Security of Side Channel Power Analysis Attack in Cloud Computing

1
Nazrul Islam
Nazrul Islam
2
Sajjad Waheed
Sajjad Waheed
3
Barnaly Paul Chaity
Barnaly Paul Chaity
4
Saddam Hossain Bhuiyan
Saddam Hossain Bhuiyan
1 Mawlana Bhashani Science and Technology University, Tangail-1902, Bangladesh

Send Message

To: Author

GJCST Volume 14 Issue B4

Article Fingerprint

ReserarchID

CSTB8Y327

Security of Side Channel Power Analysis Attack in Cloud Computing Banner
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Future world is moving towards cloud computing. In a word cloud computing can be defined as remote access computing resources through the Internet. It provides a lot of services at a very low cost. It can improve an organization’s performance by minimizing its cost. It also helps to maximize their revenue with fewer resources. It is becoming popular among organizations and people. They can store their data in cloud at low cost. Attackers aim to attack cloud environment for getting valuable information from cloud users. They attack on it by taking different approaches. They try to access confidential information of different organizations from the cloud. Among different attacks side channel power analysis attack is a newer type of attack. In this paper, we proposed a way to mitigate these types of attacks through a Police Virtual Machine (Police VM). The Police VM provides false power consumption information to attackers and they cannot get real power consumption information from user VM.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

Nazrul Islam. 2015. \u201cSecurity of Side Channel Power Analysis Attack in Cloud Computing\u201d. Global Journal of Computer Science and Technology - B: Cloud & Distributed GJCST-B Volume 14 (GJCST Volume 14 Issue B4): .

Download Citation

Issue Cover
GJCST Volume 14 Issue B4
Pg. 31- 36
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Classification
Not Found
Version of record

v1.2

Issue date

January 12, 2015

Language

English

Experiance in AR

The methods for personal identification and authentication are no exception.

Read in 3D

The methods for personal identification and authentication are no exception.

Article Matrices
Total Views: 8489
Total Downloads: 2329
2026 Trends
Research Identity (RIN)
Related Research

Published Article

Future world is moving towards cloud computing. In a word cloud computing can be defined as remote access computing resources through the Internet. It provides a lot of services at a very low cost. It can improve an organization’s performance by minimizing its cost. It also helps to maximize their revenue with fewer resources. It is becoming popular among organizations and people. They can store their data in cloud at low cost. Attackers aim to attack cloud environment for getting valuable information from cloud users. They attack on it by taking different approaches. They try to access confidential information of different organizations from the cloud. Among different attacks side channel power analysis attack is a newer type of attack. In this paper, we proposed a way to mitigate these types of attacks through a Police Virtual Machine (Police VM). The Police VM provides false power consumption information to attackers and they cannot get real power consumption information from user VM.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]
×

This Page is Under Development

We are currently updating this article page for a better experience.

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Security of Side Channel Power Analysis Attack in Cloud Computing

Sajjad Waheed
Sajjad Waheed
Nazrul Islam
Nazrul Islam Mawlana Bhashani Science and Technology University, Tangail-1902, Bangladesh
Barnaly Paul Chaity
Barnaly Paul Chaity
Saddam Hossain Bhuiyan
Saddam Hossain Bhuiyan

Research Journals