A User Recognition Strategy Under Mobile Cloud Environment | Wireless Personal Communications Skip to main content
Log in

A User Recognition Strategy Under Mobile Cloud Environment

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Mobile cloud computing breaks the limitation of mobile terminal hardware, and makes mobile terminal easier to achieve portable data accessing and intelligent load balancing. However, its three levels of “user-environment-service” are more prone to appear security problems. From the perspective of user credibility, we propose an analysis strategy of user abnormal behavior in mobile cloud environment. In our framework, user behaviors are normalized to the fragment identifiers of “user-timing sequence-operation” with the same length, offset and amplitude. The experimental results have shown that the classifying accuracy increased comparing to traditional methods. Besides, as seen from experimental results, the scheme could also improve the recognition speed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Ahmed, E., Gani, A., Sookhak, M., Hamid, S. H. A., & Xia, F. (2015). Application optimization in mobile cloud computing: Motivation, taxonomies, and open challenges. Journal of Network and Computer Applications, 52(C), 52–68.

    Article  Google Scholar 

  2. Zheng, R., Zhang, M., Wu, Q., Wei, W., & Yang, C. (2015). A(3)srC: Autonomic assessment approach to IOT security risk based on multidimensional normal cloud. Journal of Internet Technology, 16(7), 1271–1282.

    Google Scholar 

  3. Bavaud, F. (2010). Euclidean distances, soft and spectral clustering on weighted graphs. In Proceedings of the European conference on machine learning and principles and practice of knowledge discovery in databases (ECML PKDD 2010), Barcelona, Spain (pp. 103–118).

  4. Liu, X. Ban. (2015). Clustering by growing incremental self-organizing neural network. Expert Systems with Applications, 42(11), 4965–4981.

    Article  Google Scholar 

  5. Li, H., & Wu, Q. (2013). Research of clustering algorithm based on information entropy and frequency sensitive discrepancy metric in anomaly detection. In Proceedings of the 2013 international conference on information science and cloud computing companion (ISCC-C 2013) (pp. 799–805). Guangzhou: IEEE.

  6. Lu, Y., Xi, X., Hua, Z., & Zhang, N. (2014). An abnormal user behaviour detection method based on partially labelled data. Computer Modelling and New Technologies, 18(6), 132–141.

    Google Scholar 

  7. Liang, H., Wei, W., & Fei, R. (2009). Anomaly detection using improved hierarchy clustering. In Proceedings of the 2009 international conference on artificial intelligence and computational intelligence (AICI 2009) (pp. 319–323). Shanghai: IEEE.

  8. Zhu, Y., & Ni, L. (2016). A probabilistic approach to statistical QoS provision of event detection in sensor networks. Wireless Networks, 22(2), 439–451.

    Article  Google Scholar 

  9. Zheng, J., & Zhang, J. (2015). Association rule mining in DoS attack detection and defense in the application of network. In Proceedings of the 5th international conference on education, management, information and medicine (EMIM) (pp. 445–449). Shenyang: IEEE.

Download references

Acknowledgements

This work was partially supported by the National Natural Science Foundation of China (61602155, U1404611, 61370221, U1204614), in part by Program for Science & Technology Innovative Research Team in University of Henan Province (14IRTSTHN021), and in part by the Program for Science & Technology Innovation Talents in the University of Henan Province (14HASTIT045, 16HASTIT035), in part by Henan science and technology innovation outstanding talent (174100510010) and Training plan of Henan youth backbone teachers (2014GGJS-053, 2015GGJS-047).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ruijuan Zheng.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zheng, R., Chen, J., Liu, K. et al. A User Recognition Strategy Under Mobile Cloud Environment. Wireless Pers Commun 102, 3749–3758 (2018). https://doi.org/10.1007/s11277-018-5406-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-018-5406-1

Keywords

Navigation