{"id":"https://openalex.org/W2804835380","doi":"https://doi.org/10.1177/1550147718776924","title":"Trust evaluation model of cloud user based on behavior data","display_name":"Trust evaluation model of cloud user based on behavior data","publication_year":2018,"publication_date":"2018-05-01","ids":{"openalex":"https://openalex.org/W2804835380","doi":"https://doi.org/10.1177/1550147718776924","mag":"2804835380"},"language":"en","primary_location":{"id":"doi:10.1177/1550147718776924","is_oa":true,"landing_page_url":"https://doi.org/10.1177/1550147718776924","pdf_url":"https://journals.sagepub.com/doi/pdf/10.1177/1550147718776924","source":{"id":"https://openalex.org/S64417657","display_name":"International Journal of Distributed Sensor Networks","issn_l":"1550-1329","issn":["1550-1329","1550-1477"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Distributed Sensor Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://journals.sagepub.com/doi/pdf/10.1177/1550147718776924","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056059729","display_name":"Zhenguo Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I132210918","display_name":"North China Institute of Science and Technology","ror":"https://ror.org/0096c7651","country_code":"CN","type":"education","lineage":["https://openalex.org/I132210918"]},{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhenguo Chen","raw_affiliation_strings":["College of Computer Science and Engineering, Northeastern University, Shenyang, China","Hebei Engineering Technology Research Center for IOT Data acquisition & Processing, North China Institute of Science and Technology, East Yanjiao, Beijing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Engineering, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]},{"raw_affiliation_string":"Hebei Engineering Technology Research Center for IOT Data acquisition & Processing, North China Institute of Science and Technology, East Yanjiao, Beijing, China","institution_ids":["https://openalex.org/I132210918"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005950313","display_name":"Liqin Tian","orcid":"https://orcid.org/0000-0001-9865-9003"},"institutions":[{"id":"https://openalex.org/I132210918","display_name":"North China Institute of Science and Technology","ror":"https://ror.org/0096c7651","country_code":"CN","type":"education","lineage":["https://openalex.org/I132210918"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liqin Tian","raw_affiliation_strings":["Hebei Engineering Technology Research Center for IOT Data acquisition & Processing, North China Institute of Science and Technology, East Yanjiao, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Hebei Engineering Technology Research Center for IOT Data acquisition & Processing, North China Institute of Science and Technology, East Yanjiao, Beijing, China","institution_ids":["https://openalex.org/I132210918"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100443673","display_name":"Chuang Lin","orcid":"https://orcid.org/0000-0001-5272-3284"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chuang Lin","raw_affiliation_strings":["Department of Computer Science and Technology, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5056059729"],"corresponding_institution_ids":["https://openalex.org/I132210918","https://openalex.org/I9224756"],"apc_list":{"value":2200,"currency":"USD","value_usd":2200},"apc_paid":{"value":2200,"currency":"USD","value_usd":2200},"fwci":7.0693,"has_fulltext":false,"cited_by_count":35,"citation_normalized_percentile":{"value":0.97144242,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"14","issue":"5","first_page":"155014771877692","last_page":"155014771877692"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9666000008583069,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9620000123977661,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8717085123062134},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.778907299041748},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.575852632522583},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5475961565971375},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5210772752761841},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4305609464645386},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.41701990365982056},{"id":"https://openalex.org/keywords/value","display_name":"Value (mathematics)","score":0.4162499010562897},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.0965227484703064}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8717085123062134},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.778907299041748},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.575852632522583},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5475961565971375},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5210772752761841},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4305609464645386},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.41701990365982056},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.4162499010562897},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0965227484703064},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1177/1550147718776924","is_oa":true,"landing_page_url":"https://doi.org/10.1177/1550147718776924","pdf_url":"https://journals.sagepub.com/doi/pdf/10.1177/1550147718776924","source":{"id":"https://openalex.org/S64417657","display_name":"International Journal of Distributed Sensor Networks","issn_l":"1550-1329","issn":["1550-1329","1550-1477"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Distributed Sensor Networks","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:sae:intdis:v:14:y:2018:i:5:p:1550147718776924","is_oa":false,"landing_page_url":"https://journals.sagepub.com/doi/10.1177/1550147718776924","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},{"id":"pmh:oai:doaj.org/article:bb17142a24fe4ce2b6ff59b1076dad8b","is_oa":true,"landing_page_url":"https://doaj.org/article/bb17142a24fe4ce2b6ff59b1076dad8b","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"International Journal of Distributed Sensor Networks, Vol 14 (2018)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1177/1550147718776924","is_oa":true,"landing_page_url":"https://doi.org/10.1177/1550147718776924","pdf_url":"https://journals.sagepub.com/doi/pdf/10.1177/1550147718776924","source":{"id":"https://openalex.org/S64417657","display_name":"International Journal of Distributed Sensor Networks","issn_l":"1550-1329","issn":["1550-1329","1550-1477"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Distributed Sensor Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.6499999761581421,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G3947007103","display_name":null,"funder_award_id":"61472137","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2804835380.pdf","grobid_xml":"https://content.openalex.org/works/W2804835380.grobid-xml"},"referenced_works_count":19,"referenced_works":["https://openalex.org/W287460911","https://openalex.org/W1977242496","https://openalex.org/W1993705641","https://openalex.org/W2013967191","https://openalex.org/W2031708312","https://openalex.org/W2050289638","https://openalex.org/W2053368181","https://openalex.org/W2056526429","https://openalex.org/W2062788751","https://openalex.org/W2078656587","https://openalex.org/W2080279828","https://openalex.org/W2139836766","https://openalex.org/W2273653307","https://openalex.org/W2327589586","https://openalex.org/W2526477928","https://openalex.org/W2576936530","https://openalex.org/W2622711808","https://openalex.org/W2625560003","https://openalex.org/W4241413093"],"related_works":["https://openalex.org/W2366107444","https://openalex.org/W4388145910","https://openalex.org/W2381570729","https://openalex.org/W1976205134","https://openalex.org/W4248336175","https://openalex.org/W2031260042","https://openalex.org/W2391445434","https://openalex.org/W4244478748","https://openalex.org/W3009369890","https://openalex.org/W4312490297"],"abstract_inverted_index":{"In":[0,57,144],"the":[1,5,11,33,60,75,81,85,92,99,102,109,113,120,126,141,148,154,159,170,174,177,183,188],"process":[2],"of":[3,13,29,71,74,84,129,176],"using":[4,119],"cloud":[6,76,106,181,189],"platform,":[7,182],"how":[8],"to":[9,67,134,146,168],"ensure":[10],"safety":[12],"users":[14,103],"is":[15,132],"a":[16,26,48,69,135],"matter":[17],"we":[18],"must":[19],"concern.":[20],"The":[21],"user":[22,34,54],"authentication":[23],"can":[24,88,95,116,185],"provide":[25],"certain":[27],"degree":[28],"security,":[30],"but":[31],"when":[32],"information":[35],"was":[36],"leaked,":[37],"this":[38,45,58,79],"method":[39,184],"will":[40,64],"not":[41],"be":[42,65,89,96,117],"effective.":[43],"Therefore,":[44],"article":[46],"proposes":[47],"trust":[49,83,94,115,131],"evaluation":[50],"model":[51],"based":[52],"on":[53],"behavior":[55,63,73,87,151],"data.":[56],"model,":[59],"user\u2019s":[61,86,149],"historical":[62,111,130,171],"used":[66,167],"construct":[68],"set":[70,133],"trusted":[72],"users.":[77,107,190],"On":[78],"basis,":[80],"direct":[82],"obtained.":[90],"Then,":[91],"recommendation":[93],"calculated":[97],"by":[98,140],"interaction":[100],"between":[101],"and":[104,137,158],"other":[105],"Given":[108],"current":[110],"trust,":[112],"comprehensive":[114,142],"obtained":[118],"weighted":[121],"average":[122],"method.":[123],"Among":[124],"them,":[125],"initial":[127],"value":[128,157,162],"constant":[136],"then":[138],"updated":[139],"trust.":[143,172],"order":[145],"control":[147],"abnormal":[150,160],"more":[152],"effectively,":[153],"suspicious":[155],"threshold":[156,161],"were":[163],"defined,":[164],"which":[165],"are":[166],"punish":[169],"Through":[173],"simulation":[175],"virtual":[178],"digital":[179],"library":[180],"effectively":[186],"evaluate":[187]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":1}],"updated_date":"2026-02-27T16:54:17.756197","created_date":"2025-10-10T00:00:00"}
