scholarly journals A Performance Perspective Analysis: A Detailed Vision on Denial of Service and Distributed Denial of Service on Cloud Computing

2019 ◽  
Vol 8 (3) ◽  
pp. 3132-3143

In recent days cloud computing and cloud-based service, provisions play a vital and significant role in Internet-based information computing. It interrelates various applications like sales, purchase, banking, customer service, etc. and it behaves entirely as a service-oriented platform or environment. The primary objective of the cloud computing is sharing the resources within increased efficiency regarding time and cost for all kind of customers who needs a cloud service badly and immediately. Though the energy is high, it cannot assure that the cloud computing, service providing, and customer maintenance are highly secured. Service providers in the cloud are not strictly public; it may be private, community and hybrid. Malicious activities can be created or occurred in the middle of the communication and it is difficult to predict a particular person in the middle becomes a malicious user, from where and how. Secured data transmission and discussion in cloud computing considered as the main problem, and various earlier research works focused on tightening the security. The primary objective of this paper is to discuss different security mechanisms applied to multiple malicious threats in the cloud to understand the various issues and challenges faced in earlier research works. It provides a summary of the risks, appropriate method and the limitations and it helps to understand the primary and main problems related to security.

While hosting various cloud based information technology facilities by handling various assets on the internet, Cloud service accessibility has remained one of the chief concerns of cloud service providers (CSP). Several security concerns associated to cloud computing service simulations, and cloud’s major qualities contribute towards its susceptibility of security threats related with cloud service availability, the liability of internet, and the dispense behavior of cloud computing. Distributed Denial of Service (DDoS) attacks is one of the main advanced threats that occur to be extremely problematic and stimulating to stand owing towards its dispersed behavior and resulted in cloud service interruption. Although there exist amount of interruption recognition resolutions anticipated by various investigation groups, there exists not at all such a faultless result that avoids the DDoS attack and cloud service providers (CSP) are presently consuming various detection resolutions by assuring that their product stays well protected. The features of DDoS attack consuming various forms with dissimilar scenarios make it problematic to identify. Inspecting and analyzing various surviving DDoS detecting methods contrary to several factors is accomplished by this paper. To enhance the system performance further, sparse based data optimization is proposed to remove the redundant data. This enhancement reduced the execution time of the system by0.2%.


Author(s):  
Hussain Al-Aqrabi ◽  
Lu Liu

The authors present the key security challenges and solutions on the Cloud with the help of literature reviews and an experimental model created on OPNET that is simulated to produce useful statistics to establish the approach that the Cloud computing service providers should take to provide optimal security and compliance. The literature recommends the concept of unified threat management for ensuring secured services on the Cloud. Through the simulation results, the authors demonstrate that UTM may not be a feasible approach to security implementation as it may become a bottleneck for the application Clouds. The fundamental benefits of Cloud computing (resources on demand and high elasticity) may be diluted if UTMs do not scale up effectively as per the traffic loads on the application Clouds. Moreover, it is not feasible for application Clouds to absorb the performance degradation for security and compliance because UTM will not be a total solution for security and compliance. Applications also share the vulnerabilities just like the systems, which will be out of UTM Cloud’s control.


2016 ◽  
pp. 1585-1610
Author(s):  
Deniz Tuncalp

There are a number of risk domains that are relevant for information privacy and security in cloud-based scenarios and alternative deployment models, which require implementation of a number of controls. However, cloud service providers often take a one-size-fits-all approach and want all their customers to accept the same standardized contract, regardless of their particular information security and legal compliance needs. Taking ISO 27001 Information Security Management standard as a guide, we have employed the Delphi method with a group of cloud computing experts from around the world who are subscribed to the “Cloud Computing” group on LinkedIN to identify the most applicable controls in a generic cloud service provider – customer context. Based on these results, we use a sample of cloud computing customer service agreement as a case study to further discuss related contingencies. As a result, this chapter argues that a more balanced approach is needed in service contracts to ensure the maintenance of necessary service levels and the protection of cloud users.


2012 ◽  
Vol 2 (4) ◽  
pp. 53-65 ◽  
Author(s):  
Veena Goswami ◽  
Sudhansu Shekhar Patra ◽  
G. B. Mund

Cloud is a service oriented platform where all kinds of virtual resources are treated as services to users. Several cloud service providers have offered different capabilities for a variety of market segments over the past few years. The most important aspects of cloud computing are resource scheduling, performance measures, and user requests. Sluggish access to data, applications, and web pages spoils employees and customers alike, as well as cause application crashes and data losses. In this paper, the authors propose an analytical queuing model for performance evaluation of cloud server farms for processing bulk data. Some important performance measures such as mean number of tasks in the queue, blocking probability, and probability of immediate service, and waiting-time distribution in the system have also been discussed. Finally, a variety of numerical results showing the effect of model parameters on key performance measures are presented.


2017 ◽  
Vol 2017 ◽  
pp. 1-14 ◽  
Author(s):  
Keyang Liu ◽  
Weiming Zhang ◽  
Xiaojuan Dong

With the growth of cloud computing technology, more and more Cloud Service Providers (CSPs) begin to provide cloud computing service to users and ask for users’ permission of using their data to improve the quality of service (QoS). Since these data are stored in the form of plain text, they bring about users’ worry for the risk of privacy leakage. However, the existing watermark embedding and encryption technology is not suitable for protecting the Right to Be Forgotten. Hence, we propose a new Cloud-User protocol as a solution for plain text outsourcing problem. We only allow users and CSPs to embed the ciphertext watermark, which is generated and embedded by Trusted Third Party (TTP), into the ciphertext data for transferring. Then, the receiver decrypts it and obtains the watermarked data in plain text. In the arbitration stage, feature extraction and the identity of user will be used to identify the data. The fixed Hamming distance code can help raise the system’s capability for watermarks as much as possible. Extracted watermark can locate the unauthorized distributor and protect the right of honest CSP. The results of experiments demonstrate the security and validity of our protocol.


2012 ◽  
Vol 44 (4) ◽  
pp. 995-1017 ◽  
Author(s):  
Souvik Ghosh ◽  
Soumyadip Ghosh

Cloud-computing shares a common pool of resources across customers at a scale that is orders of magnitude larger than traditional multiuser systems. Constituent physical compute servers are allocated multiple ‘virtual machines' (VMs) to serve simultaneously. Each VM user should ideally be unaffected by others’ demand. Naturally, this environment produces new challenges for the service providers in meeting customer expectations while extracting an efficient utilization from server resources. We study a new cloud service metric that measures prolonged latency or delay suffered by customers. We model the workload process of a cloud server and analyze the process as the customer population grows. The capacity required to ensure that the average workload does not exceed a threshold over long segments is characterized. This can be used by cloud operators to provide service guarantees on avoiding long durations of latency. As part of the analysis, we provide a uniform large deviation principle for collections of random variables that is of independent interest.


Cloud computing has a new edge computing paradigm these days. Sometimes cloud computing architectures don’t support for computer forensics investigations. Analyzing various types of logs and logging mechanism plays an important role in computer forensics. Distributed nature and the multi-tenant cloud models, where many users share the same processing and network resources, collecting, storing and analyzing logs from a cloud is very hard. User activity logs can be a valuable source of information in cloud forensic investigations. Generally, Cloud service providers have access to activity logs of cloud user and CSP can tamper the logs so that investigator cannot reach to the real culprit. In such an environment, log security is one of challenge in the cloud. Logging technique is used to monitor employee’s behavior, to keep track of malicious activities and prevent cloud networks from intrusion by well-known organizations. Ensuring the reliability and integrity of logs is crucial. Most existing solutions for secure logging are designed for traditional systems rather than the complexity of a cloud environment. In the proposed framework secure logging environment is provided by storing and processing activity logs and encrypting using advanced encryption method. It detects DDoS (distributed denial of service) attack on cloud infrastructure by using the published logs on cloud and thus helpful in cloud forensics. It is detected by the investigator using available application activity logs in the cloud server. Searchable encryption algorithm will be used to increase the security of the logging mechanism and to maintain confidentiality and privacy of user data. Proof of past (PPL) logs is created by storing logs at more than one place. This PPL helps in the verification process of changed logs by CSP the actual implementation of this application on AWS Infrastructure as a service ( IAAS ) cloud shows real-time use of this structure


2018 ◽  
Vol 2 (2) ◽  
pp. 51-54
Author(s):  
E.O. Opoku

Ghana has attained cloud readiness indices facilitating services adoption by local enterprises through brokerage firms. Accordingto Gartner group by 2015, at least 20% of all cloud services will be consumed via internal or external cloud service brokerages,rather than directly with service providers. It means enterprises must identify local cloud brokerage firms to intermediate for cloudclients and service providers. We aimed at surveying cloud service awareness among enterprises in Ghana. We performed fieldstudy using statistical tool to analyze data collected among 45-participants spread across 20 local enterprises, using purposivesampling in the selection of strategic enterprise managers located in the second largest city, Kumasi, Ghana. We employedDelphi technique involving three Information Technology experts to validate responses in reducing margin of error in the analysis.We found that 67% respondents are unaware of local cloud service brokerage firms. Alternatively, 33% respondents mentioned atleast one local cloud brokerage firm; although experts believed some did a chess guessing to have it correct. Our Delphi expertsattributed this alarming percentile to lack of policy stakeholders involvement in ensuring cloud adoption readiness. We concludedon effective sensitization of cloud computing service adoption in optimizing data center proliferation by enterprises in Ghana.Adopting cloud computing over data center helps in reducing global warming contributed by heat emissions from computingservers.


2013 ◽  
Vol 572 ◽  
pp. 231-234
Author(s):  
Qi Yu Chen ◽  
Zhi Heng Wu ◽  
Zhi Wen Deng ◽  
Liang Chuan Luo

In this paper, we analyze the service relationship among the participants of integrated manufacturing system, and present a framework of service engineering of integrated manufacturing system. That is a kind of service-oriented manufacturing model. Manufacturers pay more attention to customer participation and their experience in the process of manufacturing and servicing. In the network economy era, integrated manufacturing system is built with the participants network-based cooperation. A new model of service of integrated manufacturing system is based on cloud computing. Service providers offer their services through the network, to make the cooperation more effective, to add the value for customers. At the same time, the coordinated innovation services model become an ordinated way to promote the cooperation of the participants of integrated manufacturing system.


2012 ◽  
Vol 44 (04) ◽  
pp. 995-1017
Author(s):  
Souvik Ghosh ◽  
Soumyadip Ghosh

Cloud-computing shares a common pool of resources across customers at a scale that is orders of magnitude larger than traditional multiuser systems. Constituent physical compute servers are allocated multiple ‘virtual machines' (VMs) to serve simultaneously. Each VM user should ideally be unaffected by others’ demand. Naturally, this environment produces new challenges for the service providers in meeting customer expectations while extracting an efficient utilization from server resources. We study a new cloud service metric that measures prolonged latency or delay suffered by customers. We model the workload process of a cloud server and analyze the process as the customer population grows. The capacity required to ensure that the average workload does not exceed a threshold over long segments is characterized. This can be used by cloud operators to provide service guarantees on avoiding long durations of latency. As part of the analysis, we provide a uniform large deviation principle for collections of random variables that is of independent interest.


Sign in / Sign up

Export Citation Format

Share Document