Cloud Security
  1. 212 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

About this book

This book presents research on the state-of-the-art methods and applications. Security and privacy related issues of cloud are addressed with best practices and approaches for secure cloud computing, such as cloud ontology, blockchain, recommender systems, optimization strategies, data security, intelligent algorithms, defense mechanisms for mitigating DDoS attacks, potential communication algorithms in cloud based IoT, secure cloud solutions.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Cloud Security by Sirisha Potluri, Katta Subba Rao, Sachi Nandan Mohanty, Sirisha Potluri,Katta Subba Rao,Sachi Nandan Mohanty in PDF and/or ePUB format, as well as other popular books in Computer Science & IT Industry. We have over one million books available in our catalogue for you to explore.

Information

Publisher
De Gruyter
Year
2021
eBook ISBN
9783110732702
Edition
1

Security and Privacy Preservation Model to Mitigate DDoS Attacks in Cloud

Sirisha Potluri
Sachi Nandan Mohanty
T. Kundana
D. Abhinav
P. Sushrutha

Abstract

Denial-of-service (DoS) attack occurrences are among the key security challenges within the rising cloud computing models. Currently, a number of different types of DoS attacks are conducted against the various cloud services and resources, which target their availability, service level agreements SLAs, and performance. A successful DDoS attack would possibly lead to service degradation or complete outage. DDoS attacks will reduce the network re-sources which may result in bandwidth depletion. The main objective of DDoS attacks is to prevent certain users from accessing the services in the cloud. In this research, we propose a privacy-preserving cross-domain at-tacks detection scheme for SDNs. Predis may be a combination of perturbation encryption and encoding to guard the privacy and uses a computationally simple and efficient machine learning algorithm k-Nearest Neighbour (KNN) for its detection. Here we also improve the KNN to achieve much better efficiency. Through extensive simulations and theoretical analysis. The DEMO of this algorithm is capable to realize the detection process efficient and accurate attack detection by keeping sensitive information secure. Virtualization enables simultaneous sharing of resources from a single server to some applications or services, this induces a certain amount of threats and security issues for the cloud. This module focuses on identifying challenges related to cloud security and tries to introduce ways in resolving these issues
Keywords: Denial-of-Service, KNN, Software Defined Networks, Cryptography, Virtualization, Cloud Security, Cloud Privacy,

1 Introduction

The practice of employing a network of remote servers hosted on the web to store, manage, and process data, instead of a local server or a private computer is called cloud computing. It is a pay-for-use model. Cloud computing can be considered as the future of the emerging technologies because of the combination of emerging technologies like virtualization and service oriented architecture. Based on the deployment models there are various types of clouds [1].
  • Public/Internet Cloud
  • Private/Enterprise Cloud
  • Hybrid/Mixed Cloud
  • Community Cloud
Public cloud is designed for a substantial set of public clients, Private clouds services are available only for the cloud owners. The combination of two or more clouds can be considered as hybrid cloud where in the two clouds can be either public or community or private clouds, broadly community clouds services are shared between several organizations.
Cloud provides services using various models like Software as a Service, Platform as a Service and Infrastructure as a Service.
  • SaaS: It provides user access to software applications. These software applications which are present in the cloud are used for an enormous range of tasks.
  • PaaS: It provides all the hardware and software components that are required to build cloud-based applications.
  • IaaS: It dispenses services like storage, security tools, and networking for end users.
Several critical security attacks are designed and proposed against various cloud deployment models which pose severe security risks to the adaptor. Attacks such as wrapping, malware injection, and other attacks can be conducted against cloud computing. One such security attack is the Denial of Service (DoS) attack. It is an event or malicious behaviour that mitigates or prevents the cloud’s security to perform its expected functions and services. A distributed form of DoS attack is called a Distributed Denial of Service (DDoS) attack which applies numerous network hosts to inflict more effects on the dupe [2].
DDoS attacks can be classified into the subsequent categories
  • Attacks on Bandwidth
  • Physical Disruption.
  • Limitation Exploitation
  • Attacks on Connectivity
  • Exhaustion of Resources
  • Process disruption
  • Data corruption
Software-Defined Networks (SDNs) have emerged as a new communication paradigm, released from direct integration into traditional networks and provides a system and network flexibility through a sensible network controller. SDNs contain a data plane, a control plane, and an application plane. The control plane contains some controllers that use the logic control strategy and maintain the entire network view as logic-centric. Administrators remove all network views from network services and provide an easy-to-use interface for providers, researchers, or third parties to facilitate these employees to customize transaction plans and see reasonable network management. SDNs users do not have to worry about the technical details of the device below, a simple system can detect the fast delivery of new applications
Advanced control features and systems enable SDNs to be exposed to known as Distribute...

Table of contents

  1. Title Page
  2. Copyright
  3. Contents
  4. Preface
  5. List of Abbreviations
  6. List of Contributors
  7. Cloud Security Concepts, Threats and Solutions: Artificial Intelligence Based Approach
  8. Addressing Security and Privacy in Cloud Computing: Blockchain as a Service
  9. Security and Privacy Preservation Model to Mitigate DDoS Attacks in Cloud
  10. A Secure Cloud Infrastructure towards Smart Healthcare: IoT Based Health Monitoring
  11. Internet of Cloud: Secure and Privacy Preserving Cloud Model with IoT Enabled Service
  12. Marketing analytics as a Service: Secure Cloud Based Automation Strategy
  13. Next Generation Cloud Security: State of the Art Machine Learning Model
  14. Secure Intelligent Framework for VANET: Cloud Based Transportation Model
  15. Cloud Manufacturing Service: A Secure and Protected Communication System
  16. Index