Security of Side Channel Power Analysis Attack in Cloud Computing

α
Nazrul Islam
Nazrul Islam
σ
Sajjad Waheed
Sajjad Waheed
ρ
Barnaly Paul Chaity
Barnaly Paul Chaity
Ѡ
Saddam Hossain Bhuiyan
Saddam Hossain Bhuiyan
α Mawlana Bhashani Science and Technology University Mawlana Bhashani Science and Technology University

Send Message

To: Author

Security of Side Channel Power Analysis Attack in Cloud Computing

Article Fingerprint

ReserarchID

CSTB8Y327

Security of Side Channel Power Analysis Attack in Cloud Computing Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

Future world is moving towards cloud computing. In a word cloud computing can be defined as remote access computing resources through the Internet. It provides a lot of services at a very low cost. It can improve an organization’s performance by minimizing its cost. It also helps to maximize their revenue with fewer resources. It is becoming popular among organizations and people. They can store their data in cloud at low cost. Attackers aim to attack cloud environment for getting valuable information from cloud users. They attack on it by taking different approaches. They try to access confidential information of different organizations from the cloud. Among different attacks side channel power analysis attack is a newer type of attack. In this paper, we proposed a way to mitigate these types of attacks through a Police Virtual Machine (Police VM). The Police VM provides false power consumption information to attackers and they cannot get real power consumption information from user VM.

References

14 Cites in Article
  1. A Rajan,Shanmugapriyaa (2013). Evolution of Cloud Storage as Cloud Computing Infrastructure Service.
  2. Rajkumar Buyya,Chee Yeo,Srikumar Venugopal (2008). Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities.
  3. H Hlavacs,T Treutner,J.-P Gelas,L Lefevre,A.-C Orgerie (2011). Energy Consumption Side-Channel Attack at Virtual Machines in a Cloud.
  4. U Goyal,G Bhatti,S Mehmi (2013). A dual mechanism for defeating ddos attacks in cloud computing model.
  5. K Lee (2012). Security threats in cloud computing environments.
  6. Ajey Singh,Dr Shrivastava (2012). Research on Security Architecture in Mobile Cloud Computing to Prevent Adaptive Anomaly Attacks.
  7. F.-X Standaert (2010). Introduction to Side-Channel Attacks.
  8. Shantanu Pal (2014). Cloud Computing.
  9. B Sevak (2012). Authentication and Authorization Mechanism for Cloud Security.
  10. Paul Kocher,Joshua Jaffe,Benjamin Jun (1999). Differential Power Analysis.
  11. Jude Ambrose,Sri Parameswaran,Aleksandar Ignjatovic (2008). MUTE-AES: A multiprocessor architecture to prevent power analysis based side channel attack of the AES algorithm.
  12. Amir Zadeh,Catherine Gebotys (2009). Leakage Power and Side Channel Security of Nanoscale Cryptosystem-on-Chip (CoC).
  13. Jude Ambrose,Roshan Ragel,Sri Parameswaran (2007). A smart random code injection to mask power analysis based side channel attacks.
  14. (2014). ◾ Side-Channel Attacks and Defenses on Cloud Traffic.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Nazrul Islam. 2015. \u201cSecurity of Side Channel Power Analysis Attack in Cloud Computing\u201d. Global Journal of Computer Science and Technology - B: Cloud & Distributed GJCST-B Volume 14 (GJCST Volume 14 Issue B4): .

Download Citation

Issue Cover
GJCST Volume 14 Issue B4
Pg. 31- 36
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Version of record

v1.2

Issue date

January 12, 2015

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 8535
Total Downloads: 2219
2026 Trends
Related Research

Published Article

Future world is moving towards cloud computing. In a word cloud computing can be defined as remote access computing resources through the Internet. It provides a lot of services at a very low cost. It can improve an organization’s performance by minimizing its cost. It also helps to maximize their revenue with fewer resources. It is becoming popular among organizations and people. They can store their data in cloud at low cost. Attackers aim to attack cloud environment for getting valuable information from cloud users. They attack on it by taking different approaches. They try to access confidential information of different organizations from the cloud. Among different attacks side channel power analysis attack is a newer type of attack. In this paper, we proposed a way to mitigate these types of attacks through a Police Virtual Machine (Police VM). The Police VM provides false power consumption information to attackers and they cannot get real power consumption information from user VM.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Security of Side Channel Power Analysis Attack in Cloud Computing

Sajjad Waheed
Sajjad Waheed
Nazrul Islam
Nazrul Islam Mawlana Bhashani Science and Technology University
Barnaly Paul Chaity
Barnaly Paul Chaity
Saddam Hossain Bhuiyan
Saddam Hossain Bhuiyan

Research Journals