2021
DOI: 10.1007/s11277-021-08889-z
|View full text |Cite
|
Sign up to set email alerts
|

An ADS-PAYG Approach Using Trust Factor Against Economic Denial of Sustainability Attacks in Cloud Storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 49 publications
(7 citation statements)
references
References 15 publications
0
7
0
Order By: Relevance
“…The PAYG model gives users the ability to develop platforms, storage, and customize the software according to the needs of the end-user or client. These advantages are the reason that the research community has put so much effort into this modern concept [ 4 ].…”
Section: Introductionmentioning
confidence: 99%
“…The PAYG model gives users the ability to develop platforms, storage, and customize the software according to the needs of the end-user or client. These advantages are the reason that the research community has put so much effort into this modern concept [ 4 ].…”
Section: Introductionmentioning
confidence: 99%
“…• ADS-PAYG: Karthika et al 84 presents a new technique called ADS-PAYG (Attack Defense Shell-Pay As You Go) using the trust factor method to combat EDoS attacks in CC. The ADS-PAYG system comprises three significant stages: cloud service data, load balance, and DDoS shield, aiming to tighten cloud service security.…”
Section: Levelmentioning
confidence: 99%
“…To identify source‐based and spoofing‐based attacks, EDOS‐TSM employs binomial probability, TTL field values from IP packet headers, and multiple TCP SYN requests. The model exhibits enhanced performance compared to existing techniques, with fewer false negatives and increased effectiveness in combating both source‐based and spoofing attacks, when implemented on an OpenStack production‐based cloud. ADS‐PAYG : Karthika et al 84 presents a new technique called ADS‐PAYG (Attack Defense Shell‐Pay As You Go) using the trust factor method to combat EDoS attacks in CC. The ADS‐PAYG system comprises three significant stages: cloud service data, load balance, and DDoS shield, aiming to tighten cloud service security.…”
Section: Defense Mechanism For Indirect Attackmentioning
confidence: 99%
“…Generally, when meeting the above common application technology requirements at the same time, it is necessary to realize the same part of the requirements of the two technologies of computing and storage, and expand the unified interface outward through the service mode, which can simplify the upper-level development. The main research direction of this paper is the storage cloud system that can ensure data security [5]. The content involves two important technologies: ciphertext retrieval technology and access control technology.…”
Section: Introductionmentioning
confidence: 99%