Preventing Cache Based Side-Channel Attacks for Security in Cloud over Virtual Environment

نویسندگان

  • S. Vengadesan
  • B. Muthulakshmi
چکیده

Cloud computing is a unique technique for outsourcing and aggregating computational hardware needs. By abstracting the underlying machines Cloud computing is able to share resources among multiple mutually distrusting clients. While there are numerous practical benefits to this system, this kind of resource sharing enables new forms of information leakage such as hardware sidechannels. The usage of CPU-cache based side-channels in the Cloud and how they compare to traditional side-channel attacks. New techniques are necessary to mitigate these sorts of attacks in a Cloud environment, and specify the requirement for such solutions was developed. The security issues faced by cloud service providers and the service issues faced by the cloud customers are analysed. In the existing system, providing security in cloud requires a huge amount of money based on the service on demand in cloud environment. The extensive use of virtualization in implementing cloud environment brings unique security providence for the cloud customers and all other resellers &subscribers of a public cloud service access. In the proposed system, an effective firewall security has been implemented for blocking and filtering the unwanted requests from the clients before the request reaches the virtual machine destination. During the request processing, if the user requests the high level data from the cloud, the data can be provided against payment.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Prevention of Cache-Based Side-Channel Attacks in a Cloud Environment

As Cloud services become more commonplace, recent works have uncovered vulnerabilities unique to such systems. Specifically, the paradigm promotes a risk of information leakage across virtual machine isolation via side-channels. Unlike conventional computing, the infrastructure supporting a Cloud environment allows mutually distrusting clients simultaneous access to the underlying hardware, a s...

متن کامل

Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud

Information security and privacy in general are major concerns that impede enterprise adaptation of shared or public cloud computing. Specifically, the concern of virtual machine (VM) physical co-residency stems from the threat that hostile tenants can leverage various forms of side channels (such as cache covert channels) to exfiltrate sensitive information of victims on the same physical syst...

متن کامل

Cache-based Side-channel Attacks in Multi-tenant Public Clouds and Their Countermeasures

Yinqian Zhang: Cache-based Side-Channel Attacks in Multi-Tenant Public Clouds and Their Countermeasures (Under the direction of Michael Reiter) Cloud computing is gaining traction due to the business agility, resource scalability and operational efficiency that it enables. However, the murkiness of the security assurances offered by public clouds to their tenants is one of the major impediments...

متن کامل

DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks

In cloud computing environments, multiple tenants are often co-located on the same multi-processor system. Thus, preventing information leakage between tenants is crucial. While the hypervisor enforces software isolation, shared hardware, such as the CPU cache or memory bus, can leak sensitive information. For security reasons, shared memory between tenants is typically disabled. Furthermore, t...

متن کامل

CloudRadar: A Real-Time Side-Channel Attack Detection System in Clouds

We present CloudRadar , a system to detect, and hence mitigate, cache-based side-channel attacks in multi-tenant cloud systems. CloudRadar operates by correlating two events: first, it exploits signaturebased detection to identify when the protected virtual machine (VM) executes a cryptographic application; at the same time, it uses anomalybased detection techniques to monitor the co-located VM...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015