RETRACTED ARTICLE: Threshold based DDoS mitigation with fog layer in cloud environment
Autor: | S. Senthil Kumar, B. Dhiyanesh, S. Sakthivel, R. Radha |
---|---|
Rok vydání: | 2020 |
Předmět: |
Service (business)
Distributed Computing Environment General Computer Science Computer science business.industry Denial-of-service attack Cloud computing 02 engineering and technology 021001 nanoscience & nanotechnology Computer security computer.software_genre DDoS mitigation Storage security 0202 electrical engineering electronic engineering information engineering 020201 artificial intelligence & image processing 0210 nano-technology business Cloud storage computer Edge computing |
Zdroj: | Journal of Ambient Intelligence and Humanized Computing. 12:7039-7050 |
ISSN: | 1868-5145 1868-5137 |
Popis: | Security is an important to process our data in public network. Most of the have the problem of distributed denial of service attacks, the cloud also a witness of facing distributed denial of service attack. The malicious user generates the malicious request to the service provided towards spoiling the performance of the cloud environment. The throughput of any cloud service is upon successful completion of service invocation. If the malicious user initiates the service if is their service without completing, it would be considered as a distributed denial of service attack. Even though there exists the number of trust verification measures enforced like TPA (third-party auditor) in the cloud environment, there is no sufficient improvement for the performance of the cloud. We propose a sequence integrity data algorithm (SIDA) to perform continuous workload scheduling for various attributes with addition privacy identifies forming (PIF-SIDA) algorithm is to enhance the data are split based on domain and stored in cloud storage. From this, the data are shown based on the domain in which the user searches these are implemented the current research trends, and to help stakeholders in the industry the developing field of edge computing. Verifying the identity of the user is not enough to safeguard the service performance. Distributed environment depends the storage security system by verifying the authenticity and auditing to improve the security. |
Databáze: | OpenAIRE |
Externí odkaz: |