Cache based Side Channel Attack on AES in Cloud Computing Environment

  • Pratiba D
  • G.Shobha G
  • Tandon S
  • et al.
N/ACitations
Citations of this article
10Readers
Mendeley users who have this article in their library.

Abstract

As Cloud services become more pervasive, works in the recent past have uncovered vulnerabilities unique to such systems. The use of virtualization to isolate computational tasks from ones carried out by adversaries that co-reside with it is growing rapidly. This trend has been precipitated by the failure of today's operating systems to provide adequate isolation due to the growth of cloud facilities. Unlike mainstream computing, the infrastructure supporting a Cloud environment allows mutually distrusting customers to simultaneously access an underlying cache thus promoting a risk of information leakage across virtual machines via side channels. This paper attempts to set up a private cloud environment, demonstrates a cache based side channel attack and explores solutions to counterattack the same. An intense cache access pattern analysis is carried out, thus gathering information about the table lookup indices during one AES encryption to finally recover 128-bit full AES key.

Cite

CITATION STYLE

APA

Pratiba, D., G.Shobha, G. S., Tandon, S., S B, S., & Vartika, V. (2015). Cache based Side Channel Attack on AES in Cloud Computing Environment. International Journal of Computer Applications, 119(13), 14–17. https://doi.org/10.5120/21126-3776

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free