A Study on the Side Channel Attacks in Cloud Data Centers

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2017 by IJCTT Journal
Volume-50 Number-3
Year of Publication : 2017
Authors : Basel Hashem Ghallab Abdulsafi, R Suchithra
  10.14445/22312803/IJCTT-V50P130

MLA

Basel Hashem Ghallab Abdulsafi, R Suchithra "A Study on the Side Channel Attacks in Cloud Data Centers". International Journal of Computer Trends and Technology (IJCTT) V50(3):164-166, August 2017. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Side-channel analysis is a powerful technique that the principle comprises in monitoring some side-channel information like the running time, the power consumption, or the electromagnetic radiation. Side-channel attacks are easy-to-implement while capable attacks against cryptographic implementation and their objectives run from primitives, protocols, modules, and devices to even systems. These attacks represent a genuine risk to the security of cryptographic modules. Processor micro architectural side and covert channel attacks have risen as the absolute most sharp attacks and ones which are difficult to manage, without affecting framework performance. Not at all like electromagnetic or power-based channels, micro architectural side and covert channel don't require physical proximity to the physical proximity. These attacks are non-obtrusive in which an attacker can get private information, for example, secret keys by basically watching the side channel information leakage. (such as the power consumption, timing, and electromagnetic emanations). This survey gives an overview of the side channel attacks, extricates the key elements of the processor's micro architectural functional units ,surveys the methods and techniques utilized in these attacks and is expected to anayse the execution of elliptic bend cryptosystem under side channel attacks.

References
[1] A. J. Menezes, P. C. Oorschot, S. A. Vanstone. Handbood of applied cryptography(5th edition). CRC Press, 2001.
[2] Gold, B., Linde, R., Cudney, P.: Kvm/370 in retrospect. In: Security and Privacy,1984 IEEE Symposium on. pp. 13{13. IEEE (1984)
[3] Schellenbrg, F., "Comparing Power and Electromagnetic Analysis of Embedded Devices," Ruhr-Universitat Bochum, Bachelor Thesis 2006
[4] Pongaliur, K., Abraham, Z., Liu, A., Hiao, L. and Kempel, L., "Securing Sensor Nodes Against Side Channel Attacks," in High Assurance Systems Engineering Symposium, 2008. HASE 2008. 11th IEEE, 3-5 December 2008, 2008, pp. 353-361.
[5] Zheng , J. and Jamalipour, A., "Introduction to Wireless Sensor Networks," in Wireless Sensor Networks: A Networking Perspective. 1, Zheng J. and Jamalipour A., Ed.: Wiley-IEEE Press, 2009, pp. pp.1-18.
[6] Padmavathi , G. and Shanmugapryiya, D., "A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks," International Journal of Computer Science and Information Security (IJCSIS),vol. 4, no. 1&2, pp. 1-9, 2009.
[7] Gandol_, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: Concrete results.In: Cryptographic Hardware and Embedded SystemsCHES 2001. pp. 251{261.Springer (2001)
[8]. Kocher, P., Ja_e, J., Jun, B.: Di_erential power analysis. In: Advances in CryptologyCRYPTO99. pp. 388{397. Springer (1999)
[9] Han , Y., Zou, X., Liu, Z. and Chen, Y., "Improved Differential Power Analysis Attacks on AES Hardware Implementations," in International Conference on Wireless Communications, Networking and Mobile Computing (WiCom'07), 2007, pp. 2230-2233.
[10] Kocher , P., Jaffe, J. and Jun, B.. (1998) Cryptography Research. [Online]. HYPERLINK " http://www.cryptography.com/dpa/technical"http://www.cryptography.com/dpa/technical
[11] Meulenaer , G., and Standaer, F., "Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks," in MOBILIGHT2010, 2010, pp.229-242.

Keywords
These attacks represent a genuine risk to the security of cryptographic modules.