Abstract
Security is an important to process our data in public network. Most of the have the problem of distributed denial of service attacks, the cloud also a witness of facing distributed denial of service attack. The malicious user generates the malicious request to the service provided towards spoiling the performance of the cloud environment. The throughput of any cloud service is upon successful completion of service invocation. If the malicious user initiates the service if is their service without completing, it would be considered as a distributed denial of service attack. Even though there exists the number of trust verification measures enforced like TPA (third-party auditor) in the cloud environment, there is no sufficient improvement for the performance of the cloud. We propose a sequence integrity data algorithm (SIDA) to perform continuous workload scheduling for various attributes with addition privacy identifies forming (PIF-SIDA) algorithm is to enhance the data are split based on domain and stored in cloud storage. From this, the data are shown based on the domain in which the user searches these are implemented the current research trends, and to help stakeholders in the industry the developing field of edge computing. Verifying the identity of the user is not enough to safeguard the service performance. Distributed environment depends the storage security system by verifying the authenticity and auditing to improve the security.
Similar content being viewed by others
Change history
11 July 2022
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1007/s12652-022-04311-z
References
Youssef BC, Nada M, Elmehdi B, Boubker R (2016) Intrusion detection in cloud computing based attacks patterns and risk assessment. In: 2016 Third International Conference on Systems of Collaboration (SysCo). https://doi.org/10.1109/sysco.2016.7831341.
Deepali, Bhushan K (2017a) DDoS attack mitigation and resource provisioning in cloud using fog computing. In: 2017 International Conference On Smart Technologies For Smart Nation (SmartTechCon). https://doi.org/10.1109/smarttechcon.2017.8358387
Deepali, Bhushan K (2017b) DDoS attack defense framework for cloud using fog computing. In: 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT). https://doi.org/10.1109/rteict.2017.8256654.
Dhiyanesh B (2012) Dynamic resource allocation for machine to cloud communications robotics cloud. In: 2012 International Conference on Emerging Trends in Electrical Engineering and Energy Management (ICETEEEM). https://doi.org/10.1109/iceteeem.2012.6494498.
Dhiyanesh B, Sakthivel S (2016a) F 2 c: an novel distributed denial of service attack mitigation model for SAAS cloud environment. Asian J Res Soc Sci Human 6(6):192–203. https://doi.org/10.5958/2249-7315.2016.00389.0
Dhiyanesh B, Sakthivel S (2016b) UBP-trust: user behavioral pattern based secure trust model for mitigating denial of service attacks in software as a service (SaaS) cloud environment. J Comput Theor Nanosci 13:7649–7654. https://doi.org/10.1166/jctn.2016.5766
Duncan A, Creese S, Goldsmith M (2019) A combined attack-tree and kill-chain approach to designing attack-detection strategies for malicious insiders in cloud computing. In: 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). https://doi.org/10.1109/cybersecpods.2019.8885401
Hasan MM, Rahman MA (2017) Protection by detection: a signaling game approach to mitigate co-resident attacks in cloud. In: 2017 IEEE 10th International Conference on Cloud Computing (CLOUD). https://doi.org/10.1109/cloud.2017.76
Jiao J, Benjun Y, Zhao Y, Stones R, Wang G, Liu X, Wang S, Xie G (2017) Detecting TCP-based DDoS attacks in Baidu cloud computing data centers. https://doi.org/10.1109/SRDS.2017.37
Kasthuripriya S, Dhiyanesh B, Sakthivel S (2016) LFTSM-local flow trust based service monitoring approach for preventing the packet during data transfer in cloud. Asian J Inf Technol 15:3927–3931
Kukreja D, Dhurandher S, Reddy B (2017) Power aware malicious nodes detection for securing MANETs against packet forwarding misbehavior attack. J Ambient Intell Humanized Comput. https://doi.org/10.1007/s12652-017-0496-2
Liang X, Shetty S, Zhang L, Kamhoua C, Kwiat K (2017) Man in the cloud (MITC) defender: SGX-based user credential protection for synchronization applications in cloud computing platform. In: 2017 IEEE 10th International Conference on Cloud Computing (CLOUD). https://doi.org/10.1109/cloud.2017.46
Puri S, Agnihotri M (2017) A proactive approach for cyber attack mitigation in cloud network. In: 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS). https://doi.org/10.1109/icecds.2017.8389740
Ribin JS, Kumar N (2019) Precursory study on varieties of DDoS attacks and its implications in cloud systems. In: 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI). https://doi.org/10.1109/icoei.2019.8862722
Sakthivel S, Dhiyanesh B (2013) A privacy-preserving storage security for spatial data in dynamics cloud environment. In: 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT). https://doi.org/10.1109/icccnt.2013.6726759
Shaikh AA (2016) Attacks on cloud computing and its counter measures. In: 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES). https://doi.org/10.1109/scopes.2016.7955539
Shen J, Zhou T, He D, Zhang Y, Sun X, Xiang Y (2019) Block design-based key agreement for group data sharing in cloud computing. IEEE Trans Depend Secure Comput 16(6):996–1010
Smirnov A, Borisenko K, Shorov A, Novikova E (2016) Network traffic processing module for infrastructure attacks detection in cloud computing platforms. https://doi.org/10.1109/SCM.2016.7519727
Süzen A (2020) Developing a multi-level intrusion detection system using hybrid-DBN. J Ambient Intell Humanized Comput. https://doi.org/10.1007/s12652-020-02271-w
Vishal V, Johari R (2018) SOAiCE: simulation of attacks in cloud computing environment. In: 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence). https://doi.org/10.1109/confluence.2018.8442733
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s12652-022-04311-z"
About this article
Cite this article
Dhiyanesh, B., Sakthivel, S., Radha, R. et al. RETRACTED ARTICLE: Threshold based DDoS mitigation with fog layer in cloud environment. J Ambient Intell Human Comput 12, 7039–7050 (2021). https://doi.org/10.1007/s12652-020-02369-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-020-02369-1