A User Recognition Strategy under Mobile Cloud Environment

Ruijuan Zheng,Jing Chen,Kang Liu,Mingchuan Zhang,Junlong Zhu,Qingtao Wu,Huiqiang Wang
DOI: https://doi.org/10.1007/s11277-018-5406-1
IF: 2.017
2018-01-01
Wireless Personal Communications
Abstract:Mobile cloud computing breaks the limitation of mobile terminal hardware, and makes mobile terminal easier to achieve portable data accessing and intelligent load balancing. However, its three levels of "user-environment-service'' are more prone to appear security problems. From the perspective of user credibility, we propose an analysis strategy of user abnormal behavior in mobile cloud environment. In our framework, user behaviors are normalized to the fragment identifiers of "user-timing sequence-operation'' with the same length, offset and amplitude. The experimental results have shown that the classifying accuracy increased comparing to traditional methods. Besides, as seen from experimental results, the scheme could also improve the recognition speed.
What problem does this paper attempt to address?