Amazing technological breakthrough possible @S-Logix

Office Address

  • #5, First Floor, 4th Street Dr. Subbarayan Nagar Kodambakkam, Chennai-600 024 Landmark : Samiyar Madam
  • +91- 81240 01111

Social List

Implementation of DDoS Attack Preemption and Improved Data Integrity in Cloud - 2016

Implementation of DDoS Attack Preemption and Improved Data Integrity in Cloud

Research Area:  Cloud Computing


Nowadays mobile phone is a basic need for everyone. Mobile Cloud Computing is a very convenient & on- demand network access of the shared resources like services, network, applications, Servers & cloud data storages. DDoS attack can be possible on mobile cloud as well as data integrity can also be possible on data stored on mobile cloud. DDoS is one of the largest threads for the internet users & cloud service providers. Data integrity is necessary for any cloud data centre to avoid data corruption or data crash. Security is major dilemma in cloud environment. In Proposed mechanism DDoS is detected & pre-empted by log monitoring of each & every request of services provided. Once attacker has been detected by log monitoring Attacker will be blocked permanently or tentatively depending on the log details. Mobile cloud user needs their data to be safe & private to maintain confidentiality. Data integrity can be achieved by implementing M-AES algorithm to the data stored in mobile cloud. M-AES algorithm preserves the data integrity in mobile cloud computing. Question arises why combining DDoS & Data Integrity? After preventing DDoS attack providing upload & download data services to protect data stored on cloud servers from spoofing, data integrity is provided to data. If a user uploads data & malicious user or hacker tries to modify the data by spoofing in such cases, providing encryption to data before uploading data on cloud as well as by sending verification code to registered email-id as a security purpose. Keep log of file details like file size, date of upload, number of words, type of file by using these parameters spoofing can be detected.


Author(s) Name:  Ashwini Khadke and Mangala Madankar

Journal name:  International Journal of Computer Applications

Conferrence name:  

Publisher name:  IJCA

DOI:  10.5120/ijca2016909575

Volume Information:  Volume 141 - Number 3