Computer Science ›› 2017, Vol. 44 ›› Issue (5): 105-110.doi: 10.11896/j.issn.1002-137X.2017.05.019

Previous Articles     Next Articles

Co-residency Detection Scheme Based on Cache Load and Real Time Noise Ascertainment in Cloud

HE Pei-cong, HUANG Ru-wei, CHEN Ning-jiang, ZHAO Bo-wen and LIU Yang   

  • Online:2018-11-13 Published:2018-11-13

Abstract: Cloud computing has the advantages of convenient use, designing customized service on need base,optimizing resource utilization etc.It has become the main computing model for outsourcing services.The side channel attack of virtual machines in the cloud environment is one of the main potential threats of cloud computing,and the co-residency is the premise of the side channel attack in the cloud environment.In view of how to carry out the co-residency detection in multi tenant cloud environment,this paper presented the measurement of cache load by Prime-Probe with linked struct (MCLPPLS) and real time noise ascertainment mechanism(RTNAM).Based on MCLPPLS and RTNAM,we proposed a new method for the analysis of the co-residency detection.The experimental results show that the method can reduce the interference of the burst noise to the co-residency detection,and has higher true detection rate and lower detection time,which shows good performance.

Key words: Cloud computing,Side channel attacks,Co-residency detection

[1] CHEN K,ZHENG W M.Cloud Computing:System Instances and Current Research[J].Journal of Software,2009,20(5):1337-1348.(in Chinese) 陈康,郑纬民.云计算:系统实例与研究现状[J].软件学报,2009,20(5):1337-1348.
[2] RISTENPART T,TROMER E,SHACHAM H,et al.Hey,you,get off of my cloud:exploring information leakage in third-party compute clouds[C]∥ACM Conference on Computer and Communications Securtty(CCS 2009).2009:199-212.
[3] ZHANG Y,JUELS A,OPREA A,et al.HomeAlone:Co-residency Detection in the Cloud via Side-Channel Analysis[C]∥Security and Privacy.IEEE,2011:313-328.
[4] ZHANG Y,JUELS A,REITER M K,et al.Cross-VM sidechannels and their use to extract private keys[C]∥ACM Conference on Computer and Communications Security.2012:305-316.
[5] KOCHER P C.Timing Attacks on Implementations of Diffie-Hellman,RSA,DSS,and Other Systems[C]∥International Cryptology Conference on Advances in Cryptology.1996:104-113.
[6] PERCIVAL C.Cache missing for fun and profit[J].Proc of Bsdcan,2005.
[7] ACIIMEZ O.Yet another microarchitectural attack:exploiting I-cache[C]∥Proceedings of the 2007 ACM Workshop on Computer Security Architecture.ACM,2007:11-18.
[8] ACIIMEZ O,BRUMLEY B B,GRABHER P.New results on instruction cache attacks[C]∥International Conference on Cryptographic Hardware & Embedded Systems.2010:110-124.
[9] ACIIMEZ O,ETINKAYA K, SEIFERT J P.On the Power of Simple Branch Prediction Analysis[C]∥2007 ACM Sympo-sium on Information,Computer and Communications Security(ASIACCS’07).2006:312-320.
[10] ACIIMEZ O,SEIFERT J P.Cheap Hardware Parallelism Implies Cheap Security[C]∥Workshop on Fault Diagnosis and Tolerance in Cryptography,2007(FDTC 2007).IEEE,2007:80-91.
[11] GULLASCH D,BANGERTER E,KRENN S.Cache games-bringing access-based cache attacks on AES to practice[C]∥In 32nd IEEE Symposium on Security and Privacy.2011:490-505.
[12] TROMER E,OSVIK D A,SHAMIR A.Efficient Cache Attacks on AES,and Countermeasures[J].Journal of Cryptology,2010,23(1):37-71.
[13] YOUNIS Y A,KIFAYAT K,SHI Q,et al.A New Prime and Probe Cache Side-Channel Attack for Cloud Computing[C]∥IEEE International Conference on Dependable,Autonomic and Secure Computing.2015:1718-1724.
[14] LIU F,YAROM Y,GE Q,et al.Last-Level Cache Side-Channel Attacks are Practical[C]∥IEEE Symposium on Security & Privacy.2015:605-622.
[15] YU S,GUI X L,ZHANG X J,et al.Co-residency DetectionScheme based on Shared Cache in the Cloud[J].Journal of Com-puter Research and Development,2013,50(12):2651-2660.(in Chinese) 余思,桂小林,张学军,等.云环境中基于cache共享的虚拟机同驻检测方法[J].计算机研究与发展,2013,50(12):2651-2660.
[16] SI Y,GUI X,LIN J,etal.Detecting VMs Co-residency in Cloud:Using Cache-based Side Channel Attacks[J].Electronics &Electrical Engineering,2013,19(5):73-78.
[17] BIAN G Q,ZHAI H,SHAO B L.A Measurement Method of Side-Channel-Attacks Threat for Co-Residency Virtual Machines Based on Cloud Model[J].Journal of Xi’an Jiaotong University,2016,50(4):21-27.(in Chinese) 边根庆,翟红,邵必林.一种采用云模型的同驻虚拟机侧通道攻击威胁度量方法[J].西安交通大学学报,2016,50(4):21-27.
[18] SHEN Q N,LI Q.Review on Co-residency Security Issues of Virtual Machines in Cloud Computing[J].Journal of Integration Technology,2015(5):5-17.(in Chinese) 沈晴霓,李卿.云计算环境中的虚拟机同驻安全问题综述[J].集成技术,2015(5):5-17.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!