IDEAS home Printed from https://ideas.repec.org/a/igg/jesma0/v10y2018i3p61-83.html
   My bibliography  Save this article

Survey on DDoS Attacks and Defense Mechanisms in Cloud and Fog Computing

Author

Listed:
  • Deepali Chaudhary

    (National Institute of Technology Kurukshetra, Kurukshetra, India)

  • Kriti Bhushan

    (National Institute of Technology Kurukshetra, Kurukshetra, India)

  • B.B. Gupta

    (National Institute of Technology Kurukshetra, Kurukshetra, India)

Abstract

This article describes how cloud computing has emerged as a strong competitor against traditional IT platforms by offering low-cost and “pay-as-you-go” computing potential and on-demand provisioning of services. Governments, as well as organizations, have migrated their entire or most of the IT infrastructure to the cloud. With the emergence of IoT devices and big data, the amount of data forwarded to the cloud has increased to a huge extent. Therefore, the paradigm of cloud computing is no longer sufficient. Furthermore, with the growth of demand for IoT solutions in organizations, it has become essential to process data quickly, substantially and on-site. Hence, Fog computing is introduced to overcome these drawbacks of cloud computing by bringing intelligence to the edge of the network using smart devices. One major security issue related to the cloud is the DDoS attack. This article discusses in detail about the DDoS attack, cloud computing, fog computing, how DDoS affect cloud environment and how fog computing can be used in a cloud environment to solve a variety of problems.

Suggested Citation

  • Deepali Chaudhary & Kriti Bhushan & B.B. Gupta, 2018. "Survey on DDoS Attacks and Defense Mechanisms in Cloud and Fog Computing," International Journal of E-Services and Mobile Applications (IJESMA), IGI Global, vol. 10(3), pages 61-83, July.
  • Handle: RePEc:igg:jesma0:v:10:y:2018:i:3:p:61-83
    as

    Download full text from publisher

    File URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJESMA.2018070104
    Download Restriction: no
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jesma0:v:10:y:2018:i:3:p:61-83. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.