{"id":"https://openalex.org/W3176322526","doi":"https://doi.org/10.1155/2021/9937229","title":"A Deep Learning-Based Trust Assessment Method for Cloud Users","display_name":"A Deep Learning-Based Trust Assessment Method for Cloud Users","publication_year":2021,"publication_date":"2021-07-02","ids":{"openalex":"https://openalex.org/W3176322526","doi":"https://doi.org/10.1155/2021/9937229","mag":"3176322526"},"language":"en","primary_location":{"id":"doi:10.1155/2021/9937229","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/9937229","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/9937229.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2021/9937229.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100455564","display_name":"Wei Ma","orcid":"https://orcid.org/0000-0003-3162-5049"},"institutions":[{"id":"https://openalex.org/I198645480","display_name":"North China University of Water Resources and Electric Power","ror":"https://ror.org/03acrzv41","country_code":"CN","type":"education","lineage":["https://openalex.org/I198645480"]},{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"education","lineage":["https://openalex.org/I38877650"]},{"id":"https://openalex.org/I4210092058","display_name":"Zhengzhou Normal University","ror":"https://ror.org/00cbts945","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210092058"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wei Ma","raw_affiliation_strings":["School of Information Engineering, North China University of Water Resources and Electric Power, Zhengzhou 450046, China","School of Information Engineering, Zhengzhou University, Zhengzhou 450001, China","School of Information Science and Technology, Zhengzhou Normal University, Zhengzhou 450044, China","School of Information Engineering, North China University of Water Resources and Electric Power, Zhengzhou 450046"],"raw_orcid":"https://orcid.org/0000-0003-3162-5049","affiliations":[{"raw_affiliation_string":"School of Information Engineering, North China University of Water Resources and Electric Power, Zhengzhou 450046, China","institution_ids":["https://openalex.org/I198645480"]},{"raw_affiliation_string":"School of Information Engineering, Zhengzhou University, Zhengzhou 450001, China","institution_ids":["https://openalex.org/I38877650"]},{"raw_affiliation_string":"School of Information Science and Technology, Zhengzhou Normal University, Zhengzhou 450044, China","institution_ids":["https://openalex.org/I4210092058"]},{"raw_affiliation_string":"School of Information Engineering, North China University of Water Resources and Electric Power, Zhengzhou 450046","institution_ids":["https://openalex.org/I198645480"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091337485","display_name":"Qinglei Zhou","orcid":"https://orcid.org/0000-0002-1156-1108"},"institutions":[{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"education","lineage":["https://openalex.org/I38877650"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qinglei Zhou","raw_affiliation_strings":["School of Information Engineering, Zhengzhou University, Zhengzhou 450001, China"],"raw_orcid":"https://orcid.org/0000-0002-1156-1108","affiliations":[{"raw_affiliation_string":"School of Information Engineering, Zhengzhou University, Zhengzhou 450001, China","institution_ids":["https://openalex.org/I38877650"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033364294","display_name":"Mingsheng Hu","orcid":"https://orcid.org/0000-0002-7220-1456"},"institutions":[{"id":"https://openalex.org/I4210092058","display_name":"Zhengzhou Normal University","ror":"https://ror.org/00cbts945","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210092058"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingsheng Hu","raw_affiliation_strings":["School of Information Science and Technology, Zhengzhou Normal University, Zhengzhou 450044, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Zhengzhou Normal University, Zhengzhou 450044, China","institution_ids":["https://openalex.org/I4210092058"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101728051","display_name":"Xing Wang","orcid":"https://orcid.org/0000-0003-3568-4994"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xing Wang","raw_affiliation_strings":["College of Electrical Engineering, Yuquan Campus, Zhejiang University, Hangzhou 310027, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Electrical Engineering, Yuquan Campus, Zhejiang University, Hangzhou 310027, China","institution_ids":["https://openalex.org/I76130692"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5091337485","https://openalex.org/A5100455564"],"corresponding_institution_ids":["https://openalex.org/I198645480","https://openalex.org/I38877650","https://openalex.org/I4210092058"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":1.422,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.85453741,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"2021","issue":null,"first_page":"1","last_page":"11"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8921696543693542},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8788250684738159},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.6334392428398132},{"id":"https://openalex.org/keywords/baseline","display_name":"Baseline (sea)","score":0.5064269304275513},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.4809083938598633},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4677698016166687},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.46341413259506226},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.43185558915138245},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3309233486652374},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.28152212500572205}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8921696543693542},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8788250684738159},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.6334392428398132},{"id":"https://openalex.org/C12725497","wikidata":"https://www.wikidata.org/wiki/Q810247","display_name":"Baseline (sea)","level":2,"score":0.5064269304275513},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.4809083938598633},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4677698016166687},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.46341413259506226},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.43185558915138245},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3309233486652374},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.28152212500572205},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C111368507","wikidata":"https://www.wikidata.org/wiki/Q43518","display_name":"Oceanography","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2021/9937229","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/9937229","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/9937229.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:dd927ff12b9946dd97246c4e91528c6d","is_oa":false,"landing_page_url":"https://doaj.org/article/dd927ff12b9946dd97246c4e91528c6d","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2021 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2021/9937229","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/9937229","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/9937229.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6299999952316284,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3176322526.pdf","grobid_xml":"https://content.openalex.org/works/W3176322526.grobid-xml"},"referenced_works_count":37,"referenced_works":["https://openalex.org/W33933511","https://openalex.org/W61807067","https://openalex.org/W63951635","https://openalex.org/W1729172517","https://openalex.org/W1922956467","https://openalex.org/W1973704753","https://openalex.org/W1985715344","https://openalex.org/W2025300822","https://openalex.org/W2072633121","https://openalex.org/W2097726984","https://openalex.org/W2117552630","https://openalex.org/W2119028650","https://openalex.org/W2122646361","https://openalex.org/W2123941465","https://openalex.org/W2124922306","https://openalex.org/W2142638723","https://openalex.org/W2144584907","https://openalex.org/W2153407452","https://openalex.org/W2160915164","https://openalex.org/W2166017159","https://openalex.org/W2560162835","https://openalex.org/W2585284559","https://openalex.org/W2761599262","https://openalex.org/W2804835380","https://openalex.org/W2808709910","https://openalex.org/W2963673968","https://openalex.org/W2973111663","https://openalex.org/W3013579342","https://openalex.org/W3023328046","https://openalex.org/W3106973367","https://openalex.org/W4211005927","https://openalex.org/W6602518401","https://openalex.org/W6640182669","https://openalex.org/W6668699059","https://openalex.org/W6681903029","https://openalex.org/W6752999876","https://openalex.org/W7021122543"],"related_works":["https://openalex.org/W2383111961","https://openalex.org/W2365952365","https://openalex.org/W2352448290","https://openalex.org/W2380820513","https://openalex.org/W2913146933","https://openalex.org/W2372385138","https://openalex.org/W4296359239","https://openalex.org/W2063610494","https://openalex.org/W2054684024","https://openalex.org/W1603711083"],"abstract_inverted_index":{"Attacks":[0],"launched":[1],"from":[2,84],"the":[3,6,13,19,26,32,37,41,43,53,58,109,120,126,134,137,147,151,157,175,194,197],"inside":[4],"of":[5,36,45,55,61,114,119,136,150,170,196],"cloud":[7,14,20,27,38,73,152],"are":[8,182],"threats":[9],"not":[10,48],"only":[11],"to":[12,18,96,101,145],"users":[15,46,74],"but":[16],"also":[17],"infrastructures.":[21],"Although":[22],"with":[23,142],"trusted":[24],"computing":[25],"service":[28],"providers":[29],"can":[30],"guarantee":[31],"trust":[33,69,103,110,148],"and":[34,87,123,131,161,188],"security":[35],"environment":[39],"for":[40,72,105],"users,":[42],"trustworthiness":[44,135],"is":[47,64,112,177],"properly":[49],"assessed.":[50],"Inspired":[51],"by":[52,124],"concept":[54],"variable":[56],"trust,":[57],"main":[59],"contribution":[60],"this":[62],"paper":[63],"that":[65,173],"we":[66,80,159],"propose":[67],"a":[68,143,165],"assessment":[70],"method":[71],"based":[75],"on":[76,164],"deep":[77],"learning.":[78],"Firstly,":[79],"extract":[81],"users\u2019":[82],"activities":[83],"system":[85],"logs":[86],"employ":[88],"stacked":[89],"LSTM":[90],"(long":[91],"short-term":[92],"memory)":[93],"neural":[94],"network":[95],"model":[97],"normal":[98],"activity":[99],"patterns":[100],"build":[102],"profiles":[104],"different":[106],"users.":[107],"Secondly,":[108],"profile":[111],"capable":[113],"predicting":[115],"future":[116],"behavioural":[117],"actions":[118,130,133,187],"specific":[121],"user,":[122],"calculating":[125],"similarity":[127],"between":[128,185],"predicted":[129,186],"actual":[132,190],"user":[138,153,176],"will":[139],"be":[140],"assessed":[141],"baseline":[144],"detect":[146],"state":[149],"dynamically.":[154],"And":[155],"in":[156,178],"end,":[158],"design":[160],"conduct":[162],"experiments":[163,171],"public":[166],"dataset.":[167],"The":[168],"results":[169],"indicate":[172],"when":[174],"abnormal":[179],"state,":[180],"there":[181],"notable":[183],"differences":[184],"user\u2019s":[189],"actions,":[191],"which":[192],"proves":[193],"efficiency":[195],"proposed":[198],"method.":[199]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-05-21T06:26:12.895304","created_date":"2025-10-10T00:00:00"}
