Final Report Survey on Cache Partition for Cloud Security Purpose
نویسندگان
چکیده
Cache-based side-channel is a behavior of cache memory which will possibly leak secret information. In cloud computing services, providers share physical resources, i.e. infrastructures, to support multi-tenancy of cloud platform, which will achieve high quality of cost efficiency, availability, and on-demand scaling. However, by sharing the infrastructure, sensitive data from individual users will leak to the public or some malicious user through hardware side-channels, such as the cache-based side-channel mentioned above. Side-channel attack through CPU-caches is usually leveraged by adversaries, such as Flush-Reload based side-channel attack in PaaS cloud computing services by Zhang et al. in 2014. By this survey, we aim at finding an effective way to mitigate the risk coming from shared cache. Recent years, concepts and techniques about cache partitioning are proposed. The general idea is to control the accessibility of running instances, such processes or VMs, to shared level cache, preventing the accessible region on the shared cache of each instance from overlapping.
منابع مشابه
A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
متن کاملMid-term Report
Cache-based side-channel is an application-specific behavior of cache memory which will possibly leak secret information. In cloud computing services, providers share physical resources, i.e. infrastructures, to support multi-tenancy of cloud platform, which will achieve high quality of cost efficiency, availability, and on-demand scaling. However, by sharing the infrastructure, sensitive data ...
متن کاملEnhanced Flush+Reload Attack on AES
In cloud computing, multiple users can share the same physical machine that can potentially leak secret information, in particular when the memory de-duplication is enabled. Flush+Reload attack is a cache-based attack that makes use of resource sharing. T-table implementation of AES is commonly used in the crypto libraries like OpenSSL. Several Flush+Reload attacks on T-table implementat...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015