Efficiency Evaluation of HRF mechanism on EDoS attacks in Cloud Computing Services

2022 ◽  
Vol 40 (1/2/3) ◽  
pp. 1
Author(s):  
J. Sunny Deol . G. ◽  
Suneetha Bulla ◽  
Nageswara Rao Jarapala ◽  
Veeraiah Duggineni ◽  
Rajendra Kumar G
2017 ◽  
Vol 7 (1.5) ◽  
pp. 202 ◽  
Author(s):  
Suneetha Bulla ◽  
B. Basaveswara Rao ◽  
K. Gangadhara Rao ◽  
K. Chandan

Cloud computing is that the one among the quickest making and rising development in IT trade on pay-as – you-go premise. Flexibility is that the one among the properties of the cloud computing, it exhibits the response for DDoS ambush and created new quite strike significantly EDoS assault .This paper displays the impact of EDoS assaults on the cloud computing services, touching on single category of service. A check demonstrate was made public, performed associated contrasted and an expositive lining model. The trial test-bed was directed on Amazon internet Services cloud platform, it catches the cloud edges and incorporates range of execution measurements and value measurements, as an instance, range of running cases on the cloud, latency or latency , usage of distributed computing assets, throughput, and also the caused value as a result of the assault. The outcomes square measure introduced and conclusions square measure talked concerning.


2014 ◽  
Vol 3 ◽  
pp. 94-112
Author(s):  
Angelė Pečeliūnaitė

The article analyses the possibility of how Cloud Computing can be used by libraries to organise activities online. In order to achieve a uniform understanding of the essence of technology SaaS, IaaS, and PaaS, the article discusses the Cloud Computing services, which can be used for the relocation of libraries to the Internet. The improvement of the general activity of libraries in the digital age, the analysis of the international experience in the libraries are examples. Also the article discusses the results of a survey of the Lithuanian scientific community that confirms that 90% of the scientific community is in the interest of getting full access to e-publications online. It is concluded that the decrease in funding for libraries, Cloud Computing can be an economically beneficial step, expanding the library services and improving their quality.


Author(s):  
Shengju Yang

In order to solve the trust problems between users and cloud computing service providers in cloud computing services, the existing trust evaluation technology and access control technology in the cloud computing service are analyzed. And the evaluation index of cloud computing is also analyzed. Users can calculate the relevant indicators of cloud computing service according to their own business goals, and choose the appropriate cloud computing services according to their own trust need. In addition, the reliability assessment method of users based on the service process is proposed. Cloud computing access control system can be used for user credibility evaluation, and it can handle user access requests according to user's creditability. In the study, a cloud computing service trust evaluation tool is designed, and the modeling and architecture designs of trust evaluation are also given. The effectiveness of the method is verified by experiments on cloud computing service evaluation methods.


2021 ◽  
Vol 10 (5/6) ◽  
pp. 533
Author(s):  
Moulhime El Bekkali ◽  
Benaissa Bernoussi ◽  
Mohammed Fattah ◽  
Said Mazer ◽  
Younes Balboul ◽  
...  

Cloud computing services mature both economically and technologically and play a more and more extensive role in the domain of software and information systems engineering. SaaS offers advantage for both service providers and consumers. SaaS is faced with the question of appropriate techniques applying at early phase of Requirements engineering of producing system. The paper highlights two traditional methods namely i* and VORD belonging respectively to Goal oriented Requirements Engineering and Viewpoints approaches. The approach proposed try to dealing with the requirements elicitation in the context of Software-as-a-service SaaS. So, the approach benefits from strengths of both VORD and i* models and propose a combination of them in a new approach namely VORDi*.


Sign in / Sign up

Export Citation Format

Share Document