Cloud computing is a promising technology where computational power is provided over internet as per users demand just like the supplies daily utilities of tap water, electricity and gas provided as pay per use. The features of easy accessibility anywhere at any time and almost no burden of on-going operational expenses like running of data-centre makes it one of the fastest growing technologies with the overall business of cloud being anticipated to be above $40 billion by 2012.
Here, cloud computing and its types have been discussed along with two emerging cloud deployment models and two emerging cloud service models. Block chains, Organic Network, Dynamic Trust Management Method (DTMM) and Cloud Compliance have been elaborated. Though data protection laws can be different with change in jurisdiction but here emphasis has been given on data policies existing in India based on IT Act (2000). Finally a reference model has been suggested for avoiding DDoS and Blockchain DDoS Attacks in Cloud Environment. The discussions has been concluded highlighting the recommendations and necessary actions needed for the same.
Other Reads by the Author
The Trial of Hope (Amazon)
An Alien Land (Kobo)
2 Moms (Kobo)
Unfolding Disaster (Kobo)
Walk to School (Kobo)
51 Points in Raising Awesome Kids (Kobo)
Organic IT Infrastructure Planning and Implementation (Amazon)
Grin Books
Positive Employee Recruitment and Retention Vital for Organizations
Digital India Mission. Implications on Social Inclusion and Digital Citizenship
Cloud Computing. DDoS, Blockchain, Regulation and Compliance
Organic eLearning (OE-Learning)
The Way of Prime Minister Narendra Modi's Leadership
Feasibility Study between Continuous Adaptive Risk and Trust Assessment and Organic Networks
I am my supervisor’s slave: Supervisor subordinate relationship is vital for organizational efficiency
Brands and their Shockvertisement Strategies
The Future of Blockchain in Banking
Social Media Marketing: Author’s Quandary Decoded (Amazon)
Table of Contents
Summary
Cloud
DDoS Attacks in Cloud
Blockchain for Cloud
Organic Networks – merger of ‘viral and social’ networks [20]
Using Private Blockchain with DTMM in Cloud Platform
Compliance in Cloud
Conclusion
Objectives and Research Themes
This work aims to address critical security and compliance challenges in cloud computing environments by integrating Blockchain technology, the Dynamic Trust Management Method (DTMM), and principles of Organic Networks to mitigate risks such as DDoS attacks and regulatory non-compliance.
- Analysis of DDoS attack evolution in cloud environments and their impact.
- Exploration of Blockchain technology for secure data storage and transaction integrity.
- Development of a trust-based authentication framework using DTMM to enhance network security.
- Assessment of data protection laws and compliance requirements, specifically referencing the Indian IT Act (2000).
- Proposing a reference model for cloud architecture that integrates security, compliance, and automated trust management.
Excerpt from the Book
Using Private Blockchain with DTMM in Cloud Platform
In dynamic trust management method (DTMM) trust value gets updated according to the performance of the node. The performance analysis of the node will be based on information transaction and trust level of an individual node. It will not depend on recommendation or certificates. The node identification will be done at the system and individual level. So organizations opting for Cloud Technology can put their requirement for a Private Blockchain Network with DTMM for network/node authentication for security reasons. The data here will be stored and updated in blocks with restricted and secure access.
Here dynamic trust management method (DTMM) has been proposed in Figure 2, where the trust value gets updated according to the performance of the node. The performance analysis of the node will be based on information transaction and trust level of an individual node. It will not depend on recommendation or certificates. The node identification will be done at the organizational, system and individual level. For individual level identification both personal and professional level details would be required and access would differ from person to person. The node identification and registration would be category based and will consist of unique identification number (Eg. Aadhaar Card), system identification number, country, state, organization (small, medium, large, global, national and/school, college, companies-government, public, private), individual, purpose, Trust Level and Task.
Summary of Chapters
Summary: Provides an overview of cloud computing benefits and the resulting challenges in security, authentication, and compliance that hinder enterprise adoption.
Cloud: Discusses the fundamentals of cloud computing, its deployment and service models, and the complexity introduced by modern IT infrastructure virtualization.
DDoS Attacks in Cloud: Examines the prevalence and evolution of Distributed Denial of Service attacks in cloud environments, detailing historical attack trends and their financial impact.
Blockchain for Cloud: Introduces Blockchain as a decentralized solution for secure data distribution and storage to mitigate risks like hacking and data alteration.
Organic Networks – merger of ‘viral and social’ networks [20]: Defines the concept of Organic Networks, highlighting the integration of viral and influence-based network theories to create self-adaptive next-generation networks.
Using Private Blockchain with DTMM in Cloud Platform: Proposes a framework for node authentication and security in private blockchains using the Dynamic Trust Management Method to ensure secure access.
Compliance in Cloud: Reviews the legal and regulatory aspects of data privacy, emphasizing the necessity of robust Service Level Agreements and alignment with the Information Technology Act (2000).
Conclusion: Synthesizes the proposed solutions, arguing that integrating DTMM, Organic Networks, and Blockchain facilitates a secure, scalable, and compliant cloud environment.
Keywords
Cloud Computing, DDoS Attacks, Blockchain, DTMM, Organic Networks, Compliance, IT Act 2000, Data Protection, Network Security, Trust Management, SLA, Authentication, Privacy, Decentralized Ledger, Infrastructure Security
Frequently Asked Questions
What is the primary focus of this research?
The research focuses on mitigating security threats, specifically DDoS attacks, and addressing regulatory compliance challenges within cloud computing platforms.
What are the core thematic areas discussed in the book?
The core themes include Cloud architecture, cybersecurity, Blockchain technology, trust-based node management (DTMM), and legal compliance frameworks.
What is the central research question?
The work explores how organizations can leverage Private Blockchain, DTMM, and Organic Network principles to create a secure, compliant, and attack-resistant cloud environment.
Which scientific methodology is primarily employed?
The author uses a framework-based approach, integrating existing technical models (Blockchain, DTMM) and analyzing current legal regulations (IT Act 2000) to propose a new, secure reference model for cloud deployment.
What topics are covered in the main section of the book?
The main sections cover the technical architecture of cloud platforms, the history and impact of DDoS attacks, the mechanics of Private Blockchains, and the systematic approach to managing cloud compliance.
Which keywords best characterize this work?
The work is best characterized by terms such as Cloud Security, Blockchain, Compliance, DDoS Mitigation, DTMM, and Data Protection.
How does DTMM contribute to network security?
DTMM functions as a trust-based authentication method where node trust values are calculated based on performance; this ensures that only trusted nodes can access sensitive data, thereby enhancing network security.
How does the proposed model specifically address Blockchain DDoS attacks?
The model mitigates Blockchain DDoS attacks by utilizing DTMM to manage node reputation and by proposing a system where bandwidth usage is rented and malicious traffic is absorbed.
What role does the Indian IT Act (2000) play in the proposed compliance framework?
The IT Act (2000) serves as the legal foundation for the compliance strategy, specifically regarding data retention, electronic records, and penalties for breaches of confidentiality and privacy.
- Quote paper
- Manisha Kumari Deep (Author), 2018, Cloud Computing. DDoS, Blockchain, Regulation and Compliance, Munich, GRIN Verlag, https://www.grin.com/document/416755