An optimistic technique to detect Cache based Side Channel attacks in Cloud
- PDF / 871,817 Bytes
- 14 Pages / 595.276 x 790.866 pts Page_size
- 25 Downloads / 185 Views
An optimistic technique to detect Cache based Side Channel attacks in Cloud G. Sangeetha 1 & G. Sumathi 1 Received: 29 April 2020 / Accepted: 27 August 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract Data security is the most critical field in Cloud Computing. The Critical data can leak through unpredictable side channels, posing very risky threats to information security. The Cache-based Side Channel Attacks (CSCAs) is one of the most challenging attacks. Different secure cache architectures have been proposed to defend against these attacks. But these solutions are not reliable to detect and prevent those attacks. Detection of CSCAs is a very important research-related problem. In this paper we demonstrated the detection of CSCAs. We measured the vCPU cycle, virtual memory utilization and cache miss rate to detect the attackers. We illustrated Prime + Probe attack, Flush + Flush attack, and Flush + Reload attack on the AES cryptosystem. Our detection technique is compared with the existing detection solution to demonstrate the accuracy. Our proposed work is achieved 92.5% accuracy to detect the CSC attacks. With the help of our proposed system the Cloud Service Providers(CSPs) can identify the attackers of VMs and host machines to safe guard victim users from the CSCA. Keywords Peer-to-peer networking . CSC attackers . vCPU utilization . Virtual memory utilization . Cache miss measurement
1 Introduction The main goal of Cloud Computing is to share all the feasible computing resources among different organizations and individual users. The recent modern technologies lead to an immense adoption of cloud computing. The Cloud Service Providers (CSPs) provide customers the illusion of computing resources as per the on-demand request of them. Instead of buying and maintaining expensive infrastructures, the Cloud Customers lease the computing resources. The CSPs achieve economies of scale by sharing computing resources among Cloud Customers. The different Virtual Machines (VMs) of different customers are deployed on a Physical Machine (PM). These VMs are believed to be running completely isolated in the This article is part of the Topical Collection: Special Issue on Network In Box, Architecture, Networking and Applications Guest Editor: Ching-Hsien Hsu * G. Sangeetha [email protected] G. Sumathi [email protected] 1
Department of Information Technology, Sri Venkateswara College of Engineering, Chennai, Tamil Nadu, India
Virtual Machine Manager (VMM). As the VMs are sharing the physical resources, the partial logical isolation is offered by VMM. So, Cloud Computing faces new challenges in security and privacy risks in the sharing of computing resources. Kocher [1, 2], Osvik et al. [3–5], and Yarom and Falkner [6] showed side channel analysis in the famous intelligent part of the cryptanalytic algorithms. Stefan Mangard et al. [7] showed that the secret information is emitted to the attacker from secure devices by analyzing its physical signals (temperature, power, radiation, h
Data Loading...