Reference Hub28
Survey on DDoS Attacks and Defense Mechanisms in Cloud and Fog Computing

Survey on DDoS Attacks and Defense Mechanisms in Cloud and Fog Computing

Deepali Chaudhary, Kriti Bhushan, B.B. Gupta
Copyright: © 2018 |Volume: 10 |Issue: 3 |Pages: 23
ISSN: 1941-627X|EISSN: 1941-6288|EISBN13: 9781522543688|DOI: 10.4018/IJESMA.2018070104
Cite Article Cite Article

MLA

Chaudhary, Deepali, et al. "Survey on DDoS Attacks and Defense Mechanisms in Cloud and Fog Computing." IJESMA vol.10, no.3 2018: pp.61-83. http://doi.org/10.4018/IJESMA.2018070104

APA

Chaudhary, D., Bhushan, K., & Gupta, B. (2018). Survey on DDoS Attacks and Defense Mechanisms in Cloud and Fog Computing. International Journal of E-Services and Mobile Applications (IJESMA), 10(3), 61-83. http://doi.org/10.4018/IJESMA.2018070104

Chicago

Chaudhary, Deepali, Kriti Bhushan, and B.B. Gupta. "Survey on DDoS Attacks and Defense Mechanisms in Cloud and Fog Computing," International Journal of E-Services and Mobile Applications (IJESMA) 10, no.3: 61-83. http://doi.org/10.4018/IJESMA.2018070104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This article describes how cloud computing has emerged as a strong competitor against traditional IT platforms by offering low-cost and “pay-as-you-go” computing potential and on-demand provisioning of services. Governments, as well as organizations, have migrated their entire or most of the IT infrastructure to the cloud. With the emergence of IoT devices and big data, the amount of data forwarded to the cloud has increased to a huge extent. Therefore, the paradigm of cloud computing is no longer sufficient. Furthermore, with the growth of demand for IoT solutions in organizations, it has become essential to process data quickly, substantially and on-site. Hence, Fog computing is introduced to overcome these drawbacks of cloud computing by bringing intelligence to the edge of the network using smart devices. One major security issue related to the cloud is the DDoS attack. This article discusses in detail about the DDoS attack, cloud computing, fog computing, how DDoS affect cloud environment and how fog computing can be used in a cloud environment to solve a variety of problems.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.