Review of Existing Encryptions Techniques used to Prevent Side Channel Attacks in Cloud Computing
Toa Bi Irie Guy-Cedric1 , Suchithra. R.2
Section:Review Paper, Product Type: Journal Paper
Volume-6 ,
Issue-7 , Page no. 1288-1290, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.12881290
Online published on Jul 31, 2018
Copyright © Toa Bi Irie Guy-Cedric, Suchithra. R. . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Toa Bi Irie Guy-Cedric, Suchithra. R., “Review of Existing Encryptions Techniques used to Prevent Side Channel Attacks in Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1288-1290, 2018.
MLA Style Citation: Toa Bi Irie Guy-Cedric, Suchithra. R. "Review of Existing Encryptions Techniques used to Prevent Side Channel Attacks in Cloud Computing." International Journal of Computer Sciences and Engineering 6.7 (2018): 1288-1290.
APA Style Citation: Toa Bi Irie Guy-Cedric, Suchithra. R., (2018). Review of Existing Encryptions Techniques used to Prevent Side Channel Attacks in Cloud Computing. International Journal of Computer Sciences and Engineering, 6(7), 1288-1290.
BibTex Style Citation:
@article{Guy-Cedric_2018,
author = {Toa Bi Irie Guy-Cedric, Suchithra. R.},
title = {Review of Existing Encryptions Techniques used to Prevent Side Channel Attacks in Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2018},
volume = {6},
Issue = {7},
month = {7},
year = {2018},
issn = {2347-2693},
pages = {1288-1290},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2602},
doi = {https://doi.org/10.26438/ijcse/v6i7.12881290}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i7.12881290}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2602
TI - Review of Existing Encryptions Techniques used to Prevent Side Channel Attacks in Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - Toa Bi Irie Guy-Cedric, Suchithra. R.
PY - 2018
DA - 2018/07/31
PB - IJCSE, Indore, INDIA
SP - 1288-1290
IS - 7
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
479 | 364 downloads | 266 downloads |
Abstract
Cloud computing is a popular paradigm in today’s world that exposes it to various threats and attacks. Security is one of the major challenges as basic administrations are regularly outsourced to the cloud vendors. The major concern in cloud environment is how to make the environment safe and secured. This paper investigates some of the security attacks and the existing solutions for cloud security threat.
Key-Words / Index Term
Security, cloud computing, side channel attacks
References
[1] William, S “Cryptography and network security: principles and practice”, pp. 23-50, 1999 Prentice- Hall,
[2] Carlos Moreno, Anwar Hasan and Sebastian Fischmeister “A Family of Fast Exponentiation Algorithms Resistant to SPA, Fault, and Combined Attacks”, pages 157- 166, 2015 IEEE
[3] Paul Kocher “Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems.
Advances in Cryptology”, pages 104-113, 1996.
[4] Chen C., Wang T., and Tian J., “Improving Timing Attack on RSA-CRT via Error Detection and Correction Strategy,” Information Sciences, vol.232, pp. 464-474, 2013 for paper
[5] Giraud C., “An RSA Implementation Resistant to Fault Attacks and to Simple Power Analysis”, IEEE Transactions on Computers, vol.55, no. 9, pp. 1116-1120, 2006.
[6] Berk Gulmezoglu, Mehmet Sinan Inci, Gorka Irazoqui, Thomas Eisenbarth and Berk Sunar “Cross-VM cache attacks on AES “issue No.03- July-Sept (2016 vol.2), p 211-222.
[7] Y Zhang, A Juels, MK Reiter, T Ristenpart “Cross-VM side channels and their use to extract private keys” 2012 for paper
[8] Amuthan Arjunan, Praveena Narayanan, and Kaviarasan Ramu “Securing RSA Algorithm against Timing Attack” The International Arab Journal of Information Technology, Vol. 13, No. 4, July 2016 for journal
[9] Washington Cilio , Michael Linder a, Chris Porter , Jia Di , Dale R. Thompson , Scott C .Smith ” Mitigating power- and timing-based side-channel attacks using dual-spacer dual-rail delay-insensitive asynchronous logic”, 2012 Elsevier Ltd paper
[10] Amazon elastic compute cloud.
[11] O. Aciic¸mez, W. Schindler, and C¸. K. Koc¸. Cache based remote timing attack on the AES. In Topics in Cryptology— CT-RSA 2007, The Cryptographers’ Track at the RSA Conference 2007, pages 271–286, February 2007.