Cache based Side Channel Attack on AES in Cloud Computing Environment
نویسندگان
چکیده
منابع مشابه
On the Prevention of Cache-Based Side-Channel Attacks in a Cloud Environment
As Cloud services become more commonplace, recent works have uncovered vulnerabilities unique to such systems. Specifically, the paradigm promotes a risk of information leakage across virtual machine isolation via side-channels. Unlike conventional computing, the infrastructure supporting a Cloud environment allows mutually distrusting clients simultaneous access to the underlying hardware, a s...
متن کاملData Replication-Based Scheduling in Cloud Computing Environment
Abstract— High-performance computing and vast storage are two key factors required for executing data-intensive applications. In comparison with traditional distributed systems like data grid, cloud computing provides these factors in a more affordable, scalable and elastic platform. Furthermore, accessing data files is critical for performing such applications. Sometimes accessing data becomes...
متن کاملPreventing Cache Based Side-Channel Attacks for Security in Cloud over Virtual Environment
Cloud computing is a unique technique for outsourcing and aggregating computational hardware needs. By abstracting the underlying machines Cloud computing is able to share resources among multiple mutually distrusting clients. While there are numerous practical benefits to this system, this kind of resource sharing enables new forms of information leakage such as hardware sidechannels. The usag...
متن کاملCache Based Remote Timing Attack on the AES
We introduce a new robust cache-based timing attack on AES. We present experiments and concrete evidence that our attack can be used to obtain secret keys of remote cryptosystems if the server under attack runs on a multitasking or simultaneous multithreading system with a large enough workload. This is an important difference to recent cache-based timing attacks as these attacks either did not...
متن کاملDefense against Cache-based Side Channel Attacks for Secure Cloud Computing
Cloud computing is a combination of various established technologies like virtualization, dynamic elasticity, broad band Internet, etc. to provide configurable computer resources as a service to the users. Resources are shared among many distrusting clients by abstracting the underlying infrastructure using virtualization. While cloud computing has many practical benefits, resource sharing in c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2015
ISSN: 0975-8887
DOI: 10.5120/21126-3776