Survey on DDoS Attacks and Defense Mechanisms in Cloud and Fog Computing
This article describes how cloud computing has emerged as a strong competitor against traditional IT platforms by offering low-cost and “pay-as-you-go” computing potential and on-demand provisioning of services. Governments, as well as organizations, have migrated their entire or most of the IT infrastructure to the cloud. With the emergence of IoT devices and big data, the amount of data forwarded to the cloud has increased to a huge extent. Therefore, the paradigm of cloud computing is no longer sufficient. Furthermore, with the growth of demand for IoT solutions in organizations, it has become essential to process data quickly, substantially and on-site. Hence, Fog computing is introduced to overcome these drawbacks of cloud computing by bringing intelligence to the edge of the network using smart devices. One major security issue related to the cloud is the DDoS attack. This article discusses in detail about the DDoS attack, cloud computing, fog computing, how DDoS affect cloud environment and how fog computing can be used in a cloud environment to solve a variety of problems.
Year of publication: |
2018
|
---|---|
Authors: | Chaudhary, Deepali ; Bhushan, Kriti ; Gupta, B.B. |
Published in: |
International Journal of E-Services and Mobile Applications (IJESMA). - IGI Global, ISSN 1941-6288, ZDB-ID 2703291-7. - Vol. 10.2018, 3 (01.07.), p. 61-83
|
Publisher: |
IGI Global |
Subject: | Availability | Cloud Security | DDoS Attack | Fog Computing | Taxonomy | Tools |
Saved in:
Online Resource
Saved in favorites
Similar items by subject
-
Unique Taxonomy for Evaluating Fog Computing Services
Bhardwaj, Akashdeep, (2018)
-
Unique taxonomy for evaluating fog computing services
Bhardwaj, Akashdeep, (2018)
-
Educational technology for teaching and learning
Cruz, Alejandra Maria, (2013)
- More ...
Similar items by person