An ADS-PAYG Approach Using Trust Factor Against Economic Denial of Sustainability Attacks in Cloud Storage | Wireless Personal Communications Skip to main content
Log in

An ADS-PAYG Approach Using Trust Factor Against Economic Denial of Sustainability Attacks in Cloud Storage

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Cloud computing is a global technology for data storage and retrieving. Many organizations are switching their companies to cloud technology, so that they can lease cloud services for use on a membership or pay as you go basis rather than creating their own systems. Cloud service provider and the Cloud service accessibility are the two major problems in cloud computing. The Economic Denial of Sustainability (EDoS) attack is an important attack towards the cloud service providers. The attackers may send continuous requests to the cloud in a particular second. Hence the legitimate user cannot access the data due to heavy cloud traffic. Hence the paid user cannot access the data. However, this problem makes an economical issue to the users. So this paper presented a new technique as, ADS-PAYG (Attack Defense Shell- Pay As You Go) approach using Trust Factor method against the EDoS attack is proposed to improve more number of authenticated users by fixing a threshold value. The algorithm produced an effective result based on response time, accuracy and CPU utilization. The ADS-PAYG solution is applied using MATLAB, which outperforms other Trust factor estimation methods and effectively distinguishes attackers from legitimate users. The detection accuracy is 83.43% for the given dataset and it is high when compared to the existing algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Liu, H., Wee, S. (2009). Web server farm in the cloud: Performance evaluation and dynamic architecture. In: IEEE International Conference on Cloud Computing. Springer, pp. 369–380.

  2. Bethencourt, J., Sahai, A., Waters, B. (2007). Ciphertext-policy attribute based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP’07). IEEE, pp. 321–334.

  3. Li, W., Xue, K., Xue, Y., & Hong, J. (2016). TMACS: A robust and verifiable threshold multi-authority access control system in public cloud storage. IEEE Transactions on Parallel and Distributed Systems, 27(5), 1484–1496.

    Article  Google Scholar 

  4. Catteddu, D. (2010). Cloud computing: benefits, risks and recommendations for information security. Web application security (pp. 17–17). Springer.

    Chapter  Google Scholar 

  5. Muthukumaran, N. (2017). Analyzing throughput of MANET with reduced packet loss. Wireless Personal Communications, 97(1), 565–578.

    Article  Google Scholar 

  6. Idziorek, J., Tannian, M., Jacobson, D. (2011). Detecting fraudulent use of cloud resources. In: Proceedings of the 3rd ACM workshop on Cloud computing security, ACM. pp. 61–72.

  7. Hong, J., Xue, K., Xue, Y., Chen, W., Wei, D. S., Yu, N., & Hong, P. (2017). TAFC: Time and attribute factors combined access control for time sensitive data in public cloud. IEEE Transactions on Services Computing, 13(1), 158–171.

    Article  Google Scholar 

  8. Shawahna, A., Abu-Amara, M., Ashraf, S. H., & Osais, Y. (2018). EDoS-ADS: An enhanced mitigation technique against economic denial of sustainability (EDoS) attacks. IEEE Computer Society, 8(3), 790–804.

    Google Scholar 

  9. Al-Haidari, F., Sqalli, M., & Salah, K. (2015). Evaluation of the impact of EDoS attacks against cloud computing services. Arabian Journal for Science and Engineering, 43, 773–775.

    Article  Google Scholar 

  10. Anubala, V. P., Muthukumaran, N., Nikitha, R. (2018). Performance analysis of hookworm detection using deep convolutional neural network. In: 2018 International Conference on Smart Systems and Inventive Technology, pp. 348–354, https://doi.org/10.1109/ICSSIT.2018.8748645.

  11. Baig, Z. A., Sait, S. M., & Binbeshr, F. (2016). Controlled access to cloud resources for mitigating economic denial of sustainability (edos) attacks. Computer Networks, 97, 31–47.

    Article  Google Scholar 

  12. Khor, S.H., Nakao, A. (2009). Spow: On-demand cloud-based eddos mitigation mechanism. In: HotDep (FifthWorkshop on Hot Topics in System Dependability).

  13. Masood, M., Anwar, Z., Raza, S. A., Hur, M. A. (2013). Edos armor: A cost effective economic denial of sustainability attack mitigation framework for e-commerce applications in cloud environments. In: Multi Topic Conference (INMIC), 2013 16th International. IEEE, pp. 37–42.

  14. CloudWatch, (2014). Amazon cloudwatch.

  15. Alsowail, S., Sqalli, M. H., Abu-Amara, M., Baig, Z., & Salah, K. (2016). An experimental evaluation of the EDoS-shield mitigation technique for securing the cloud. Arabian Journal for Science and Engineering, 41, 5037–5047.

    Article  Google Scholar 

  16. Somasundaram, A. (2016). Economic denial of sustainability attack on cloud-a survey. ICTACT Journal on Communication Technology, 7(4).

  17. Alsowail, S., Sqalli, M. H., Abu-Amara, M., Baig, Z., & Salah, K. (2016). An experimental evaluation of the edos-shield mitigation technique for securing the cloud. Arabian Journal for Science and Engineering, 41(12), 5037–5047.

    Article  Google Scholar 

  18. Yu, J., Fang, C., Lu, L., Li, Z. (2010). Mitigating application layer distributed denial of service attacks via effective trust management. Published in IET Communications.

  19. Kiran, V., Rani, S., & Singh, P. (2018). Trust based defence system for DDoS attack detection in RPL over internet of things. International Journal of Computer Science and Network Security, 18(12), 239–245.

    Google Scholar 

  20. Karthika, A., Muthukumaran, N., & Joshua Samuel Raj, R. (2020). An ADS-CSAB approach for economic denial of sustainability attacks in cloud storage. International Journal of Scientific & Technology Research, 9(04), 2575–2578.

    Google Scholar 

  21. Al-Haidari, F., Sqalli, M. H., Salah, K. (2012). Enhanced EDoS-shield for mitigating EDoS attacks originating from spoofed IP addresses. In: Paper presented at the IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. Karthika.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Karthika, A., Muthukumaran, N. An ADS-PAYG Approach Using Trust Factor Against Economic Denial of Sustainability Attacks in Cloud Storage. Wireless Pers Commun 122, 69–85 (2022). https://doi.org/10.1007/s11277-021-08889-z

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08889-z

Keywords

Navigation