{"title":"Prevention of VM Timing side-channel attack in a cloud environment using randomized timing approach in AES – 128","authors":"Animesh Kumar, S. Dutta, Prashant Pranav","doi":"10.52756/10.52756/ijerr.2023.v31spl.013","DOIUrl":null,"url":null,"abstract":"The term \"cloud computing\" refers to the delivery of various computer services to users via the Internet. These services include servers, storage, databases, networking, software, and analytics. The ability for businesses to swiftly and easily access computing resources as needed is one of the primary benefits of cloud computing, along with scalability, flexibility, and cost savings. To protect themselves from data breaches, distributed denial of service attacks, and insider threats, cloud providers and consumers alike need to deploy adequate security measures. Shared resources and timing inconsistencies within the hypervisor can make it possible for attackers to deduce sensitive information from other Virtual Machines (VMs). In this research, a software-based solution to the problem of VM timing side-channel assaults (SCAs) in CC (Cloud Computing) is proposed. Following an analysis of the process's empirical complexity, the solution uses a randomized timing method, which is compatible with all of the AES–128 sub-steps.","PeriodicalId":190842,"journal":{"name":"International Journal of Experimental Research and Review","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Experimental Research and Review","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.52756/10.52756/ijerr.2023.v31spl.013","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The term "cloud computing" refers to the delivery of various computer services to users via the Internet. These services include servers, storage, databases, networking, software, and analytics. The ability for businesses to swiftly and easily access computing resources as needed is one of the primary benefits of cloud computing, along with scalability, flexibility, and cost savings. To protect themselves from data breaches, distributed denial of service attacks, and insider threats, cloud providers and consumers alike need to deploy adequate security measures. Shared resources and timing inconsistencies within the hypervisor can make it possible for attackers to deduce sensitive information from other Virtual Machines (VMs). In this research, a software-based solution to the problem of VM timing side-channel assaults (SCAs) in CC (Cloud Computing) is proposed. Following an analysis of the process's empirical complexity, the solution uses a randomized timing method, which is compatible with all of the AES–128 sub-steps.