KAMAN Protocol for Preventing Virtual Side Channel Attacks in Cloud Environment
نویسندگان
چکیده
Now a day cloud computing is widely accepted all around the world used for public utilities and on demand computing services. It provides lots of benefits like storage, easy access to system anytime, broad network access, resource pooling etc. Various attacks can be performed by attackers or intruder due to its large emergence. In these days security and privacy of user’s data is main concern. An attacker can access and analyse the data of users by penetrating in the cloud by different approaches. An unintelligent cloud service provider or cloud resource management can significantly increases the leakage of the information of the users. In this paper, a virtual side channel attack is described where attacker hijacks all the credential of authorized user and access user’s data. A proposed solution is provided to isolate the attack.
منابع مشابه
Preventing Cache Based Side-Channel Attacks for Security in Cloud over Virtual Environment
Cloud computing is a unique technique for outsourcing and aggregating computational hardware needs. By abstracting the underlying machines Cloud computing is able to share resources among multiple mutually distrusting clients. While there are numerous practical benefits to this system, this kind of resource sharing enables new forms of information leakage such as hardware sidechannels. The usag...
متن کاملOn the Prevention of Cache-Based Side-Channel Attacks in a Cloud Environment
As Cloud services become more commonplace, recent works have uncovered vulnerabilities unique to such systems. Specifically, the paradigm promotes a risk of information leakage across virtual machine isolation via side-channels. Unlike conventional computing, the infrastructure supporting a Cloud environment allows mutually distrusting clients simultaneous access to the underlying hardware, a s...
متن کاملPreventing Cryptographic Key Leakage in Cloud Virtual Machines
In a typical infrastructure-as-a-service cloud setting, different clients harness the cloud provider’s services by executing virtual machines (VM). However, recent studies have shown that the cryptographic keys, the most crucial component in many of our daily used cryptographic protocols (e.g., SSL/TLS), can be extracted using cross-VM side-channel attacks. To defeat such a threat, this paper i...
متن کاملWhispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud
Information security and privacy in general are major concerns that impede enterprise adaptation of shared or public cloud computing. Specifically, the concern of virtual machine (VM) physical co-residency stems from the threat that hostile tenants can leverage various forms of side channels (such as cache covert channels) to exfiltrate sensitive information of victims on the same physical syst...
متن کاملTo Propose A Novel Technique to Isolate and Detect Virtual Side Channel Attack in Cloud Computing
Cloud computing is one of the most important technology of networking which is widely used in these days. Cloud computing has some security issue also. There are several types of attacks which can be launch on cloud very easily and has many serious effects on the network. This paper discussed the proposed scheme to overcome the adversary effects of virtual side channel effects. Keywords— Privat...
متن کامل