Abstract
Data storage and privacy are the major concerns in the cloud environment. Cloud space is said to be fast if it utilizes the space efficiently. Also, to speed up the entire process, it is also required to choose specific algorithms for the encryption of the data. This paper presents a hybrid solution to the selection of algorithms for encryption. Data duplication is also one of the major concerns in cloud computing. If the duplication rate is very high then it is turned as DDoS (Distributed Denial of Service) which results into a huge waste of resources. This paper is also concerned about the identification and removal of the DDoS attack. For the same purpose, Artificial Bee Colony Algorithm has been used. An enhanced genetic algorithm for the minimization of unused data bit patterns to prevent the user from the additional costs is also proposed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
S. Chaisiri, B.S. Lee, D. Niyato, Optimization of resource provisioning cost in cloud computing. IEEE Trans. Serv. Comput. 5(2), 164–177 (2011)
Y. Chen, K. Hwang, W.S. Ku, Collaborative detection of DDoS attacks over multiple network domains. IEEE Trans. Parallel Distrib. Syst. 18(12), 1649–1662 (2007)
X.Y. Hua, J. Zheng, W.X. Hu, Ant colony optimization algorithm for computing resource allocation based on cloud computing environment. J. East China Normal Univ. (Nat. Sci.) 1(1), 127–134 (2010)
S. Kaur, A. Verma, An efficient approach to genetic algorithm for task scheduling in cloud computing environment. Int. J. Inf. Technol. Comput. Sci. (IJITCS) 4(10), 74 (2012)
S. Kapur, D. Kumar, Resource utilization in cloud computing using hybrid algorithm. Indian J. Sci. Technol. 9(43), 1–10 (2016)
D.B. LD, P.V. Krishna, Honey bee behavior inspired load balancing of tasks in cloud computing environments. Appl. Soft Comput. 13(5), 2292–2303
Z. Tan, A. Jamdagni, X. He, P. Nanda, R.P. Liu, J. Hu, Detection of denial-of-service attacks based on computer vision techniques. IEEE Trans. Comput. 64(9), 2519–2533 (2014)
J. Yao, J.H. He, Load balancing strategy of cloud computing based on artificial bee algorithm, in 2012 8th International Conference on Computing Technology and Information Management (NCM and ICNIT), vol. 1. (IEEE, 2012), pp. 185–189
S. Kapur, D. Kumar, Key selective secure privacy framework for user management and to improvise performance parameters. IJCSIS 15(3) (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kapur, S., Kumar, D. (2021). A Load-Balancing User Management Approach to Prevent DDoS Attack at Cloud Network. In: Rathore, V.S., Dey, N., Piuri, V., Babo, R., Polkowski, Z., Tavares, J.M.R.S. (eds) Rising Threats in Expert Applications and Solutions. Advances in Intelligent Systems and Computing, vol 1187. Springer, Singapore. https://doi.org/10.1007/978-981-15-6014-9_35
Download citation
DOI: https://doi.org/10.1007/978-981-15-6014-9_35
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-6013-2
Online ISBN: 978-981-15-6014-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)