RETRACTED ARTICLE: Threshold based DDoS mitigation with fog layer in cloud environment

Security is an important to process our data in public network. Most of the have the problem of distributed denial of service attacks, the cloud also a witness of facing distributed denial of service attack. The malicious user generates the malicious request to the service provided towards spoiling...

Full description

Saved in:
Bibliographic Details
Published inJournal of ambient intelligence and humanized computing Vol. 12; no. 7; pp. 7039 - 7050
Main Authors Dhiyanesh, B., Sakthivel, S., Radha, R., Senthil Kumar, S.
Format Journal Article
LanguageEnglish
Published Berlin/Heidelberg Springer Berlin Heidelberg 01.07.2021
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN1868-5137
1868-5145
DOI10.1007/s12652-020-02369-1

Cover

More Information
Summary:Security is an important to process our data in public network. Most of the have the problem of distributed denial of service attacks, the cloud also a witness of facing distributed denial of service attack. The malicious user generates the malicious request to the service provided towards spoiling the performance of the cloud environment. The throughput of any cloud service is upon successful completion of service invocation. If the malicious user initiates the service if is their service without completing, it would be considered as a distributed denial of service attack. Even though there exists the number of trust verification measures enforced like TPA (third-party auditor) in the cloud environment, there is no sufficient improvement for the performance of the cloud. We propose a sequence integrity data algorithm (SIDA) to perform continuous workload scheduling for various attributes with addition privacy identifies forming (PIF-SIDA) algorithm is to enhance the data are split based on domain and stored in cloud storage. From this, the data are shown based on the domain in which the user searches these are implemented the current research trends, and to help stakeholders in the industry the developing field of edge computing. Verifying the identity of the user is not enough to safeguard the service performance. Distributed environment depends the storage security system by verifying the authenticity and auditing to improve the security.
Bibliography:retraction
ObjectType-Correction/Retraction-1
SourceType-Scholarly Journals-1
content type line 14
ISSN:1868-5137
1868-5145
DOI:10.1007/s12652-020-02369-1