International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 141 - Number 3 |
Year of Publication: 2016 |
Authors: Ashwini Khadke, Mangala Madankar |
10.5120/ijca2016909575 |
Ashwini Khadke, Mangala Madankar . Implementation of DDoS Attack Preemption and Improved Data Integrity in Cloud. International Journal of Computer Applications. 141, 3 ( May 2016), 7-11. DOI=10.5120/ijca2016909575
Nowadays mobile phone is a basic need for everyone. Mobile Cloud Computing is a very convenient & on- demand network access of the shared resources like services, network, applications, Servers & cloud data storages. DDoS attack can be possible on mobile cloud as well as data integrity can also be possible on data stored on mobile cloud. DDoS is one of the largest threads for the internet users & cloud service providers. Data integrity is necessary for any cloud data centre to avoid data corruption or data crash. Security is major dilemma in cloud environment. In Proposed mechanism DDoS is detected & pre-empted by log monitoring of each & every request of services provided. Once attacker has been detected by log monitoring Attacker will be blocked permanently or tentatively depending on the log details. Mobile cloud user needs their data to be safe & private to maintain confidentiality. Data integrity can be achieved by implementing M-AES algorithm to the data stored in mobile cloud. M-AES algorithm preserves the data integrity in mobile cloud computing. Question arises why combining DDoS & Data Integrity? After preventing DDoS attack providing upload & download data services to protect data stored on cloud servers from spoofing, data integrity is provided to data. If a user uploads data & malicious user or hacker tries to modify the data by spoofing in such cases, providing encryption to data before uploading data on cloud as well as by sending verification code to registered email-id as a security purpose. Keep log of file details like file size, date of upload, number of words, type of file by using these parameters spoofing can be detected.