Skip to main content
Log in

RETRACTED ARTICLE: Threshold based DDoS mitigation with fog layer in cloud environment

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

This article was retracted on 11 July 2022

This article has been updated

Abstract

Security is an important to process our data in public network. Most of the have the problem of distributed denial of service attacks, the cloud also a witness of facing distributed denial of service attack. The malicious user generates the malicious request to the service provided towards spoiling the performance of the cloud environment. The throughput of any cloud service is upon successful completion of service invocation. If the malicious user initiates the service if is their service without completing, it would be considered as a distributed denial of service attack. Even though there exists the number of trust verification measures enforced like TPA (third-party auditor) in the cloud environment, there is no sufficient improvement for the performance of the cloud. We propose a sequence integrity data algorithm (SIDA) to perform continuous workload scheduling for various attributes with addition privacy identifies forming (PIF-SIDA) algorithm is to enhance the data are split based on domain and stored in cloud storage. From this, the data are shown based on the domain in which the user searches these are implemented the current research trends, and to help stakeholders in the industry the developing field of edge computing. Verifying the identity of the user is not enough to safeguard the service performance. Distributed environment depends the storage security system by verifying the authenticity and auditing to improve the security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Change history

References

  • Youssef BC, Nada M, Elmehdi B, Boubker R (2016) Intrusion detection in cloud computing based attacks patterns and risk assessment. In: 2016 Third International Conference on Systems of Collaboration (SysCo). https://doi.org/10.1109/sysco.2016.7831341.

  • Deepali, Bhushan K (2017a) DDoS attack mitigation and resource provisioning in cloud using fog computing. In: 2017 International Conference On Smart Technologies For Smart Nation (SmartTechCon). https://doi.org/10.1109/smarttechcon.2017.8358387

  • Deepali, Bhushan K (2017b) DDoS attack defense framework for cloud using fog computing. In: 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT). https://doi.org/10.1109/rteict.2017.8256654.

  • Dhiyanesh B (2012) Dynamic resource allocation for machine to cloud communications robotics cloud. In: 2012 International Conference on Emerging Trends in Electrical Engineering and Energy Management (ICETEEEM). https://doi.org/10.1109/iceteeem.2012.6494498.

  • Dhiyanesh B, Sakthivel S (2016a) F 2 c: an novel distributed denial of service attack mitigation model for SAAS cloud environment. Asian J Res Soc Sci Human 6(6):192–203. https://doi.org/10.5958/2249-7315.2016.00389.0

    Article  Google Scholar 

  • Dhiyanesh B, Sakthivel S (2016b) UBP-trust: user behavioral pattern based secure trust model for mitigating denial of service attacks in software as a service (SaaS) cloud environment. J Comput Theor Nanosci 13:7649–7654. https://doi.org/10.1166/jctn.2016.5766

    Article  Google Scholar 

  • Duncan A, Creese S, Goldsmith M (2019) A combined attack-tree and kill-chain approach to designing attack-detection strategies for malicious insiders in cloud computing. In: 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). https://doi.org/10.1109/cybersecpods.2019.8885401

  • Hasan MM, Rahman MA (2017) Protection by detection: a signaling game approach to mitigate co-resident attacks in cloud. In: 2017 IEEE 10th International Conference on Cloud Computing (CLOUD). https://doi.org/10.1109/cloud.2017.76

  • Jiao J, Benjun Y, Zhao Y, Stones R, Wang G, Liu X, Wang S, Xie G (2017) Detecting TCP-based DDoS attacks in Baidu cloud computing data centers. https://doi.org/10.1109/SRDS.2017.37

  • Kasthuripriya S, Dhiyanesh B, Sakthivel S (2016) LFTSM-local flow trust based service monitoring approach for preventing the packet during data transfer in cloud. Asian J Inf Technol 15:3927–3931

    Google Scholar 

  • Kukreja D, Dhurandher S, Reddy B (2017) Power aware malicious nodes detection for securing MANETs against packet forwarding misbehavior attack. J Ambient Intell Humanized Comput. https://doi.org/10.1007/s12652-017-0496-2

  • Liang X, Shetty S, Zhang L, Kamhoua C, Kwiat K (2017) Man in the cloud (MITC) defender: SGX-based user credential protection for synchronization applications in cloud computing platform. In: 2017 IEEE 10th International Conference on Cloud Computing (CLOUD). https://doi.org/10.1109/cloud.2017.46

  • Puri S, Agnihotri M (2017) A proactive approach for cyber attack mitigation in cloud network. In: 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS). https://doi.org/10.1109/icecds.2017.8389740

  • Ribin JS, Kumar N (2019) Precursory study on varieties of DDoS attacks and its implications in cloud systems. In: 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI). https://doi.org/10.1109/icoei.2019.8862722

  • Sakthivel S, Dhiyanesh B (2013) A privacy-preserving storage security for spatial data in dynamics cloud environment. In: 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT). https://doi.org/10.1109/icccnt.2013.6726759

  • Shaikh AA (2016) Attacks on cloud computing and its counter measures. In: 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES). https://doi.org/10.1109/scopes.2016.7955539

  • Shen J, Zhou T, He D, Zhang Y, Sun X, Xiang Y (2019) Block design-based key agreement for group data sharing in cloud computing. IEEE Trans Depend Secure Comput 16(6):996–1010

    Article  Google Scholar 

  • Smirnov A, Borisenko K, Shorov A, Novikova E (2016) Network traffic processing module for infrastructure attacks detection in cloud computing platforms. https://doi.org/10.1109/SCM.2016.7519727

  • Süzen A (2020) Developing a multi-level intrusion detection system using hybrid-DBN. J Ambient Intell Humanized Comput. https://doi.org/10.1007/s12652-020-02271-w

  • Vishal V, Johari R (2018) SOAiCE: simulation of attacks in cloud computing environment. In: 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence). https://doi.org/10.1109/confluence.2018.8442733

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. Dhiyanesh.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s12652-022-04311-z"

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dhiyanesh, B., Sakthivel, S., Radha, R. et al. RETRACTED ARTICLE: Threshold based DDoS mitigation with fog layer in cloud environment. J Ambient Intell Human Comput 12, 7039–7050 (2021). https://doi.org/10.1007/s12652-020-02369-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-02369-1

Keywords

Navigation