Abstract
Mobile cloud computing breaks the limitation of mobile terminal hardware, and makes mobile terminal easier to achieve portable data accessing and intelligent load balancing. However, its three levels of “user-environment-service” are more prone to appear security problems. From the perspective of user credibility, we propose an analysis strategy of user abnormal behavior in mobile cloud environment. In our framework, user behaviors are normalized to the fragment identifiers of “user-timing sequence-operation” with the same length, offset and amplitude. The experimental results have shown that the classifying accuracy increased comparing to traditional methods. Besides, as seen from experimental results, the scheme could also improve the recognition speed.
Similar content being viewed by others
References
Ahmed, E., Gani, A., Sookhak, M., Hamid, S. H. A., & Xia, F. (2015). Application optimization in mobile cloud computing: Motivation, taxonomies, and open challenges. Journal of Network and Computer Applications, 52(C), 52–68.
Zheng, R., Zhang, M., Wu, Q., Wei, W., & Yang, C. (2015). A(3)srC: Autonomic assessment approach to IOT security risk based on multidimensional normal cloud. Journal of Internet Technology, 16(7), 1271–1282.
Bavaud, F. (2010). Euclidean distances, soft and spectral clustering on weighted graphs. In Proceedings of the European conference on machine learning and principles and practice of knowledge discovery in databases (ECML PKDD 2010), Barcelona, Spain (pp. 103–118).
Liu, X. Ban. (2015). Clustering by growing incremental self-organizing neural network. Expert Systems with Applications, 42(11), 4965–4981.
Li, H., & Wu, Q. (2013). Research of clustering algorithm based on information entropy and frequency sensitive discrepancy metric in anomaly detection. In Proceedings of the 2013 international conference on information science and cloud computing companion (ISCC-C 2013) (pp. 799–805). Guangzhou: IEEE.
Lu, Y., Xi, X., Hua, Z., & Zhang, N. (2014). An abnormal user behaviour detection method based on partially labelled data. Computer Modelling and New Technologies, 18(6), 132–141.
Liang, H., Wei, W., & Fei, R. (2009). Anomaly detection using improved hierarchy clustering. In Proceedings of the 2009 international conference on artificial intelligence and computational intelligence (AICI 2009) (pp. 319–323). Shanghai: IEEE.
Zhu, Y., & Ni, L. (2016). A probabilistic approach to statistical QoS provision of event detection in sensor networks. Wireless Networks, 22(2), 439–451.
Zheng, J., & Zhang, J. (2015). Association rule mining in DoS attack detection and defense in the application of network. In Proceedings of the 5th international conference on education, management, information and medicine (EMIM) (pp. 445–449). Shenyang: IEEE.
Acknowledgements
This work was partially supported by the National Natural Science Foundation of China (61602155, U1404611, 61370221, U1204614), in part by Program for Science & Technology Innovative Research Team in University of Henan Province (14IRTSTHN021), and in part by the Program for Science & Technology Innovation Talents in the University of Henan Province (14HASTIT045, 16HASTIT035), in part by Henan science and technology innovation outstanding talent (174100510010) and Training plan of Henan youth backbone teachers (2014GGJS-053, 2015GGJS-047).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zheng, R., Chen, J., Liu, K. et al. A User Recognition Strategy Under Mobile Cloud Environment. Wireless Pers Commun 102, 3749–3758 (2018). https://doi.org/10.1007/s11277-018-5406-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-018-5406-1