CFP last date
22 July 2024
Reseach Article

Implementation of DDoS Attack Preemption and Improved Data Integrity in Cloud

by Ashwini Khadke, Mangala Madankar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 141 - Number 3
Year of Publication: 2016
Authors: Ashwini Khadke, Mangala Madankar

Ashwini Khadke, Mangala Madankar . Implementation of DDoS Attack Preemption and Improved Data Integrity in Cloud. International Journal of Computer Applications. 141, 3 ( May 2016), 7-11. DOI=10.5120/ijca2016909575

@article{ 10.5120/ijca2016909575,
author = { Ashwini Khadke, Mangala Madankar },
title = { Implementation of DDoS Attack Preemption and Improved Data Integrity in Cloud },
journal = { International Journal of Computer Applications },
issue_date = { May 2016 },
volume = { 141 },
number = { 3 },
month = { May },
year = { 2016 },
issn = { 0975-8887 },
pages = { 7-11 },
numpages = {9},
url = { },
doi = { 10.5120/ijca2016909575 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-06T23:42:28.404622+05:30
%A Ashwini Khadke
%A Mangala Madankar
%T Implementation of DDoS Attack Preemption and Improved Data Integrity in Cloud
%J International Journal of Computer Applications
%@ 0975-8887
%V 141
%N 3
%P 7-11
%D 2016
%I Foundation of Computer Science (FCS), NY, USA

Nowadays mobile phone is a basic need for everyone. Mobile Cloud Computing is a very convenient & on- demand network access of the shared resources like services, network, applications, Servers & cloud data storages. DDoS attack can be possible on mobile cloud as well as data integrity can also be possible on data stored on mobile cloud. DDoS is one of the largest threads for the internet users & cloud service providers. Data integrity is necessary for any cloud data centre to avoid data corruption or data crash. Security is major dilemma in cloud environment. In Proposed mechanism DDoS is detected & pre-empted by log monitoring of each & every request of services provided. Once attacker has been detected by log monitoring Attacker will be blocked permanently or tentatively depending on the log details. Mobile cloud user needs their data to be safe & private to maintain confidentiality. Data integrity can be achieved by implementing M-AES algorithm to the data stored in mobile cloud. M-AES algorithm preserves the data integrity in mobile cloud computing. Question arises why combining DDoS & Data Integrity? After preventing DDoS attack providing upload & download data services to protect data stored on cloud servers from spoofing, data integrity is provided to data. If a user uploads data & malicious user or hacker tries to modify the data by spoofing in such cases, providing encryption to data before uploading data on cloud as well as by sending verification code to registered email-id as a security purpose. Keep log of file details like file size, date of upload, number of words, type of file by using these parameters spoofing can be detected.

  1. Shui Yu, Yonghong Tian, Song Guo, and Dapeng OliverWu, Fellow ,“Can We Beat DDoS Attacks in Clouds?”, IEEE TRANSACTIONS ON PARALLEL ANDDISTRIBUTED SYSTEMS, VOL. 25, NO. 9, SEPTEMBER 2014.
  2. Aine MacDermott, Qi Shi, Madjid Merabti, and KashifKifiyat , “Considering an Elastic Scaling Model for Cloud Security”, International Conference for Internet Technology and Secured Transactions (ICITST-2013)
  3. Yi Han, Jeffrey Chan, Tansu Alpcan, Christopher Leckie , ” Using Virtual Machine Allocation Policies to Defend against Co-resident Attacks in Cloud Computing”, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2015
  4. Poonam Yadav, Sujata ,” Security Issues in Cloud ComputingSolution of DDOS and IntroducingTwo-Tier CAPTCHA” , International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol.3, No.3, June 2013
  5. Mohammed Faez Al-Jaberi and Anazida Zainal, “Data Integrity and Privacy Model in Cloud Computing”, 2014 International Symposium on Biometrics and Security Technologies (ISBAST).
  6. Satyakshma Rawat, Richa Chowdhary & Dr. Abhay Bansal, “Data Integrity of Cloud Data Storages (CDSs) in Cloud”, Rawat et al., International Journal of Advanced Research in Computer Science and Software Engineering 3(3), March - 2013.
  7. Luminiţa SCRIPCARIU and Mircea-Daniel FRUNZĂ, “Modified Advanced Encryption Standard”, 11th International Conference on DEVELOPMENT AND APPLICATION SYSTEMS, Suceava, Romania, May 17-19, 2012.
  8. Michael Walfish, Mythili Vutukuru, Hari Balakrishnan, David Karger, and Scott Shenker. DDoS defense by offense. In Proceedings of ACM SIGCOMM, 2006.
  9. A. Juels and B.S. Kaliski, Jr., “Pors: proofs of retrievability for large files,” in CCS‟07: Proceedings of the 14th ACM conference on Computer and communications security.
  10. K. D. Bowers, A. Juels, and A. Oprea, “Proofs of Retrievability: Theory and Implementation,” Cryptology ePrint Archive, Report 2008/175,2008.
  11. Haiqin Liu and Min Sik Kim. Real-time detection of stealthy DDoS attacks using time-series decomposition. In Proceedings of IEEE International Conference on Communications 2010, May 2010.
  12. M. Guirguis, A. Bestavros, and I. Matta. Exploiting the transients of adaptation for RoQ attacks on internet resources. In Proceedings of IEEE ICNP, pages 184–195, Berlin, Germany, Oct 2004.
  13. Subashini, S. and V. Kavitha, A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 2011. 34(1): p. 1-11.
  14. D. X. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” in SP ’00: Proceedings of the 2000 IEEE Symposium on Security and Privacy. Washington, DC, USA: IEEE Computer Society, 2000, p. 44
Index Terms

Computer Science
Information Sciences


Mobile Cloud Computing (MCC) Denial-of Service Attack (DoS) Distributed Denial of Service Attack (DDoS) Security Data Integrity