Title :
Information leakage in the cloud
Author :
Mughal, B.K. ; Syed, A. ; Khan, A.
Author_Institution :
Dept. of Electr. Eng. & Comput. Sci., Isra Univ., Hyderabad, Pakistan
Abstract :
Cloud computing is all the rage these days. With its increase in popularity, it is important to explore and pay attention to security vulnerabilities and threats that may arise in this new environment. So far, only little research exists addressing these issues. In this study, we explore the possibility of attackers being able to pinpoint the location of the victim´s machine within the cloud and then mount side-channel attacks that have been shown to result in information leakage in the cloud. We implement a small cloud in a testbed and find out that the vulnerabilities still exist and our results match with previous research. We then propose our solution that we implemented to thwart the information leakage in our cloud and report its results.
Keywords :
cloud computing; security of data; cloud computing; information leakage; machine location; side-channel attacks; Benchmark testing; Encryption; Irrigation; Random access memory; Cloud computing; information leakage; security; side channel attack; virtualization;
Conference_Titel :
Open Source Systems and Technologies (ICOSST), 2014 International Conference on
Conference_Location :
Lahore
Print_ISBN :
978-1-4799-2053-2
DOI :
10.1109/ICOSST.2014.7029320