Cloud Security Risks DDOS Attacks and Defense Mechanisms
G.K. Sandhia1, S.V. Kasmir Raja2
1G.K. Sandhia, Assistant Professor, Department of Computer Science & Engineering, SRM Institute of Science and Technology.
2Dr. S. V. Kasmir Raja, Dean Research, SRM Institute of Science and Technology.
Manuscript received on 01 April 2019 | Revised Manuscript received on 07 May 2019 | Manuscript published on 30 May 2019 | PP: 358-362 | Volume-8 Issue-1, May 2019 | Retrieval Number: A3364058119/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Protecting data privacy becomes an important issue with the greater rate of using cloud storage. The most effective solution is to encrypt data prior to uploading to the cloud. Due to benefits such as scalability and reliability, cloud – hosted services are increasingly being used in online businesses such as retail, health care, manufacturing, entertainment. Attackers are attempting to steal confidential information, interrupt services, and damage the cloud computing network of enterprises. How to search data encrypted with different keys efficiently, however, is still an open problem. This paper gives an overview of various security and privacy concerns related to the cloud computing environment and also provides the related solutions for each issue especially for DDOs attacks.
Index Terms: Cloud Storage, DDOS Attacks, Mitigation Techniques, Security.
Scope of the Article: Cloud Computing