Skip to main content

A Load-Balancing User Management Approach to Prevent DDoS Attack at Cloud Network

  • Conference paper
  • First Online:
Rising Threats in Expert Applications and Solutions

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1187))

  • 1131 Accesses

Abstract

Data storage and privacy are the major concerns in the cloud environment. Cloud space is said to be fast if it utilizes the space efficiently. Also, to speed up the entire process, it is also required to choose specific algorithms for the encryption of the data. This paper presents a hybrid solution to the selection of algorithms for encryption. Data duplication is also one of the major concerns in cloud computing. If the duplication rate is very high then it is turned as DDoS (Distributed Denial of Service) which results into a huge waste of resources. This paper is also concerned about the identification and removal of the DDoS attack. For the same purpose, Artificial Bee Colony Algorithm has been used. An enhanced genetic algorithm for the minimization of unused data bit patterns to prevent the user from the additional costs is also proposed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. S. Chaisiri, B.S. Lee, D. Niyato, Optimization of resource provisioning cost in cloud computing. IEEE Trans. Serv. Comput. 5(2), 164–177 (2011)

    Article  Google Scholar 

  2. Y. Chen, K. Hwang, W.S. Ku, Collaborative detection of DDoS attacks over multiple network domains. IEEE Trans. Parallel Distrib. Syst. 18(12), 1649–1662 (2007)

    Article  Google Scholar 

  3. X.Y. Hua, J. Zheng, W.X. Hu, Ant colony optimization algorithm for computing resource allocation based on cloud computing environment. J. East China Normal Univ. (Nat. Sci.) 1(1), 127–134 (2010)

    Google Scholar 

  4. S. Kaur, A. Verma, An efficient approach to genetic algorithm for task scheduling in cloud computing environment. Int. J. Inf. Technol. Comput. Sci. (IJITCS) 4(10), 74 (2012)

    Google Scholar 

  5. S. Kapur, D. Kumar, Resource utilization in cloud computing using hybrid algorithm. Indian J. Sci. Technol. 9(43), 1–10 (2016)

    Article  Google Scholar 

  6. D.B. LD, P.V. Krishna, Honey bee behavior inspired load balancing of tasks in cloud computing environments. Appl. Soft Comput. 13(5), 2292–2303

    Google Scholar 

  7. Z. Tan, A. Jamdagni, X. He, P. Nanda, R.P. Liu, J. Hu, Detection of denial-of-service attacks based on computer vision techniques. IEEE Trans. Comput. 64(9), 2519–2533 (2014)

    Article  MathSciNet  Google Scholar 

  8. J. Yao, J.H. He, Load balancing strategy of cloud computing based on artificial bee algorithm, in 2012 8th International Conference on Computing Technology and Information Management (NCM and ICNIT), vol. 1. (IEEE, 2012), pp. 185–189

    Google Scholar 

  9. S. Kapur, D. Kumar, Key selective secure privacy framework for user management and to improvise performance parameters. IJCSIS 15(3) (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sandeep Kapur .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kapur, S., Kumar, D. (2021). A Load-Balancing User Management Approach to Prevent DDoS Attack at Cloud Network. In: Rathore, V.S., Dey, N., Piuri, V., Babo, R., Polkowski, Z., Tavares, J.M.R.S. (eds) Rising Threats in Expert Applications and Solutions. Advances in Intelligent Systems and Computing, vol 1187. Springer, Singapore. https://doi.org/10.1007/978-981-15-6014-9_35

Download citation

Publish with us

Policies and ethics