Open Access Open Access  Restricted Access Subscription Access

Building and Securing Cloud-based Video Curation Service


Affiliations
1 Department of Computer Science, SRM University, Kattankulathur, Chennai - 603203, Tamil Nadu, India
 

Objectives: Video content consumption has been on a dramatic rise for many years now. More consumers are watching videos on online content portals than television than ever before. This trend is expected to continue far into the future. Methods: Algorithms that crowd-source popular content can be hosted on the cloud and accessed by anyone to make this process significantly easier. At the same time, a cloud based application such as this is prone to malicious attacks and vulnerabilities. Findings: In such a scenario, it becomes imperative to reduce the time taken to find the right content to watch, and automate this process based on the content’s popularity and genre. Applications: To secure the service, a dynamic honeypot can be constructed. A Dynamic Honeypot allows unauthorized access to systems, thereby allowing us to learn the methods employed by the attackers and protect against them in the future, without causing damage to the system. Additionally, a rate Limiter can also be implemented to restrict the number of requests made to the service within a specific time frame. This is done to limit and avoid malicious attacks such as DDoS.

Keywords

Cloud Security, Honeypot, Leaky Bucket Algorithm, Rate Limiter.
User

Abstract Views: 153

PDF Views: 0




  • Building and Securing Cloud-based Video Curation Service

Abstract Views: 153  |  PDF Views: 0

Authors

R. Mangalagowri
Department of Computer Science, SRM University, Kattankulathur, Chennai - 603203, Tamil Nadu, India
Shashank Bhardwaj
Department of Computer Science, SRM University, Kattankulathur, Chennai - 603203, Tamil Nadu, India

Abstract


Objectives: Video content consumption has been on a dramatic rise for many years now. More consumers are watching videos on online content portals than television than ever before. This trend is expected to continue far into the future. Methods: Algorithms that crowd-source popular content can be hosted on the cloud and accessed by anyone to make this process significantly easier. At the same time, a cloud based application such as this is prone to malicious attacks and vulnerabilities. Findings: In such a scenario, it becomes imperative to reduce the time taken to find the right content to watch, and automate this process based on the content’s popularity and genre. Applications: To secure the service, a dynamic honeypot can be constructed. A Dynamic Honeypot allows unauthorized access to systems, thereby allowing us to learn the methods employed by the attackers and protect against them in the future, without causing damage to the system. Additionally, a rate Limiter can also be implemented to restrict the number of requests made to the service within a specific time frame. This is done to limit and avoid malicious attacks such as DDoS.

Keywords


Cloud Security, Honeypot, Leaky Bucket Algorithm, Rate Limiter.



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i37%2F126860