Sangeetha Ganesan*, Sumathi Ganesan
Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 387-401, 2021, DOI:10.32604/iasc.2021.019024
- 11 August 2021
Abstract Cloud Computing has been economically famous for sharing the resources of third-party applications. There may be an increase in the exploitation of the prevailing Cloud resources and their vulnerabilities as a result of the aggressive growth of Cloud Computing. In the Cache Side Channel Attack (CSCA), the attackers can leak sensitive information of a Virtual Machine (VM) which is co-located in a physical machine due to inadequate logical isolation. The Cloud Service Provider (CSP) has to modify either at the hardware level to isolate their VM or at the software, level to isolate their applications.… More >