Reputation Based Service for Cloud User Environment

سال انتشار: 1393
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 495

فایل این مقاله در 6 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_IJE-27-8_003

تاریخ نمایه سازی: 12 آبان 1393

چکیده مقاله:

Exceptional characteristics of cloud computing have replaced all traditional computing. With reducedresource management and without advance investment, it has been victorious in making the IT world tomigrate towards it. Microsoft announced its office package as Cloud, which can prevent people movingfrom Windows to Linux. As this drift is escalating in an exponential rate, the cloud environment has alsobecome a target for attackers. Hence to acquire the best use of the cloud services, the security issues haveto be dealt with first. Among various security threats faced by the cloud environment, this paper focuseson the most dangerous one, Distributed Denial of Service attack, DDoS. In DDoS attack, a victim istargeted simultaneously by numerous hosts distributed across the network. An attacker compromises thevulnerable systems in the network and infects those systems with malicious code which can trigger thesesystems, called zombies, to send requests in huge numbers to choke the target. This type of attack canhappen both at network as well as service level. Network level attack is achieved by sending simultaneousinvalid or incomplete requests, whereas in service level attacks, the target will be flooded with completerequest for services provided by the CSP, but with malicious intent. These two types of attack trafficshaveto be filtered out at different levels. In this paper, a three phase authentication scheme, REputation basedService for Cloud User Environment (RESCUE) has been proposed that can help the cloud serviceprovider to detect and mitigate both the aforesaid types of DDoS attacks. RESCUE, the proposed schemeauthenticates the users in three different phases. The simulation results presented here exhibits the strengthof the proposed method in detection and prevention of DDoS attack in cloud computing environment.

کلیدواژه ها:

Cloud ComputingDDoS AttackNetwork-level AttackService-level AttackAuthenticationCredits

نویسندگان

n Jeyanthi

School of Information Technology and Engineering, VIT University, Vellore

h Shabeeb

School of Information Technology and Engineering, VIT University, Vellore

m.a Saleem Durai

School of Information Technology and Engineering, VIT University, Vellore

r Thandeeswaran

School of Information Technology and Engineering, VIT University,