期刊文献+

一种基于用户行为分析的密钥管理异常检测方法

A Key Management Exception Detection Method Based on User Behavior Analysis
下载PDF
导出
摘要 云计算的发展带来了科技领域的深刻变革,因其便利性、经济性、可扩展性等优势获得了越来越多政企的青睐,与此同时云上应用的安全性也成为各方关注的焦点。密钥安全是密码安全的基础,在云计算环境中,不仅云上的各类应用需要更方便、安全的密钥管理服务,云系统本身也面临着用户数量多、数据量大等问题,亟待划分粒度更细、使用更加灵活的密钥管理方式。在云环境密钥管理的背景下,提出了一种基于用户行为分析的异常检测方法,按各用户的历史行为分析其当前操作的合法性。所提方法具有动态灵活、智能性强的特点,对拒绝服务攻击也具有一定的防护作用。 The development of cloud computing brings profound changes to the field of science and technology.With its convenience,affordability,scalability and other advantages,more and more governments and enterprises are favorable to it,while at the same time,the security of cloud applications becomes the focus of attention.Key security is the foundation of cryptographic security.In the cloud computing environment,not only all kinds of applications on the cloud need more convenient and secure key management services,but also the cloud system itself is facing many problems such as large number of users and large amount of data,so there is an urgent need for a key management method with finer granularity of division and more flexible usage.In the context of cloud environment key management,an exception detection method based on user behavior analysis is proposed,which analyzes the legitimacy of each user’s current operation according to its historical behavior.The proposed method is dynamic,flexible and intelligent,and also has a certain protective effect against denial-of-service attacks.
作者 张文钦 唐峯竹 ZHANG Wenqin;TANG Fengzhu(No.30 Institute of CETC,Chengdu Sichuan 610041,China)
出处 《通信技术》 2023年第2期226-230,共5页 Communications Technology
关键词 用户行为分析 云密钥管理 异常检测 云计算 user behavior analysis cloud key management exception detection cloud computing
  • 相关文献

参考文献5

二级参考文献32

  • 1李玲娟,王汝传.一种基于数据挖掘的入侵检测系统模型[J].南京邮电学院学报(自然科学版),2005,25(5):40-43. 被引量:2
  • 2罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 3Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/. 被引量:1
  • 4Distributed Management Task Force (DMTF) http://www.dmtf.org/home. 被引量:1
  • 5Cloud Security Alliance http://www.cloudsecurityalliance.org. 被引量:1
  • 6Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7. 被引量:1
  • 7Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396. 被引量:1
  • 8Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11]. 被引量:1
  • 9Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf. 被引量:1
  • 10Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009. 被引量:1

共引文献1089

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部