2020
DOI: 10.1007/978-3-030-60425-7_6
|View full text |Cite
|
Sign up to set email alerts
|

Cloud Computing Security: Hardware-Based Attacks and Countermeasures

Abstract: Despite its many technological and economic benefits, Cloud Computing poses complex security threats resulting from the use of virtualisation technology. Compromising the security of any component in the cloud virtual infrastructure will negatively affect the security of other elements and so impact the overall system security. By characterising the diversity of cyber-attacks carried out in the Cloud, this paper aims to provide an analysis of both common and underexplored security threats associated with the c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 38 publications
0
3
0
Order By: Relevance
“…Private browsing modes, also known as incognito mode or privacy mode, are built-in features in popular web browsers that claim to protect users' privacy by not storing browsing history, cookies, or other temporary files. Montasari and Peltola [8]…”
Section: Browser Forensicsmentioning
confidence: 97%
“…Private browsing modes, also known as incognito mode or privacy mode, are built-in features in popular web browsers that claim to protect users' privacy by not storing browsing history, cookies, or other temporary files. Montasari and Peltola [8]…”
Section: Browser Forensicsmentioning
confidence: 97%
“…The emergence of deep learning technology has revolutionised the field of multimedia forensics [137], [138], prompting the need for innovative and timely solutions. Although a multitude of research efforts and forensic tools have been dedicated to detecting anomalies, such as lighting variations [139], shadow inconsistencies [140], and colour illuminations [141], they now face the challenges brought on by the sophistication of deep learning [137].…”
Section: Deepfake Detectionmentioning
confidence: 99%
“…Improving the efficiency of memory encryption in multi-processor systems considers the most trusted physically attacked chip. Security measures such as confidentiality and integrity are essential beyond the chip [19]. A suitable counter cache technique can be implemented using the consistency protocol.…”
Section: A Security Issues In Cache Memorymentioning
confidence: 99%