloud platform is getting more and more attention. Moreover, the diversity of cloud users and user’s behavior makes the security problems of the cloud platform more prominent. Furthermore, the exception of the user will bring about the abnormal access and privacy of the data. Therefore, it is necessary to develop measures to ensure data security and detect user abnormality.
The motivation in this work is based on the idea that the trust value of cloud user can be reflected by the user’s behavior. For example, consider the case of a user that is abnormal. It will bring abnormal behavior In fact, any application scenarios that involves user access can be supported by such a framework.
Our trust model can be thought of as a simple form of anomaly detection. The basis of detection depends on the degree of trust. The computation and storage of trust value are all located on the cloud platform. Therefore, the reliability of the trust value is guaranteed.
Our proposal has the following advantages. First, the realization is simple, and it is easy to deploy in a cloud environment. Second, the trust value is dynamic and can cope with the changing environment. Third, the user behavior plays a key role in the calculation of the trust value.
The rest of the article is organized as follows. This article first introduces security research in cloud computing environment. Then, the behavior of cloud users is briefly analyzed. In the third part, the trust evaluation model of cloud user behavior data will be constructed. In the fourth part, the model is verified by the simulation of the digital book cloud platform and the results and analysis are given. Finally, the article is summarized, and the further work direction is pointed out.
Related work
The security of cloud computing has been the focus in the application process. In recent years, many experts have carried out more in-depth research and produced a number of significant achievements. Lin et al. 2 compared the existing computing security cloud model and evaluation methods and proposed a multi-queue based on cloud computing multi-server security model. Chen et al. 3 proposed user behavior model–based dynamic game, in order to strengthen the cloud user type inference accuracy and comprehensiveness. For cloud server data integrity and confidentiality issues, Lin et al. 4 proposed an act of cloud-based access control model. Yan et al. 5 combined the cloud virtual machine identity management and authentication issues and present a hidden identity information programs to improve the safety certification process. Tian and Cao 6 proposed a model based on cloud user behavior identified multiple graphs, layer by behavioral evidence, and conduct multiple layer graph construction and behavior and identified layer 3 levels to solve the cloud service user behavior credibility problem. Patel et al. 7 conducted a study on cloud computing intrusion detection and prevention. Lin et al. 8 have proposed cross-layer mechanisms credibility of mobile cloud computing reliable recommendation and privacy issues have been studied. Anisetti et al. 9 put forward a certified independent cloud-based system. Xiong et al. 10 proposed a cloud data self-destruct program to ensure the security of data. Liu et al. 11 proposed a privacy rights based on shared authentication protocol, a good solution to the problem of privacy in a shared process to solve the user privacy cloud computing environment may leak when shared access issues. Zhou et al. proposed a role-based encryption (RBE) access control model to enforce access policies on encrypted data and protect data privacy in a cloud storage system. The RBE used cryptographic techniques to allow the owner of the data to encrypt the data to a specific role, so that only the authorized users in this role or the predecessors of this role can decrypt. 12 Chen et al. proposed a global social trust model in cloud to provide trustworthy communicating path and help address security issues. The model described the implicit call behavioral graph formed by users’ interactions with call and rated these relationships to form a dynamic local cloud trust. Afterward, it discussed the propagation and aggregation of local trust values for global social cloud network. 13 Li et al. proposed a method for trust quantification based on fuzzy comprehensive evaluation theory for cloud computing to protect user data. It can dynamically perform trust quantification to deal with malicious acts of nonfaithful services. 14 Wang et al. proposed a cloud service evaluation model based on trust and privacy-aware. In the design of the model, it introduces many factors, such as attenuation time and transaction volume. It can ensure that the actual quality of service, fraud, and malicious evaluation of malicious entities have a certain ability to resist. 15 To increase the precision and accuracy of the trust evaluation, Hajizadeh et al. proposed a new method to evaluate the trust metric among the cloud providers. The model has better reliability and availability than the first-in first-out (FIFO) and quality of service (QoS) models and can improve the amount of availability, error-hit, precision, and reliability values. 16 Chiregi et al. proposed a new method for trust and reputation evaluation on the basis of the mechanism of the opinion leaders and removing trolls. It takes into account the influence of a variety of measurement standards and has achieved good results. 17
Moreover, a lot of access control models have been proposed in the literature,18–22 most of them were based on the trusted third party and traditional cryptographic and authentication techniques. Thus, it ignores attacks launched by an inside attacker that has the legal identity and dishonest recommendations used to frame up good parties and boost trust values of malicious peers. Although the trust mechanism is introduced into access control, 23 they do not make full use of the user’s behavior. Furthermore, cloud platform has not been fully utilized. Cloud computing is big data storage, processing platform. The behavior information is generated by mass users in the process of using the cloud platform, and it is a typical big data source. So we can analyze the data generated by the process of using a cloud platform. And then it can enhance the user’s security controls.
Through the above analyses, it can be seen that trust evaluation of cloud platform is mainly concerned with the trust of the cloud platform itself. There is little research on trust for cloud users. Furthermore, the access control of the cloud users is more based on the third-party trust and the traditional encryption and authentication mechanism. So a trust evaluation model of cloud user based on behavior data is proposed in this article. The trusted behavior state of users is obtained by data analysis in the model. Based on the user’s trusted behavior state, direct trust of users will be computed. Based on the interaction of the current user and other users, recommendation trust will be calculated. Finally, comprehensive trust of users is calculated using the weighted average of three kinds of trust.
Cloud user behavior analysis
New features of cloud users
Cloud computing is a new service. It has some of their own characteristics compared with the traditional network:
The number of users is much greater. Network technology is mainly to solve the problem of sharing information resources in different organizations. Cloud computing is not only able to achieve the sharing of resources but also able to achieve the integration of large-scale scalable computing, storage, data, and application of distributed computing for collaborative work of super computing model. In addition, it is bound to accommodate and attract more users.
User behavior is more diverse. Cloud computing environment can provide more services. The users will have more interactive behavior in the use of these services. Therefore, the access control of interactive behavior is more important.
Security issues are more prominent. Cloud computing faces a greater variety of security threats, such as availability of service, data lock-in, data confidentiality and audibility, data transfer bottlenecks, performance unpredictability, bugs in large-scale distributed systems, reputation fate sharing, privacy and security, and access control.
In the cloud-computing environment, these features bring new requirements and challenges. How to guarantee the user information, data, and the privacy and security of services is a problem that must be solved.
Analysis behavior characteristics of cloud users
The behavior characteristics of cloud users are similar to the usual network users. Nevertheless, because of the change of service mode, it produced some new characteristics. The behavior analysis is as follows:
Login information has more content. It mainly includes the time, the place, login mode, and so on. Different users have different content, so it can be effective analysis for the user’s behavior.
The user has a variety of operating habits. It includes the order of operation, the type of access to resources and services, the frequency of access, the time of stay, and so on.
More information is derived from user interaction. With the popularity of cloud computing, users will interact with users registered in the same or different cloud. It will produce a large number of information in the interactive process.
More abnormal operation behavior of user is generated. Illegal links, try to override, password attempts, and so on can also be used for the evaluation of user behavior characteristics.
All of this reflect the user’s personal habits. In the process of using the cloud platform, a large number of data will be accumulated, and the statistical results of these data can be used to evaluate the user’s behavior. The establishment of the model and method can be used for the evaluation of cloud terminal user trust, which is the focus of this article.
Trust evaluation model based on behavior data
Based on user behavior, this model can form a user-trusted behavior profile. Then, the user’s behavior state can be determined using this model.
Design of trust evaluation model
User’s behavioral characteristics are diverse. Although the trusted behavior collection can be obtained through its historical behavior data, the user behavior does not only rely on the historical behavior. Thus, using only historical data to judge the user’s behavior is too arbitrary.
Therefore, four kinds of trusts are defined in this article, which are direct trust, recommendation trust, historical trust, and comprehensive trust. The definition is as follows:
The trusted behavior set is only the source of the direct trust value (recorded as

Process of trust evaluation.
Analysis of cloud user behavior data
Users’ behavior is diverse, including many types and status. For ease of analysis, this article sets the total number of cloud users behavior as
where
If set the number of cloud end user equal to
It has defined the behavior set of cloud users and the collection of the state of each behavior the following can be the behavior data analysis of cloud users, so as to determine the credibility of cloud user’s profile. In order to simplify the evaluation process, the analysis process of the cloud user behavior is accomplished by simple statistical method. The premise is that we assume that the historical data is credible. Based on the trusted data, the behavior of each cloud user is a mathematical statistic, and the set of trusted state consists of some larger frequency states. The
We can simply count the trusted state set of each cloud user behavior by this method and then the value of direct trust can be designed. Of course, the weight calculation process can also be determined according to the role of each cloud user behavior in trust evaluation. The weights set by expert by experience and can also get by optimizing algorithm optimization, in which each cloud user behavior we set weights recorded as follows
where
Calculation of direct trust
After the user login to the cloud platform, the number of user behavior is
where
The calculation of direct trust can also be used to calculate the statistical value of the cloud user behavior for a period of time. Set statistical time window
Calculation of recommendation trust
Direct trust can measure the state of user behavior. But the interaction between the users and other users cannot give a direct result of the evaluation. Therefore, this article introduces the recommendation trust. Recommendation trust is calculated by the interactive success ratio of the user and other users.
After the user login in the cloud, the number of interactive request to the other users is
where
Calculation of comprehensive trust
The value of comprehensive trust is obtained by the weighted average calculation, using direct trust, recommendation trust, and historical trust. Direct trust and recommendation trust can be calculated by the formula. The initial value of history trust is set manually and then updated according to comprehensive trust value. The calculation method is shown in formula (8)
where
Calculation of historical trust
The initial value of historical trust is set
In this formula,
Exception decision
Exception decision is conducted through comprehensive trust, historical trust, and threshold. According to the extent of the anomaly, it is divided into two levels. One is called a suspected anomaly. In this case, to continue to update the history trust, do not update the list of trust. Another is an exception, in which a trust list is required to be updated, and the user will be removed from the trust list. In order to make a decision, the two thresholds are set.
The threshold values are shown in section “Calculation of historical trust.” The process of decision is shown in Figure 2.

The process of exception decision.
Simulation results and analysis
In order to analyze the validity of the trust evaluation model of cloud user based on behavior data, in this article the model will be carried on verification through an experimental cloud platform.
Experimental environment
In this article, the experimental cloud platform is a simulation cloud of a digital library. Through this platform, users can search, download, upload digital document resources, and can also launch a chat request and transfer files to other users. Cloud users can be students, teachers, and administrators of the laboratory, and the user’s access control is achieved by the user’s username, password, and the IP address of the binding. In this platform environment, each user’s IP address is fixed, that is, through the IP address can be bound to a certain user. If authentication is successful, it can enjoy all the services provided by the platform, and others can do only retrieval.
According to the experimental environment, the behavior of the cloud users can be divided into five categories. The first category is user authentication behavior. The second category is retrieval behavior. The third category is download behavior. The fourth category is upload behavior. The fifth category is interactive behavior. The main behavior states of the cloud users are shown in Table 1. In Table 1, the value of the weight is set according to experience.
The main state of the cloud end user behavior.
Experiment process
Determine the trusted behavior set
In the experiment, the working process of the model is illustrated with the example of A. According to the actual situation of the experimental platform, the number of user’s behavior that can be used to calculate the direct trust is 4
The set of the behavior states can be obtained by Table 1 and then the status set of trusted user is obtained using the statistics of the user behavior data. The status set of trusted user is shown as follows:
Calculation of direct trust
The behavior characteristics of user A is shown in Table 2.
Current user behaviors.
In this article,
Calculation of recommendation trust
User B and C’s trust are 80 and 90, respectively. The recommended trust of the user A is calculated from formula (7) as follows
Calculation of comprehensive trust
The historical trust of A is 90
The comprehensive trust of the user A is calculated from formula (8) as follows
Update historical trust
According to the statistical results, the value of each threshold is 70 and 50 (
Experimental results
Comparison of comprehensive trust between normal and abnormal users
The initial comprehensive trust value is the maximum value of 100. The suspected threshold equals 70. The abnormal threshold equals 50. As can be seen from Figure 3, the comprehensive trust of the normal users will have a certain volatility with the passage of time, but greater than the suspected threshold. Even occasionally appear in the suspected threshold below will slowly return to normal state. However, the comprehensive trust of the abnormal users decreased very quickly. Due to the abnormal behavior of the user, the overall trust level is lower than the suspected threshold and then below the abnormal threshold. Moreover, the abnormal user’s comprehensive trust recovery is very slow. Even return to the normal state because of the abnormal behavior making the comprehensive confidence once again reduced.

Comparison of comprehensive trust between normal and abnormal users.
The change trend of four kinds of trust degree
The change trend of four kinds of trust degree is shown in Figure 4. As can be seen from Figure 4, when the user has abnormal behavior the degree of trust has declined rapidly, and the speed of the promotion is relatively slow, so that the user can achieve a strict evaluation, improve the safety of user information and resources. At the same time, in order to maintain the continuity of trust and increase the weight of the historical trust, it reflects the comprehensive trust and historical trust has a consistent trend. When the number of experiments increased, the two tended to be the same.

The changing trend of trust degree.
Direct trust and recommendation trust have temporary features, so the value of the trust and recommendation is small. As can be seen from the results, these two values change significantly, but the results have little effect on the comprehensive trust, it can avoid false positives.
Different historical trust weights
It can be seen from Figure 5 that the comprehensive trust has different trends with different historical trust weights. When the weight value of the historical trust takes 0.9, the change of comprehensive trust is relatively flat, and it cannot fully reflect the effect of direct trust and recommendation trust. When the value of the history of the trust value of 0.5 and 0.6, the comprehensive degree of trust changes, cannot reflect the continuity of the trust value, it will lead to the wrong update of the list of trust. So this article takes the weight of historical trust for 0.7.

The comprehensive trust with different historical trust weights.
Different response time of cloud platform
Through the statistical analysis of the last 30 days, abnormal users’ unlimited access to the cloud platform not only affects the security of the cloud platform but also occupies the cloud platform resources and thus reduces the response time of cloud platform. In the experiment, a faster response is obtained using the trust evaluation model to restrict the behavior of abnormal users. It can be seen from Figure 6.

Different response time of cloud platform.
Comparison of abnormal detection rate
In order to evaluate the effect of the detection of abnormal users, we compared our model with model from the literature 24 and the pervasive trust management (PTM) model based on D-S theory. The simulation result is shown in Figure 7. Figure 7 indicates that the detection rate of our model is higher than that of the model from the literature 24 and PTM. The reason is that our model includes three factors: behavior (between the user and the cloud platform), interaction (between users and users), and historical inertia. The others model only deals with behavioral factors.

Comparison of abnormal detection rate.
Conclusion
In this article, we proposed a novel trust evaluation model. Not only can this model make full use of the behavior data between the user and the cloud platform, it also includes interaction data between users and users and historical data. It can detect the state of a user according to the behavior trust. Compared with the evaluation model (which only focuses on the behavior data between the user and the cloud platform), our model has a higher abnormal detection rate. In addition, the trust value is calculated by a simple weighted average method. Therefore, it is light enough to fit well without great overheads. At the same time, a trust list can be constructed and updated dynamically by a trust evaluation model. Simulation results based on a simulation cloud of digital library show that the trust model could better monitor the status of users. Furthermore, the trust model has a better anomaly detection rate than the model from the literature 24 and PTM. We expect that our trust evaluation model can help to make cloud platform more secure.
The model in practical application and some problems to be solved, such as determination of clouds of user behavior and behavior trust contour optimization algorithm, are to be further studied. In addition, cloud platform of trust evaluation is our next step to do research. We will combine cloud platform trust and cloud user trust to provide a better trust strategy.
Footnotes
Acknowledgements
We express our thanks to person who checked our manuscript.
Handling Editor: Vinod Kumar Verma
Declaration of conflicting interests
The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
Funding
The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: This work was supported by the National Natural Science Foundation of China (61472137), the Science and Technology Project of Hebei Province (15210703), and the Fundamental Research Funds for the Central Universities (3142015022).
