Neural Networks and Rules-based Systems used to Find Rational and Scientific Correlations between being Here and Now with Afterlife Conditions
Neural Networks and Rules-based Systems used to Find Rational and
Article Fingerprint
ReserarchID
CSTB8Y327
Nazrul Islam
Future world is moving towards cloud computing. In a word cloud computing can be defined as remote access computing resources through the Internet. It provides a lot of services at a very low cost. It can improve an organization’s performance by minimizing its cost. It also helps to maximize their revenue with fewer resources. It is becoming popular among organizations and people. They can store their data in cloud at low cost. Attackers aim to attack cloud environment for getting valuable information from cloud users. They attack on it by taking different approaches. They try to access confidential information of different organizations from the cloud. Among different attacks side channel power analysis attack is a newer type of attack. In this paper, we proposed a way to mitigate these types of attacks through a Police Virtual Machine (Police VM). The Police VM provides false power consumption information to attackers and they cannot get real power consumption information from user VM.
Nazrul Islam. 2015. \u201cSecurity of Side Channel Power Analysis Attack in Cloud Computing\u201d. Global Journal of Computer Science and Technology - B: Cloud & Distributed GJCST-B Volume 14 (GJCST Volume 14 Issue B4): .
Crossref Journal DOI 10.17406/gjcst
Print ISSN 0975-4350
e-ISSN 0975-4172
The methods for personal identification and authentication are no exception.
Total Score: 104
Country: Bangladesh
Subject: Global Journal of Computer Science and Technology - B: Cloud & Distributed
Authors: Sajjad Waheed, Nazrul Islam, Barnaly Paul Chaity, Saddam Hossain Bhuiyan (PhD/Dr. count: 0)
View Count (all-time): 299
Total Views (Real + Logic): 8489
Total Downloads (simulated): 2329
Publish Date: 2015 01, Mon
Monthly Totals (Real + Logic):
Neural Networks and Rules-based Systems used to Find Rational and
A Comparative Study of the Effeect of Promotion on Employee
The Problem Managing Bicycling Mobility in Latin American Cities: Ciclovias
Impact of Capillarity-Induced Rising Damp on the Energy Performance of
Future world is moving towards cloud computing. In a word cloud computing can be defined as remote access computing resources through the Internet. It provides a lot of services at a very low cost. It can improve an organization’s performance by minimizing its cost. It also helps to maximize their revenue with fewer resources. It is becoming popular among organizations and people. They can store their data in cloud at low cost. Attackers aim to attack cloud environment for getting valuable information from cloud users. They attack on it by taking different approaches. They try to access confidential information of different organizations from the cloud. Among different attacks side channel power analysis attack is a newer type of attack. In this paper, we proposed a way to mitigate these types of attacks through a Police Virtual Machine (Police VM). The Police VM provides false power consumption information to attackers and they cannot get real power consumption information from user VM.
We are currently updating this article page for a better experience.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.