Side Channel Attacks in IaaS and its Defense Mechanisms
R. Vanathi1, SP. Chokkalingam2
1R.Vanathi, Research Scholar, Saveetha School of Engineering, Saveetha University, Chennai (Tamil Nadu), India.
2SP. Chokkalingam, Department of Information Technology, Saveetha School of Engineering, Saveetha University, Chennai (Tamil Nadu), India.
Manuscript received on 29 May 2019 | Revised Manuscript received on 11 June 2019 | Manuscript Published on 22 June 2019 | PP: 559-564 | Volume-8 Issue-3S, February 2019 | Retrieval Number: C11200283S19/19©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The Cloud Computing (CC) consumes monetarily prominent for collective assets of another third party applications. A cloud stage empowers to part assets between commonly doubting CC customers and provides financially savvy, on-request mounting. With the exponential development of Cloud Computing condition, vulnerabilities and their relating misuse of the overall cloud assets may possibly increment. In spite of the fact that CC gives various advantages to the distributed computing inhabitant, Be that as it may, includes specifically asset allocation and Virtual Machine (VM) physical residing in the likely for touchy data spillages, for example, Side Channel (SC) attacks. In this paper various side channel attacks, its defence mechanisms has been discussed and also a comparison is made among those attacks.
Keywords: VM, SEMA, DEMA, CRT, AES.
Scope of the Article: Cloud Computing