An Efficient Approach for Side Channel Attack in Cloud Computing

Aakash, Vivek Kumar Pandey, Shiv Prakash*, Sudhakar Singh, Tiansheng Yang, Rajkumar Singh Rathore

*Corresponding author for this work

Research output: Contribution to journalConference articlepeer-review

Abstract

The delivery of information technology services via the internet is referred to as cloud computing where instead of storing data on a local computer or server, it is stored on remote servers that can be accessed from anywhere with an internet connection. Cloud computing provides a cost-effective resources to develop machine learning and deep learning algorithms faster. Attacks using side-channels in virtualized computing are a risk to the safeguarding of confidential data stored in cloud. These attacks exploit the physical and implementation-related aspects of cloud computing environments, such as power consumption, electromagnetic emissions, and timing behaviours, to leverage secret data, such as cryptographic keys and passwords. With the growing prevalence of cloud computing, it is essential to comprehend and address the vulnerabilities presented by Side-Channel Attacks (SCAs). In response to these hazards, Cloud Service Providers (CSPs) and security researchers are exploring new methods for detecting and preventing these attacks. These methods include hardware-based security solutions, such as Trusted Platform Modules (TPMs), and software-based countermeasures, such as randomizing encryption keys and using secure coding practices. The partnership among CSPs and security researchers is vital to guarantee the confidentiality and integrity of cloud-based data and applications and prevent SCAs in cloud computing.
Original languageEnglish
Pages (from-to)1404-1413
Number of pages10
JournalProcedia Computer Science
Volume258
Early online date10 May 2025
DOIs
Publication statusPublished - 10 May 2025
Event3rd International Conference on Machine Learning and Data Engineering, ICMLDE 2024 - Dehradun, India
Duration: 28 Nov 202429 Nov 2024

Keywords

  • Cloud Computing
  • Data
  • Encryption
  • Information Security
  • Side-channel attacks
  • Virtual Machines

Cite this