An Efficient Approach for the Security Threats on Data Centers in IOT Environment

Abstract

Internet of Things has progressed from the conjunction of wireless knowledge, MEMS which is termed as micro electromechanical systems, micro facilities and the Internet. The conjunction has helped scratch down the storage walls concerning operating technology (OT) and information technology (IT), and allowing amorphous machine created data to be examined for understandings that will drive enhancements. The Things known as IOT is an arrangement of interconnected computing procedures, mechanical and digital machineries, substances or matters that are delivered with inimitable identifiers, and the ability to handover data over a system without necessitating human to humanoid, or human to computer collaboration. However, the security is one of the main concerns in Internet of things, which should be minimized. There are unnecessary requests from the attacker to overload the data center, which results in the hanging of the servers, decreasing the throughput, and requesting a transmission to the Data centers. This paper deals with an efficient approach to decrease the unwanted request at the Data Centers, so that the sessions will be reduced, and the unnecessary load will be reduced on the data centers, in order to mitigate the effect of attack as much as possible.

Authors and Affiliations

Fahad H. Alshammari

Keywords

Related Articles

A Block Cipher Involving a Key Bunch Matrix and an Additional Key Matrix, Supplemented with Xor Operation and Supported by Key-Based Permutation and Substitution

In this paper, we have developed a block cipher by extending the analysis of a Novel Block Cipher Involving a Key bunch Matrix and a Key-based Permutation and Substitution. Here we have include and additional key matrix,...

Joint Operation in Public Key Cryptography

We believe that there is no real data protection without our own tools. Therefore, our permanent aim is to have more of our own codes. In order to achieve that, it is necessary that a lot of young researchers become inte...

Heuristics Applied to Mutation Testing in an Impure Functional Programming Language

The task of elaborating accurate test suites for pro-gram testing can be an extensive computational work. Mutation testing is not immune to the problem of being a computational and time-consuming task so that it has foun...

Mobile Web Services: State of the Art and Challenges

For many years mobile devices were commonly recognized as Web consumers. However, the advancements in mobile device manufacturing, coupled with the latest achievements in wireless communication developments are both key...

Detection Capability and CFAR Loss Under Fluctuating Targets of Different Swerling Model for Various Gamma Parameters in RADAR

Target detection of RADAR deals with different and manifold problems over few decades. The detection capability is one of the most significant factors in RADAR system. The main aim of detection is to increase probability...

Download PDF file
  • EP ID EP258295
  • DOI 10.14569/IJACSA.2017.080410
  • Views 104
  • Downloads 0

How To Cite

Fahad H. Alshammari (2017). An Efficient Approach for the Security Threats on Data Centers in IOT Environment. International Journal of Advanced Computer Science & Applications, 8(4), 73-80. https://europub.co.uk/articles/-A-258295