Main Article Content

Abstract

The network data transmission operations are handled with the Internet Protocol (IP). Each node in the network is allocated with the static or dynamic IP address values. The web applications can be disrupted from various sources. The IP traceback operations are carried out to discover the origin of the received data elements. The Internet Service Provider (ISP) maintains the logs with user data transmission details. The data origin detection is carried out with traceback log analysis. The topology structure of the Internet Service Providers can be extracted by the intruders during the IP traceback operations. The cloud resources are utilized in the IP traceback operations. The authentication and security are provided for the IP trace analysis under the cloud environment. The cloud based traceback services are build with privilege control models. The Framework for Authentication in Cloud-based IP Traceback (FACT) supports the IP traceback operations with security. The FACT scheme performs the user authentication with temporal token details. The traffic flow details and temporal tokens are combined and transferred to the end host. The IP header marking is restricted with header size parameters. The Enhanced FACT model is build with cloud resource based data origin discovery and security features. The Framework for Authentication in Cloud-based IP Traceback (FACT) scheme is upgraded with optimal marking method. The resource provisioning level based incentive assignment model is adapted in the traceback process. The computational overhead is reduced I the temporal token integrity verification process. The cloud resources and traceback data values are protected under the Enhanced Framework for Cloud based IP Traceback (EFACT) scheme. The Distributed Denial of Service (DDoS) attacks are controlled with service request interval and frequency values.

Article Details

How to Cite
Remya M. K, & Nikhila A. (2018). Cloud Resource based Data Origin Detection with Security Features . International Journal of Intellectual Advancements and Research in Engineering Computations, 6(2), 1899–1904. Retrieved from https://ijiarec.com/ijiarec/article/view/756