CFP last date
20 December 2024
Reseach Article

Cache based Side Channel Attack on AES in Cloud Computing Environment

by D.pratiba, G.shobha, Sonali Tandon, Srushti S B, Vartika
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 119 - Number 13
Year of Publication: 2015
Authors: D.pratiba, G.shobha, Sonali Tandon, Srushti S B, Vartika
10.5120/21126-3776

D.pratiba, G.shobha, Sonali Tandon, Srushti S B, Vartika . Cache based Side Channel Attack on AES in Cloud Computing Environment. International Journal of Computer Applications. 119, 13 ( June 2015), 14-17. DOI=10.5120/21126-3776

@article{ 10.5120/21126-3776,
author = { D.pratiba, G.shobha, Sonali Tandon, Srushti S B, Vartika },
title = { Cache based Side Channel Attack on AES in Cloud Computing Environment },
journal = { International Journal of Computer Applications },
issue_date = { June 2015 },
volume = { 119 },
number = { 13 },
month = { June },
year = { 2015 },
issn = { 0975-8887 },
pages = { 14-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume119/number13/21126-3776/ },
doi = { 10.5120/21126-3776 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:03:55.396661+05:30
%A D.pratiba
%A G.shobha
%A Sonali Tandon
%A Srushti S B
%A Vartika
%T Cache based Side Channel Attack on AES in Cloud Computing Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 119
%N 13
%P 14-17
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

As Cloud services become more pervasive, works in the recent past have uncovered vulnerabilities unique to such systems. The use of virtualization to isolate computational tasks from ones carried out by adversaries that co-reside with it is growing rapidly. This trend has been precipitated by the failure of today's operating systems to provide adequate isolation due to the growth of cloud facilities. Unlike mainstream computing, the infrastructure supporting a Cloud environment allows mutually distrusting customers to simultaneously access an underlying cache thus promoting a risk of information leakage across virtual machines via side channels. This paper attempts to set up a private cloud environment, demonstrates a cache based side channel attack and explores solutions to counterattack the same. An intense cache access pattern analysis is carried out, thus gathering information about the table lookup indices during one AES encryption to finally recover 128-bit full AES key.

References
  1. Xinjie, Z. ; Tao, W. ; Dong, M. ; Yuanyuan, Z. ; and Zhaoyang, L. , "Robust first two rounds access driven cache timing attack on aes", Proceeding of the 2008 International Conference on Computer Science and Software Engineering, Washington, DC, USA, vol. 3, 2008, pp. 785-788.
  2. Godfrey, M. ;Zulkernine, M. , "A Server-Side Solution to Cache-Based Side-Channel Attacks in the Cloud",Proceeding of the 2013 IEEE Sixth International Conference on Cloud Computing (CLOUD),June 28 2013-July 3 2013, pp. 163-170.
  3. Tromer, E. ; Osvik, D. A. ; and Shamir. A. , "Cache Attacks and Countermeasures: the Case of AES" in Topics in Cryptology – CT-RSA 2006, Springer Berlin Heidelberg, 2006, ISBN: 978-3-540-32648-9.
  4. Zhang, Y. ; Juels, A. ; Reiter, M. K. ; and Ristenpart, T. , "Cross-VM Side Channels and Their Use to Extract Private Keys", Proceeding of the CCS'12, Raleigh, North Carolina, USA, October 16–18, 2012.
  5. Ristenpart, T. ; Tromer, E. ; Shacham, H. ; and Savage, S. , "Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds", Proceeding of the 16th ACM Conference on Computer and Communications Security, Chicago, Illinois, USA, 2009, pp. 199–212.
  6. Gajrani, Jyoti; Mazumdar, Pooja; Sharma, Sampreet; Menezes, Bernard, "Challenges in Implementing Cache-Based Side Channel Attacks on Modern Processors",Proceeding of the 27th International Conference, 5-9 Jan. 2014, pp. 222-227.
  7. Terrell, M. ; Meghanathan, N. , "Setting Up of a Cloud Cyber Infrastructure Using Xen Hypervisor",Proceeding of the 2013 Tenth InternationalConference on Information Technology: New Generations (ITNG), 15-17 April 2013, pp. 648-652. [8 ]Xinyu Miao; Jing Han, "The Design of a Private Cloud Infrastructure Based on XEN", Proceeding of the 2011 Tenth International Symposium on Distributed Computing and Applications to Business, Engineering and Science (DCABES), 14-17 Oct. 2011, pp. 160-164.
  8. Fakhar, F. ;Shibli, M. A. , "Management of Symmetric Cryptographic Keys in cloud based environment", Proceeding of the15th International Conference onAdvanced Communication Technology (ICACT), 27-30 Jan. 2013, pp. 39-44.
  9. Bist, M. ; Wariya, M. ; Agarwal, A. , "Comparing delta, open stack and Xen Cloud Platforms: A survey on open source IaaS", Proceeding of the 2013 IEEE 3rd International onAdvance Computing Conference (IACC), 22-23 Feb. 2013, pp. 96-100.
  10. Brandwacht, L. Meeuwissen, E. Van den Berg, H. Ivkovic, "Models and Guidelines for Dimensioning Private Clouds", Proceeding of the 2013 IEEE Sixth International Conference on Cloud Computing (CLOUD), June 28 2013-July 3 2013, pp. 880-886.
  11. Harnik, D. Pinkas, B. Shulman-Peleg,"Side Channels in Cloud Services: Deduplication in Cloud Storage", IEEE Security & Privacy, vol. 8, no. 6, Nov-Dec. 2010, pp. 40-47.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing AES Side channel attack