{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T09:16:42Z","timestamp":1774603002095,"version":"3.50.1"},"reference-count":40,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,7,2]],"date-time":"2021-07-02T00:00:00Z","timestamp":1625184000000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Henan Programs for Science and Technology Development","award":["212102210100"],"award-info":[{"award-number":["212102210100"]}]},{"name":"Henan Programs for Science and Technology Development","award":["20A413008"],"award-info":[{"award-number":["20A413008"]}]},{"name":"Henan Programs for Science and Technology Development","award":["21B520022"],"award-info":[{"award-number":["21B520022"]}]},{"name":"Henan Programs for Science and Technology Development","award":["20B520040"],"award-info":[{"award-number":["20B520040"]}]},{"name":"Henan Programs for Science and Technology Development","award":["20A520043"],"award-info":[{"award-number":["20A520043"]}]},{"name":"Henan Key Research Projects of Universities","award":["212102210100"],"award-info":[{"award-number":["212102210100"]}]},{"name":"Henan Key Research Projects of Universities","award":["20A413008"],"award-info":[{"award-number":["20A413008"]}]},{"name":"Henan Key Research Projects of Universities","award":["21B520022"],"award-info":[{"award-number":["21B520022"]}]},{"name":"Henan Key Research Projects of Universities","award":["20B520040"],"award-info":[{"award-number":["20B520040"]}]},{"name":"Henan Key Research Projects of Universities","award":["20A520043"],"award-info":[{"award-number":["20A520043"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,7,2]]},"abstract":"<jats:p>Attacks launched from the inside of the cloud are threats not only to the cloud users but also to the cloud infrastructures. Although with trusted computing the cloud service providers can guarantee the trust and security of the cloud environment for the users, the trustworthiness of users is not properly assessed. Inspired by the concept of variable trust, the main contribution of this paper is that we propose a trust assessment method for cloud users based on deep learning. Firstly, we extract users\u2019 activities from system logs and employ stacked LSTM (long short-term memory) neural network to model normal activity patterns to build trust profiles for different users. Secondly, the trust profile is capable of predicting future behavioural actions of the specific user, and by calculating the similarity between predicted actions and actual actions the trustworthiness of the user will be assessed with a baseline to detect the trust state of the cloud user dynamically. And in the end, we design and conduct experiments on a public dataset. The results of experiments indicate that when the user is in abnormal state, there are notable differences between predicted actions and user\u2019s actual actions, which proves the efficiency of the proposed method.<\/jats:p>","DOI":"10.1155\/2021\/9937229","type":"journal-article","created":{"date-parts":[[2021,7,2]],"date-time":"2021-07-02T20:20:46Z","timestamp":1625257246000},"page":"1-11","source":"Crossref","is-referenced-by-count":5,"title":["A Deep Learning-Based Trust Assessment Method for Cloud Users"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3162-5049","authenticated-orcid":true,"given":"Wei","family":"Ma","sequence":"first","affiliation":[{"name":"School of Information Engineering, Zhengzhou University, Zhengzhou 450001, China"},{"name":"School of Information Science and Technology, Zhengzhou Normal University, Zhengzhou 450044, China"},{"name":"School of Information Engineering, North China University of Water Resources and Electric Power, Zhengzhou 450046, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1156-1108","authenticated-orcid":true,"given":"Qinglei","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Zhengzhou University, Zhengzhou 450001, China"}]},{"given":"Mingsheng","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Zhengzhou Normal University, Zhengzhou 450044, China"}]},{"given":"Xing","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Electrical Engineering, Yuquan Campus, Zhejiang University, Hangzhou 310027, China"}]}],"member":"311","reference":[{"key":"1"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/icmlc.2013.6890852"},{"key":"3","first-page":"20","article-title":"Research on multi-level management mechanism in trusted cloud computing","volume":"7","author":"W. Ma","year":"2015","journal-title":"Netinfo Security"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"5","first-page":"65","article-title":"A new form of DOS attack in a cloud and its avoidance mechanism","author":"H. Liu"},{"key":"6","first-page":"47","article-title":"Supervised and unsupervised methods to detect insider threat from enterprise social and online activity data","author":"G. Gavai"},{"key":"7","article-title":"Deep learning for unsupervised insider threat detection in structured cybersecurity data streams","author":"A. Tuor"},{"key":"8","first-page":"258","article-title":"Deep learning approach for network intrusion detection in software defined networking","author":"T. A. Tang"},{"key":"9","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/978-0-387-77322-3_5","article-title":"A survey of insider attack detection research","volume-title":"Insider Attack and Cyber Security","author":"M. B. Salem","year":"2008"},{"issue":"1","key":"10","first-page":"58","article-title":"Computer intrusion: detecting masquerades","volume":"16","author":"M. Schonlau","year":"2001","journal-title":"Statistical Science"},{"key":"11","first-page":"45","article-title":"Detecting insider threats by monitoring system call activity","author":"N. Nguyen"},{"key":"12","first-page":"1285","article-title":"Deeplog: anomaly detection and diagnosis from system logs through deep learning","author":"M. Du"},{"key":"13","article-title":"Use of support vector machine (svm) in detecting anomalous web usage patterns","author":"H. Kim","year":"2004","journal-title":"Symposium on Information and Communications Technology"},{"key":"14","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1007\/978-3-540-74320-0_8","article-title":"Elicit: a system for detecting insiders who violate need-to-know","volume-title":"International Workshop on Recent Advances in Intrusion Detection","author":"M. A. Maloof","year":"2007"},{"key":"15","unstructured":"RoseS.Zero Trust Architecture2019Gaithersburg, MD, USANational Institute of Standards and TechnologyNo. NIST Special Publication (SP) 800-207 (Draft)"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-6222-1_7"},{"key":"17","first-page":"151","article-title":"Improving Xen security through disaggregation","author":"D. G. Murray"},{"key":"18","article-title":"Towards trusted cloud computing","author":"N. Santos"},{"key":"19","first-page":"305","article-title":"VTPM: virtualizing the trusted platform module","author":"R. Perez"},{"key":"20","unstructured":"SailerR.sHype: secure hypervisor approach to trusted virtualized systems20055Technical. Report. RC23511"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1341312.1341321"},{"key":"22","first-page":"347","article-title":"Cloud computing security challenges & solutions-A survey","author":"S. Basu"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.5120\/12122-8376"},{"key":"24","first-page":"403","article-title":"Trust model of users\u2019 behavior in trustworthy internet","author":"Li Wen"},{"key":"25","first-page":"567","article-title":"Evaluation of user behavior trust in cloud computing","author":"T. Li-qin"},{"key":"26","first-page":"1","article-title":"Fuzzy logic approach based on user behavior trust in cloud security","author":"M. Alruwaythi"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1177\/1550147718776924"},{"key":"28","first-page":"193","article-title":"A trust based methodology for web service selection","author":"S. Galizia"},{"issue":"2","key":"29","doi-asserted-by":"crossref","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","article-title":"A survey of trust and reputation systems for online service provision","volume":"43","author":"A. J\u00f8sang","year":"2007","journal-title":"Decision Support Systems"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"31","first-page":"5","article-title":"Predicting sequences of user actions","author":"B. D. Davison"},{"key":"32","first-page":"43","article-title":"Sequence matching and learning in anomaly detection for computer security","author":"T. Lane"},{"key":"33","first-page":"219","article-title":"Masquerade detection using truncated command lines","author":"R. A. Maxion"},{"key":"34","first-page":"424","article-title":"Recursive data mining for masquerade detection and author identification","author":"B. K. Szymanski"},{"key":"35","volume-title":"Eigen Co-occurrence Matrix Method for Masquerade Detection","author":"M. Oka","year":"2004"},{"key":"36","first-page":"47","article-title":"A new take on detecting insider threats: exploring the use of hidden Markov models","author":"T. Rashid"},{"key":"37","first-page":"43","article-title":"Insider threat detection with deep neural network","author":"F. Yuan"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2983091"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2991067"},{"key":"40","author":"Canadian Institute for Cybersecurity","year":"2018"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/9937229.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/9937229.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/9937229.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,2]],"date-time":"2021-07-02T20:20:58Z","timestamp":1625257258000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/9937229\/"}},"subtitle":[],"editor":[{"given":"Mamoun","family":"Alazab","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,7,2]]},"references-count":40,"alternative-id":["9937229","9937229"],"URL":"https:\/\/doi.org\/10.1155\/2021\/9937229","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"value":"1939-0122","type":"electronic"},{"value":"1939-0114","type":"print"}],"subject":[],"published":{"date-parts":[[2021,7,2]]}}}