Cloud computing is crucial to the internet just as air is crucial to breathing. Most users do not even come to think how the cloud architecture is one of the giant pillars on which the entire internet and all its related services depend. In recent times, cloud computing has gained noticeable popularity due to its ability to radically improve computing power through the application of virtual machines. In this era of the internet, however, security threats are increasing and it costs many businesses. The seemingly legitimate traffic of these application-level attacks renders the previous detection and mitigation methods ineffective. These cyber-attacks have grown ever so sophisticated and the detection and mitigation of these attacks have become one of the major concerns of security researchers and cloud service providers all around the globe. In our paper, we are trying to analyze existing research and implementation of the cloud architecture. This analysis will give us insight into the core mechanisms of the cloud architecture and DDoS attacks. Furthermore, we will apply this understanding of ours to design and build an universal mitigation technique for DDoS attacks. An universal solution that works for all scenarios, may take at least a few dozen developers working years on end to develop. Therefore, the goal of this paper will be to lay the foundation on which one day the universal solution may be created.
State government operations comprise a large number of transactions for different processes that must be carried out across the state. This comprises new projects, maintenance and repairs, public employee compensation, and agricultural schemes. Low-level corruption, which is sometimes difficult to trace and hinders state growth, is a big challenge for the top administration. In order to eradicate corruption and bring transparency, technology can be used in an efficient way. An important task to exterminate corruption is to keep track of all the financial transactions of an undergoing project. This research uses blockchain technology to keep track of fund management systems and assure the transparency of any financial statement. This paper proposes to use a gateway where all transaction records are updated in the system and visible to all stakeholders. We find research gaps in the literature and focus on including government funds and local currency usage. The proposed model's motive is to generate a funding model that attains two sub-goals: designing a fund management methodology in which authorized individuals can receive and withdraw allocated funds in crypto currency, and evaluating a smart contract to incorporate the money and identify transparency and tracking. The proposed model executes every feature of our system in just 8.3786ms on average.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.