Open Access   Article Go Back

Review of Existing Encryptions Techniques used to Prevent Side Channel Attacks in Cloud Computing

Toa Bi Irie Guy-Cedric1 , Suchithra. R.2

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-7 , Page no. 1288-1290, Jul-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i7.12881290

Online published on Jul 31, 2018

Copyright © Toa Bi Irie Guy-Cedric, Suchithra. R. . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Toa Bi Irie Guy-Cedric, Suchithra. R., “Review of Existing Encryptions Techniques used to Prevent Side Channel Attacks in Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1288-1290, 2018.

MLA Style Citation: Toa Bi Irie Guy-Cedric, Suchithra. R. "Review of Existing Encryptions Techniques used to Prevent Side Channel Attacks in Cloud Computing." International Journal of Computer Sciences and Engineering 6.7 (2018): 1288-1290.

APA Style Citation: Toa Bi Irie Guy-Cedric, Suchithra. R., (2018). Review of Existing Encryptions Techniques used to Prevent Side Channel Attacks in Cloud Computing. International Journal of Computer Sciences and Engineering, 6(7), 1288-1290.

BibTex Style Citation:
@article{Guy-Cedric_2018,
author = {Toa Bi Irie Guy-Cedric, Suchithra. R.},
title = {Review of Existing Encryptions Techniques used to Prevent Side Channel Attacks in Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2018},
volume = {6},
Issue = {7},
month = {7},
year = {2018},
issn = {2347-2693},
pages = {1288-1290},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2602},
doi = {https://doi.org/10.26438/ijcse/v6i7.12881290}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i7.12881290}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2602
TI - Review of Existing Encryptions Techniques used to Prevent Side Channel Attacks in Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - Toa Bi Irie Guy-Cedric, Suchithra. R.
PY - 2018
DA - 2018/07/31
PB - IJCSE, Indore, INDIA
SP - 1288-1290
IS - 7
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
445 350 downloads 245 downloads
  
  
           

Abstract

Cloud computing is a popular paradigm in today’s world that exposes it to various threats and attacks. Security is one of the major challenges as basic administrations are regularly outsourced to the cloud vendors. The major concern in cloud environment is how to make the environment safe and secured. This paper investigates some of the security attacks and the existing solutions for cloud security threat.

Key-Words / Index Term

Security, cloud computing, side channel attacks

References

[1] William, S “Cryptography and network security: principles and practice”, pp. 23-50, 1999 Prentice- Hall,
[2] Carlos Moreno, Anwar Hasan and Sebastian Fischmeister “A Family of Fast Exponentiation Algorithms Resistant to SPA, Fault, and Combined Attacks”, pages 157- 166, 2015 IEEE
[3] Paul Kocher “Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems.
Advances in Cryptology”, pages 104-113, 1996.
[4] Chen C., Wang T., and Tian J., “Improving Timing Attack on RSA-CRT via Error Detection and Correction Strategy,” Information Sciences, vol.232, pp. 464-474, 2013 for paper
[5] Giraud C., “An RSA Implementation Resistant to Fault Attacks and to Simple Power Analysis”, IEEE Transactions on Computers, vol.55, no. 9, pp. 1116-1120, 2006.
[6] Berk Gulmezoglu, Mehmet Sinan Inci, Gorka Irazoqui, Thomas Eisenbarth and Berk Sunar “Cross-VM cache attacks on AES “issue No.03- July-Sept (2016 vol.2), p 211-222.
[7] Y Zhang, A Juels, MK Reiter, T Ristenpart “Cross-VM side channels and their use to extract private keys” 2012 for paper
[8] Amuthan Arjunan, Praveena Narayanan, and Kaviarasan Ramu “Securing RSA Algorithm against Timing Attack” The International Arab Journal of Information Technology, Vol. 13, No. 4, July 2016 for journal
[9] Washington Cilio , Michael Linder a, Chris Porter , Jia Di , Dale R. Thompson , Scott C .Smith ” Mitigating power- and timing-based side-channel attacks using dual-spacer dual-rail delay-insensitive asynchronous logic”, 2012 Elsevier Ltd paper
[10] Amazon elastic compute cloud.
[11] O. Aciic¸mez, W. Schindler, and C¸. K. Koc¸. Cache based remote timing attack on the AES. In Topics in Cryptology— CT-RSA 2007, The Cryptographers’ Track at the RSA Conference 2007, pages 271–286, February 2007.