Cloud computing performs several functionalities, and one of the most important functionalities is the storage and processing of data or information. With day-by-day enhancement of technology, cloud has been overburdened, and to address this issue, the concept of fog computing has been introduced. Fog computing is an extension of the properties of cloud computing to the network’s edge and additionally overcomes its limitations. Despite the growing fame of fog services, assuring the security and privacy of data is still a big challenge. Distributed denial of service (DDoS) attack is a well-known threat among the security concerns and an important research challenge when talking particularly about security of data in fog computing environment. Therefore, this chapter presents a survey which encompasses the various concepts of fog computing, DDoS attacks and some DDoS mitigation techniques, thus providing a comprehensive review. In addition, it beholds the future work in this domain. This chapter will attract new researchers and also strengthen the concept of fog computing.
CITATION STYLE
Paharia, B., & Bhushan, K. (2019). A comprehensive review of distributed denial of service (DDoS) attacks in fog computing environment. In Handbook of Computer Networks and Cyber Security: Principles and Paradigms (pp. 493–524). Springer International Publishing. https://doi.org/10.1007/978-3-030-22277-2_20
Mendeley helps you to discover research relevant for your work.