KAMAN Protocol for Preventing Virtual Side Channel Attacks in Cloud Environment

نویسندگان

  • Hardeep Kaur
  • Manjit Kaur
چکیده

Now a day cloud computing is widely accepted all around the world used for public utilities and on demand computing services. It provides lots of benefits like storage, easy access to system anytime, broad network access, resource pooling etc. Various attacks can be performed by attackers or intruder due to its large emergence. In these days security and privacy of user’s data is main concern. An attacker can access and analyse the data of users by penetrating in the cloud by different approaches. An unintelligent cloud service provider or cloud resource management can significantly increases the leakage of the information of the users. In this paper, a virtual side channel attack is described where attacker hijacks all the credential of authorized user and access user’s data. A proposed solution is provided to isolate the attack.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Preventing Cache Based Side-Channel Attacks for Security in Cloud over Virtual Environment

Cloud computing is a unique technique for outsourcing and aggregating computational hardware needs. By abstracting the underlying machines Cloud computing is able to share resources among multiple mutually distrusting clients. While there are numerous practical benefits to this system, this kind of resource sharing enables new forms of information leakage such as hardware sidechannels. The usag...

متن کامل

On the Prevention of Cache-Based Side-Channel Attacks in a Cloud Environment

As Cloud services become more commonplace, recent works have uncovered vulnerabilities unique to such systems. Specifically, the paradigm promotes a risk of information leakage across virtual machine isolation via side-channels. Unlike conventional computing, the infrastructure supporting a Cloud environment allows mutually distrusting clients simultaneous access to the underlying hardware, a s...

متن کامل

Preventing Cryptographic Key Leakage in Cloud Virtual Machines

In a typical infrastructure-as-a-service cloud setting, different clients harness the cloud provider’s services by executing virtual machines (VM). However, recent studies have shown that the cryptographic keys, the most crucial component in many of our daily used cryptographic protocols (e.g., SSL/TLS), can be extracted using cross-VM side-channel attacks. To defeat such a threat, this paper i...

متن کامل

Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud

Information security and privacy in general are major concerns that impede enterprise adaptation of shared or public cloud computing. Specifically, the concern of virtual machine (VM) physical co-residency stems from the threat that hostile tenants can leverage various forms of side channels (such as cache covert channels) to exfiltrate sensitive information of victims on the same physical syst...

متن کامل

To Propose A Novel Technique to Isolate and Detect Virtual Side Channel Attack in Cloud Computing

Cloud computing is one of the most important technology of networking which is widely used in these days. Cloud computing has some security issue also. There are several types of attacks which can be launch on cloud very easily and has many serious effects on the network. This paper discussed the proposed scheme to overcome the adversary effects of virtual side channel effects. Keywords— Privat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015