M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015
Preventing Cache Based Side-Channel Attacks for Security in Cloud over Virtual Environment
S. Vengadesan, B. Muthulakshmi
Cloud computing is a unique technique for outsourcing and aggregating computational hardware needs. By ing the underlying machines Cloud computing is able to share resources among multiple mutually distrusting clients. While there are numerous practical benefits to this system, this kind of resource sharing enables new forms of information leakage such as hardware side-channels. The usage of CPU-cache based side-channels in the Cloud and how they compare to traditional side-channel attacks. New techniques are necessary to mitigate these sorts of attacks in a Cloud environment, and specify the requirement for such solutions was developed. The security issues faced by cloud service providers and the service issues faced by the cloud customers are analysed. In the existing system, providing security in cloud requires a huge amount of money based on the service on demand in cloud environment. The extensive use of virtualization in implementing cloud environment brings unique security providence for the cloud customers and all other resellers &subscribers of a public cloud service access. In the proposed system, an effective firewall security has been implemented for blocking and filtering the unwanted requests from the clients before the request reaches the virtual machine destination. During the request processing, if the user requests the high level data from the cloud, the data can be provided against payment.
Keywords: Cloud security, Security architecture, Security and privacy, Cloud Computing, CPU Cache, Parallel Side-Channel, Performance, Side-Channel, Security, and Sequential Side-Channel
Edition: Volume 4 Issue 5, May 2015
Pages: 2065 - 2069
How to Cite this Article?
S. Vengadesan, B. Muthulakshmi, "Preventing Cache Based Side-Channel Attacks for Security in Cloud over Virtual Environment", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB154728, Volume 4 Issue 5, May 2015, 2065 - 2069
120 PDF Views | 106 PDF Downloads
Similar Articles with Keyword 'Cloud security'
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 735 - 737Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks
Nikhita Nerkar, Vina M Lomte
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1845 - 1848A Cloud Storage System for Preserving Privacy and Data Integrity of User
M. S. Tore, S. K. Sonkar
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2619 - 2622Information Security in Multi-Cloud Environment
Digambar D. Patil, Megha Singh
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1695 - 1698Trusted Framework for Secured Information Storage over Cloud Environment
P. Pothuraju, Dasari Rajesh
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 1109 - 1112Combined Security and Service Overloading Fusion Model for Cloud Environment
Ramesh Prasad Vishwakarma, Dr. Sitendra Tamrakar, Rishi Kumar Sharma
Similar Articles with Keyword 'Security architecture'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1695 - 1698Trusted Framework for Secured Information Storage over Cloud Environment
P. Pothuraju, Dasari Rajesh
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2543 - 2546A Survey on Security Issues and Attacks in Cloud Environment
Varsha Narole, Anil Jaiswal, Narendra Narole
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1259 - 1361Security Service Model for Cloud Environment
Shafali Gupta, Neha R Gedam
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1721 - 1723A Survey and Implementation of Trusted Multi Level SAAS (Security as a Service) Cloud
Papineni. Kalpana, K. Narayana Rao
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2065 - 2069Preventing Cache Based Side-Channel Attacks for Security in Cloud over Virtual Environment
S. Vengadesan, B. Muthulakshmi
Similar Articles with Keyword 'Cloud Computing'
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013
Pages: 71 - 73Cloud Computing and Its Types in Mobile Network
Palak Jain
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 594 - 596A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud
K. Sreelatha
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1939 - 1946An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud
Nagaraj S Kolhar, Dr. Suvarna Nandyal
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020
Pages: 1028 - 1031Secure and Efficient Item Information Retrieval in Cloud Computing
Dr. Shameem Akther, Tahseen Begum
Similar Articles with Keyword 'Performance'
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1375 - 1390A Survey of Thinning Techniques on Two Dimensional Binary Images
Moumita Sarkar, Santanu Chatterjee
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 886 - 889Survey on Algorithms Predicting Performance of Keyword Queries
Snehal Borole
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1884 - 1886Performance Analysis of Clustal W Algorithm on Linux Cluster
Swati Jasrotia, Salam Din
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013
Pages: 297 - 300Balancing the Trade-Offs between Data Availability and Query Delay in MANETs
Umar I. Masumdar, N. S. Killarikar
Similar Articles with Keyword 'Side-Channel'
Research Paper, Computer Science & Engineering, India, Volume 8 Issue 5, May 2019
Pages: 1815 - 1820Algorithm Feasibility on IoT Devices with Memory and Computational Power Constraints
Anusha Medavaka
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2065 - 2069Preventing Cache Based Side-Channel Attacks for Security in Cloud over Virtual Environment
S. Vengadesan, B. Muthulakshmi
Similar Articles with Keyword 'Security'
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 700 - 705Virtual Augmented Reality Application and Research in Police Station Management System with Security Aspects
Kale Jyoti S
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2786 - 2790Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020
Pages: 1544 - 1554Recent Developments on Probabilistic Graphical Model Applied in Data Analysis
Kan'Sam Nadjak, Guisheng Yin
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar