Abstract
The delivery of information technology services via the internet is referred to as cloud computing where instead of storing data on a local computer or server, it is stored on remote servers that can be accessed from anywhere with an internet connection. Cloud computing provides a cost-effective resources to develop machine learning and deep learning algorithms faster. Attacks using side-channels in virtualized computing are a risk to the safeguarding of confidential data stored in cloud. These attacks exploit the physical and implementation-related aspects of cloud computing environments, such as power consumption, electromagnetic emissions, and timing behaviours, to leverage secret data, such as cryptographic keys and passwords. With the growing prevalence of cloud computing, it is essential to comprehend and address the vulnerabilities presented by Side-Channel Attacks (SCAs). In response to these hazards, Cloud Service Providers (CSPs) and security researchers are exploring new methods for detecting and preventing these attacks. These methods include hardware-based security solutions, such as Trusted Platform Modules (TPMs), and software-based countermeasures, such as randomizing encryption keys and using secure coding practices. The partnership among CSPs and security researchers is vital to guarantee the confidentiality and integrity of cloud-based data and applications and prevent SCAs in cloud computing.
Original language | English |
---|---|
Pages (from-to) | 1404-1413 |
Number of pages | 10 |
Journal | Procedia Computer Science |
Volume | 258 |
Early online date | 10 May 2025 |
DOIs | |
Publication status | Published - 10 May 2025 |
Event | 3rd International Conference on Machine Learning and Data Engineering, ICMLDE 2024 - Dehradun, India Duration: 28 Nov 2024 → 29 Nov 2024 |
Keywords
- Cloud Computing
- Data
- Encryption
- Information Security
- Side-channel attacks
- Virtual Machines