Abstract
Cloud computing is a global technology for data storage and retrieving. Many organizations are switching their companies to cloud technology, so that they can lease cloud services for use on a membership or pay as you go basis rather than creating their own systems. Cloud service provider and the Cloud service accessibility are the two major problems in cloud computing. The Economic Denial of Sustainability (EDoS) attack is an important attack towards the cloud service providers. The attackers may send continuous requests to the cloud in a particular second. Hence the legitimate user cannot access the data due to heavy cloud traffic. Hence the paid user cannot access the data. However, this problem makes an economical issue to the users. So this paper presented a new technique as, ADS-PAYG (Attack Defense Shell- Pay As You Go) approach using Trust Factor method against the EDoS attack is proposed to improve more number of authenticated users by fixing a threshold value. The algorithm produced an effective result based on response time, accuracy and CPU utilization. The ADS-PAYG solution is applied using MATLAB, which outperforms other Trust factor estimation methods and effectively distinguishes attackers from legitimate users. The detection accuracy is 83.43% for the given dataset and it is high when compared to the existing algorithms.
Similar content being viewed by others
References
Liu, H., Wee, S. (2009). Web server farm in the cloud: Performance evaluation and dynamic architecture. In: IEEE International Conference on Cloud Computing. Springer, pp. 369–380.
Bethencourt, J., Sahai, A., Waters, B. (2007). Ciphertext-policy attribute based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP’07). IEEE, pp. 321–334.
Li, W., Xue, K., Xue, Y., & Hong, J. (2016). TMACS: A robust and verifiable threshold multi-authority access control system in public cloud storage. IEEE Transactions on Parallel and Distributed Systems, 27(5), 1484–1496.
Catteddu, D. (2010). Cloud computing: benefits, risks and recommendations for information security. Web application security (pp. 17–17). Springer.
Muthukumaran, N. (2017). Analyzing throughput of MANET with reduced packet loss. Wireless Personal Communications, 97(1), 565–578.
Idziorek, J., Tannian, M., Jacobson, D. (2011). Detecting fraudulent use of cloud resources. In: Proceedings of the 3rd ACM workshop on Cloud computing security, ACM. pp. 61–72.
Hong, J., Xue, K., Xue, Y., Chen, W., Wei, D. S., Yu, N., & Hong, P. (2017). TAFC: Time and attribute factors combined access control for time sensitive data in public cloud. IEEE Transactions on Services Computing, 13(1), 158–171.
Shawahna, A., Abu-Amara, M., Ashraf, S. H., & Osais, Y. (2018). EDoS-ADS: An enhanced mitigation technique against economic denial of sustainability (EDoS) attacks. IEEE Computer Society, 8(3), 790–804.
Al-Haidari, F., Sqalli, M., & Salah, K. (2015). Evaluation of the impact of EDoS attacks against cloud computing services. Arabian Journal for Science and Engineering, 43, 773–775.
Anubala, V. P., Muthukumaran, N., Nikitha, R. (2018). Performance analysis of hookworm detection using deep convolutional neural network. In: 2018 International Conference on Smart Systems and Inventive Technology, pp. 348–354, https://doi.org/10.1109/ICSSIT.2018.8748645.
Baig, Z. A., Sait, S. M., & Binbeshr, F. (2016). Controlled access to cloud resources for mitigating economic denial of sustainability (edos) attacks. Computer Networks, 97, 31–47.
Khor, S.H., Nakao, A. (2009). Spow: On-demand cloud-based eddos mitigation mechanism. In: HotDep (FifthWorkshop on Hot Topics in System Dependability).
Masood, M., Anwar, Z., Raza, S. A., Hur, M. A. (2013). Edos armor: A cost effective economic denial of sustainability attack mitigation framework for e-commerce applications in cloud environments. In: Multi Topic Conference (INMIC), 2013 16th International. IEEE, pp. 37–42.
CloudWatch, (2014). Amazon cloudwatch.
Alsowail, S., Sqalli, M. H., Abu-Amara, M., Baig, Z., & Salah, K. (2016). An experimental evaluation of the EDoS-shield mitigation technique for securing the cloud. Arabian Journal for Science and Engineering, 41, 5037–5047.
Somasundaram, A. (2016). Economic denial of sustainability attack on cloud-a survey. ICTACT Journal on Communication Technology, 7(4).
Alsowail, S., Sqalli, M. H., Abu-Amara, M., Baig, Z., & Salah, K. (2016). An experimental evaluation of the edos-shield mitigation technique for securing the cloud. Arabian Journal for Science and Engineering, 41(12), 5037–5047.
Yu, J., Fang, C., Lu, L., Li, Z. (2010). Mitigating application layer distributed denial of service attacks via effective trust management. Published in IET Communications.
Kiran, V., Rani, S., & Singh, P. (2018). Trust based defence system for DDoS attack detection in RPL over internet of things. International Journal of Computer Science and Network Security, 18(12), 239–245.
Karthika, A., Muthukumaran, N., & Joshua Samuel Raj, R. (2020). An ADS-CSAB approach for economic denial of sustainability attacks in cloud storage. International Journal of Scientific & Technology Research, 9(04), 2575–2578.
Al-Haidari, F., Sqalli, M. H., Salah, K. (2012). Enhanced EDoS-shield for mitigating EDoS attacks originating from spoofed IP addresses. In: Paper presented at the IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Karthika, A., Muthukumaran, N. An ADS-PAYG Approach Using Trust Factor Against Economic Denial of Sustainability Attacks in Cloud Storage. Wireless Pers Commun 122, 69–85 (2022). https://doi.org/10.1007/s11277-021-08889-z
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-021-08889-z