Randomly encrypted key generation algorithm against side channel attack in cloud computing

作者: Md. Bajlur Rashid , Nazrul Islam , Abdullah Al Mahedi Sabuj , Sajjad Waheed , Mohammad Badrul Alam Miah

DOI: 10.1109/ICEEICT.2015.7307475

关键词:

摘要: Cloud computing offers both services that provide resources over the Internet and economic benefits for using these resources. Economic benefit plays a vital role users providers of cloud. The pay as they use on other hand never remain idle. cloud hive away their valuable data in perform activity with data. security should be ensured. side channel attack is one common attacks computing. Attackers malicious virtual machine to retrieve from In this paper, implements randomly encrypted key generation algorithm against As anyone can cloud, it makes easy attackers desired Also, process has been developed generates random keys encrypt at time storage transmission. may find when grab no further value them.

参考文章(18)
Hoeteck Wee, Public key encryption against related key attacks public key cryptography. pp. 262- 279 ,(2012) , 10.1007/978-3-642-30057-8_16
Paul C. Kocher, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems international cryptology conference. ,vol. 1109, pp. 104- 113 ,(1996) , 10.1007/3-540-68697-5_9
Danny Harnik, Benny Pinkas, Alexandra Shulman-Peleg, Side Channels in Cloud Services: Deduplication in Cloud Storage ieee symposium on security and privacy. ,vol. 8, pp. 40- 47 ,(2010) , 10.1109/MSP.2010.187
D. Geer, Reducing the Storage Burden via Data Deduplication IEEE Computer. ,vol. 41, pp. 15- 17 ,(2008) , 10.1109/MC.2008.502
Olivier Heen, Christoph Neumann, Luis Montalvo, Serge Defrance, Improving the Resistance to Side-Channel Attacks on Cloud Storage Services new technologies, mobility and security. pp. 1- 5 ,(2012) , 10.1109/NTMS.2012.6208705
Luis M. Vaquero, Luis Rodero-Merino, Daniel Morán, Locking the sky: a survey on IaaS cloud security ieee international conference on cloud computing technology and science. ,vol. 91, pp. 93- 118 ,(2011) , 10.1007/S00607-010-0140-X
Rohit Ranchal, Bharat Bhargava, Lotfi Ben Othmane, Leszek Lilien, Anya Kim, Myong Kang, Mark Linderman, Protection of Identity Information in Cloud Computing without Trusted Third Party symposium on reliable distributed systems. pp. 368- 372 ,(2010) , 10.1109/SRDS.2010.57
Lori M. Kaufman, Data Security in the World of Cloud Computing ieee symposium on security and privacy. ,vol. 7, pp. 61- 64 ,(2009) , 10.1109/MSP.2009.87
Thomas Sandholm, Dongman Lee, Notes on Cloud computing principles Journal of Cloud Computing. ,vol. 3, pp. 21- ,(2014) , 10.1186/S13677-014-0021-5
Minqi Zhou, Rong Zhang, Wei Xie, Weining Qian, Aoying Zhou, None, Security and Privacy in Cloud Computing: A Survey semantics, knowledge and grid. pp. 105- 112 ,(2010) , 10.1109/SKG.2010.19