DocumentCode
254173
Title
Information leakage in the cloud
Author
Mughal, B.K. ; Syed, A. ; Khan, A.
Author_Institution
Dept. of Electr. Eng. & Comput. Sci., Isra Univ., Hyderabad, Pakistan
fYear
2014
fDate
18-20 Dec. 2014
Firstpage
56
Lastpage
61
Abstract
Cloud computing is all the rage these days. With its increase in popularity, it is important to explore and pay attention to security vulnerabilities and threats that may arise in this new environment. So far, only little research exists addressing these issues. In this study, we explore the possibility of attackers being able to pinpoint the location of the victim´s machine within the cloud and then mount side-channel attacks that have been shown to result in information leakage in the cloud. We implement a small cloud in a testbed and find out that the vulnerabilities still exist and our results match with previous research. We then propose our solution that we implemented to thwart the information leakage in our cloud and report its results.
Keywords
cloud computing; security of data; cloud computing; information leakage; machine location; side-channel attacks; Benchmark testing; Encryption; Irrigation; Random access memory; Cloud computing; information leakage; security; side channel attack; virtualization;
fLanguage
English
Publisher
ieee
Conference_Titel
Open Source Systems and Technologies (ICOSST), 2014 International Conference on
Conference_Location
Lahore
Print_ISBN
978-1-4799-2053-2
Type
conf
DOI
10.1109/ICOSST.2014.7029320
Filename
7029320
Link To Document