Journal of Frontiers of Computer Science and Technology ›› 2023, Vol. 17 ›› Issue (4): 973-984.DOI: 10.3778/j.issn.1673-9418.2107053
• Network·Security • Previous Articles
PENG Dinghong, SONG Bo, ZHANG Wenhua
Online:
2023-04-01
Published:
2023-04-01
彭定洪,宋博,张文华
PENG Dinghong, SONG Bo, ZHANG Wenhua. Hesitant Fuzzy Method of Rewarding Good and Penalizing Bad in Cloud Service User Behavior-Based Safety Evaluation[J]. Journal of Frontiers of Computer Science and Technology, 2023, 17(4): 973-984.
彭定洪, 宋博, 张文华. 云用户行为安全评价的犹豫模糊奖优罚劣方法[J]. 计算机科学与探索, 2023, 17(4): 973-984.
Add to citation manager EndNote|Ris|BibTeX
URL: http://fcst.ceaj.org/EN/10.3778/j.issn.1673-9418.2107053
[1] 张玉清, 王晓菲, 刘雪峰, 等. 云计算环境安全综述[J]. 软件学报, 2016, 27(6): 1328-1348. ZHANG Y Q, WANG X F, LIU X F, et al. Survey on cloud computing security[J]. Journal of Software, 2016, 27(6): 1328-1348. [2] NAMASUDRA S, DEVI D, KADRY S, et al. Towards DNA based data security in the cloud computing environment[J]. Computer Communications, 2020, 151: 539-547. [3] 鲁金钿, 肖睿智, 金舒原. 云数据安全研究进展[J]. 电子与信息学报, 2021, 43(4): 881-891. LU J D, XIAO R Z, JIN S Y. A survey for cloud data se-curity[J]. Journal of Electronics & Information Technology, 2021, 43(4): 881-891. [4] 王于丁, 杨家海, 徐聪, 等. 云计算访问控制技术研究综述[J]. 软件学报, 2015, 26(5): 1129-1150. WANG Y D, YANG J H, XU C, et al. Survey on access control technologies for cloud computing[J]. Journal of Software, 2015, 26(5): 1129-1150. [5] ZHANG P Y, ZHOU M C, KONG Y. A double-blind anony-mous evaluation-based trust model in cloud computing en-vironments[J]. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2021, 51(3): 1805-1816. [6] 王国峰, 刘川意, 潘鹤中, 等. 云计算模式内部威胁综述[J]. 计算机学报, 2017, 40(2): 296-316. WANG G F, LIU C Y, PAN H Z, et al. Survey on insider threats to cloud computing[J]. Chinese Journal of Compu-ters, 2017, 40(2): 296-316. [7] CHAWKI E B, AHMED A, ZAKARIAE T. IaaS cloud model security issues on behalf cloud provider and user security behaviors[J]. Procedia Computer Science, 2018, 134: 328-333. [8] 陈亚睿, 田立勤, 杨扬. 云计算环境下基于动态博弈论的用户行为模型与分析[J]. 电子学报, 2011, 39(8): 1818-1823. CHEN Y R, TIAN L Q, YANG Y. Model and analysis of user behavior based on dynamic game theory in cloud com-puting[J]. Acta Electronica Sinica, 2011, 39(8): 1818-1823. [9] 李存斌, 蔺帅帅, 徐方秋. 基于改进VIKOR法的云计算环境下用户行为安全的评估研究[J]. 计算机科学, 2017, 44(12): 105-109. LI C B, LIN S S, XU F Q. Safety assessment of user beha-viors under environment of computing based on improved VIKOR method[J]. Computer Science, 2017, 44(12): 105- 109. [10] 宋国峰, 梁昌勇. 一种基于用户行为信任的云安全访问控制模型[J]. 中国管理科学, 2013, 21(S2): 669-676. SONG G F, LIANG C Y. A cloud security access control model based on user behavior trust[J]. Chinese Journal of Management Science, 2013, 21(S2): 669-676. [11] ALRUWAYTHI M, KAMBHAMPATY K, NYGARD K E. User behavior and trust evaluation in cloud computing[C]//Proceedings of the 34th International Conference on Compu-ters and Their Applications, Honolulu, Mar 18-20, 2019. [12] HOSSEINI S B, SHOJAEE A, AGHELI N. A new method for evaluating cloud computing user behavior trust[C]//Proceedings of the 2015 7th Conference on Information and Knowledge Technology, Urmia, May 26-28, 2015. Piscata-way: IEEE, 2015: 1-6. [13] CHEN Z G, TIAN L Q, LIN C. Trust evaluation model of cloud user based on behavior data[J]. International Journal of Distributed Sensor Networks, 2018, 14(5): 1550147718776924. [14] ALRUWAYTHI M, NYGARD K E. Fuzzy logic approach based on user behavior trust in cloud security[C]//Procee-dings of the 2019 IEEE International Conference on Electro Information Technology, Brookings, May 20-22, 2019. Pis-cataway: IEEE, 2019: 1-6. [15] 傅贵, 张苏, 董继业, 等. 行为安全的理论实质与效果讨论[J]. 中国安全科学学报, 2013, 23(3): 150-154. FU G, ZHANG S, DONG J Y, et al. Discussions on the theoretical understanding and effects of behavior based safety[J]. China Safety Science Journal, 2013, 23(3): 150-154. [16] NICIEJEWSKA M, OBRECHT M. Impact of behavioral safety (behavioural-based safety-BBS) on the modification of dangerous behaviors in enterprises[J]. System Safety: Human-Technical Facility-Environment, 2020, 2(1): 324-332. [17] 佟瑞鹏, 杨校毅. 行为安全损耗和激励双路径管理理论研究[J]. 中国安全科学学报, 2020, 30(9): 8-14. TONG R P, YANG X Y. Dual path management theory of behavior-based safety impairment and motivation[J]. China Safety Science Journal, 2020, 30(9): 8-14. [18] 詹敏, 廖志高, 徐玖平. 线性无量纲化方法比较研究[J]. 统计与信息论坛, 2016, 31(12): 17-22. ZHAN M, LIAO Z G, XU J P. Character analysis of linear dimensionless methods[J]. Statistics & Information Forum, 2016, 31(12): 17-22. [19]戴文战, 邹立华, 汪建章, 等. 一种基于奖优罚劣原则的多阶段多目标决策模型[J]. 系统工程理论与实践, 2000,20(6): 32-36. DAI W Z, ZOU L H, WANG J Z, et al. A method of the dynamic multiple attribute decision modeling based on new effective function and its application[J]. Systems Engineering-Theory & Practice, 2000, 20(6): 32-36. [20] 宋捷, 党耀国, 王正新. 基于强“奖优罚劣”算子的多指标灰靶决策模型[J]. 系统工程与电子技术, 2010, 32(6):1229-1232. SONG J, DANG Y G, WANG Z X. Multi-attribute decision model of grey target based on majorant operator of “rewar-ding good and punishing bad”[J]. Systems Engineering and Electronics, 2010, 32(6): 1229-1232. [21] 王昭聪, 潘学萍, 马倩. 基于“奖优罚劣”线性变换改进前景理论的电网建设项目多属性投资排序方法[J]. 电网技术, 2019, 43(6): 2154-2164. WANG Z C, PAN X P, MA Q. Multi-attribute investment ranking method for power grid project construction based on improved prospect theory of “rewarding good and punishing bad” linear transformation[J]. Power System Technology, 2019, 43(6): 2154-2164. [22] 刘勇, Jeffrey Forrest, 刘思峰. 基于“奖优罚劣”线性变换算子的区间数多目标灰色局势决策方法[J]. 统计与信息论坛, 2012, 27(4): 22-26. LIU Y, FORREST J, LIU S F. Multi-objective grey situa-tion decision making model and application with interval numbers based on linear transformation operator with re-warding good and punishing bad[J]. Statistics & Informa-tion Forum, 2012, 27(4): 22-26. [23] TIAN L Q, LIN C, NI Y. Evaluation of user behavior trust in cloud computing[C]//Proceedings of the 2010 Interna-tional Conference on Computer Application and System Mo-deling, Taiyuan, Oct 22-24, 2010. Piscataway: IEEE, 2010: 567-572. [24] TORRA V, NARUKAWA Y. On hesitant fuzzy sets and deci-sion[C]//Proceedings of the 18th IEEE International Confe-rence on Fuzzy Systems, Jeju Island, Aug 20-24, 2009. Pis-cataway: IEEE, 2009: 1378-1382. [25] HWANG C L, YOON K. Multiple attribute decision making: methods and applications a state-of-the-art survey[M]. Berlin, Heidelberg: Springer, 1981. [26] 牛莉霞, 刘谋兴, 李乃文, 等. HVB惯性度的MPHMADM评价[J]. 中国安全科学学报, 2017, 27(7): 48-52. NIU L X, LIU M X, LI N W, et al. Evaluation of HVB inertia degree based on MPHMADM[J]. China Safety Science Journal, 2017, 27(7): 48-52. [27] 曾旭, 陆刚, 陈振伟, 等. 组织管理失误对操作人员行为安全影响分析[J]. 中国安全生产科学技术, 2016, 12(8): 185- 192. ZENG X, LU G, CHEN Z W, et al. Study on influence to behavior safety of operators by organizational management error[J]. Journal of Safety Science and Technology, 2016, 12(8): 185-192. [28] 王瑛, 肖薇, 王娜. 基于FC-OWA算子和改进竞合视角的科技奖励综合评价[J]. 统计与决策, 2015(8): 59-63. WANG Y, XIAO W, WANG N. A comprehensive evalua-tion of science and technology awards based on technology awards based on FC-OWA operator and improved compe-titive perspective[J]. Statistics & Decision, 2015(8): 59-63. [29] 俞立平, 潘云涛, 武夷山. 修正TOPSIS及其在科技评价中的应用研究[J]. 情报杂志, 2012, 31(6): 103-107. YU L P, PAN Y T, WU Y S. Study on accurate TOPSIS and its use in science and technology evaluation[J]. Journal of Intelligence, 2012, 31(6): 103-107. [30] 王霞. 基于改进TOPSIS的三参数区间灰数多属性决策方法[J]. 系统科学与数学, 2021, 41(5): 1328-1338. WANG X. Multi-attribute decision making method based on improved TOPSIS under three-parameter interval grey num-ber[J]. Systems Science and Mathematics, 2021, 41(5): 1328-1338. [31] 李美娟, 袁宁, 陈磊. 基于投影法和夹角度量法的改进TOPSIS[J]. 系统科学与数学, 2020, 40(9): 1614-1627. LI M J, YUAN N, CHEN L. Improved TOPSIS based on projection method and angle measure evaluation method [J]. Journal of Systems Science and Mathematical Sciences, 2020, 40(9): 1614-1627. [32] 郑晓薇, 汤胜利, 龚兆仁. 按对象分层决策矩阵的逼近理想解TOPSIS法的算法及实现[J]. 计算机工程与应用, 2000, 36(10): 81-83. ZHENG X W, TANG S L, GONG Z R. An algorithm pro-gram of decision matrix according to object divided layers structure[J]. Computer Engineering and Applications, 2000,36(10): 81-83. [33] 陈伟. 关于TOPSIS法应用中的逆序问题及消除的方法[J]. 运筹与管理, 2005, 14(3): 39-43. CHEN W. On the problem and elimination of rank reversal in the application of TOPSIS method[J]. Operations Research and Management Science, 2005, 14(3): 39-43. [34] 徐林明, 李美娟, 欧忠辉, 等. 基于虚拟最劣解TOPSIS和灰关联度的动态评价方法[J]. 系统科学与数学, 2019, 39(3): 365-377. XU L M, LI M J, OU Z H, et al. Dynamic evaluation method based on virtual worst solution TOPSIS and gray correla-tion degree[J]. Journal of Systems Science and Mathema-tical Sciences, 2019, 39(3): 365-377. [35] 周彬, 赵宽, 钟林生, 等. 舟山群岛生态系统健康与旅游经济协调发展评价[J]. 生态学报, 2015, 35(10): 3437-3446. ZHOU B, ZHAO K, ZHONG L S, et al. Coordinated deve-lopment evaluation of the ecosystem health and the tourism economy Zhoushan Islands[J]. Acta Ecologica Sinica, 2015, 35(10): 3437-3446. [36] WANG Y J, LEE H S. Generalizing TOPSIS for fuzzy mul-tiple-criteria group decision-making[J]. Computers & Ma-thematics with Applications, 2007, 53(11): 1762-1772. [37] XIA M M, XU Z S. Hesitant fuzzy information aggregation in decision making[J]. International Journal of Approximate Reasoning, 2010, 52(3): 395-407. [38] 党耀国, 刘国峰, 王建平, 等. 多指标加权灰靶的决策模型[J]. 统计与决策, 2004(3): 29-30. DANG Y G, LIU G F, WANG J P, et al. Decision model with multi-indicator weighted gray target[J]. Statistics & Decision, 2004(3): 29-30. [39] 郭亚军, 易平涛. 线性无量纲化方法的性质分析[J]. 统计研究, 2008(2): 93-100. UO Y J, YI P T. Character analysis of linear dimensionless methods[J]. Statistical Research, 2008(2): 93-100. |
[1] | LIU Chunhong, ZHANG Zhihua, JIAO Jie, CHENG Bo. Structured Prediction Method for Small Sample Workload Sequences [J]. Journal of Frontiers of Computer Science and Technology, 2022, 16(7): 1552-1560. |
[2] | ZHENG Lianghan, HE Heng, TONG Qian, YANG Xiang, CHEN Xiang. Multi-authority Access Control Scheme in Cloud Environment [J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(11): 1865-1878. |
[3] | ZHANG Shengxia, TIAN Chengliang. Security Outsourcing Algorithms by Unimodular Matrix Encryption Method [J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(1): 73-82. |
[4] | CHEN Yantong, PEI Shujun, MIAO Hui. Cost-Optimized Scheduling Algorithm for Cloud Scientific Workflow with Deadline Constraint [J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(8): 1307-1318. |
[5] | REN Xiaoli, YANG Jianwei, LI Naiqian. Secure Storage Based on Dynamic Virtualization of Electronic Stream Cipher Oriented Cloud Computing [J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(8): 1331-1340. |
[6] | ZHAO Qian, XIE Shangqin, HAN Ke, GONG Qingze, FENG Guangsheng, LIN Junyu. Container Migration Based on Combination of Remote Direct Memory Access and Check Point [J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(12): 1995-2007. |
[7] | LI Yong, TENG Fei, HUANG Qichuan, LI Tianrui. Parallel Time Series Decomposition Algorithm Based on Spark [J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(7): 1055-1063. |
[8] | PEI Shujun, SONG Dongmei, KONG Dekai. Application of Fast Pruning Algorithm in Map/Reduce for Complex Tasks Scheduling [J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(1): 72-81. |
[9] | LIU Peidong, AN Bo, ZHONG Yehong, WANG Hu, CAO Donggang. Virtual Cluster Based Resource Sharing Approach for Private Cloud Environment [J]. Journal of Frontiers of Computer Science and Technology, 2017, 11(8): 1204-1213. |
[10] | WANG Hongxu, WU Bin, LIU Yang. Parallel Graph Data Analysis System Based on Spark [J]. Journal of Frontiers of Computer Science and Technology, 2015, 9(9): 1066-1074. |
[11] | SONG Baoyan, LI Xuecheng, REN Cai, DING Linlin. Layered Intermediate Data Fault-Tolerance Approach in Cloud [J]. Journal of Frontiers of Computer Science and Technology, 2015, 9(5): 546-554. |
[12] | LIU Wenmao, QIU Xiaofeng, CHEN Pengcheng, WEN Xutao, HE Xinxin, WANG Dongsheng, LI Jun. SDN Oriented Software-Defined Security Architecture [J]. Journal of Frontiers of Computer Science and Technology, 2015, 9(1): 63-70. |
[13] | YU Jiong, LIAO Bin, ZHANG Tao, SUN Hua, GUO Binglei, YANG Xingyao. A Survey on Energy-Efficient Cloud Storage System [J]. Journal of Frontiers of Computer Science and Technology, 2014, 8(9): 1025-1040. |
[14] | YANG Rong, LI Bing, DU Baotong, XIONG Wei, HE Peng. Adaptive Service Selection Method with Atomic Transactions and QoS Constraints [J]. Journal of Frontiers of Computer Science and Technology, 2014, 8(5): 582-592. |
[15] | SHI Jingang, ZHENG Yan, SUN Huanliang, LUAN Fangjun. Parallel Processing of Block Cipher for Massive Data in Cloud Computing [J]. Journal of Frontiers of Computer Science and Technology, 2014, 8(2): 161-170. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
/D:/magtech/JO/Jwk3_kxyts/WEB-INF/classes/