{"id":"https://openalex.org/W7125952480","doi":"https://doi.org/10.1109/tcc.2026.3658767","title":"Side Channel Attacks on Resource-Constrained Devices Enabled Through Secure Cloud Outsourcing","display_name":"Side Channel Attacks on Resource-Constrained Devices Enabled Through Secure Cloud Outsourcing","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7125952480","doi":"https://doi.org/10.1109/tcc.2026.3658767"},"language":null,"primary_location":{"id":"doi:10.1109/tcc.2026.3658767","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2026.3658767","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5124144125","display_name":"Yuling Luo","orcid":null},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuling Luo","raw_affiliation_strings":["Guangxi Key Laboratory of Brain-Inspired Computing and Intelligent Chips, School of Electronic and Information Engineering, Guangxi Normal University, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Brain-Inspired Computing and Intelligent Chips, School of Electronic and Information Engineering, Guangxi Normal University, Guilin, China","institution_ids":["https://openalex.org/I29739308"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019212486","display_name":"Q. X. Li","orcid":"https://orcid.org/0009-0006-9658-8727"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiuhui Li","raw_affiliation_strings":["Guangxi Key Laboratory of Brain-Inspired Computing and Intelligent Chips, School of Electronic and Information Engineering, Guangxi Normal University, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Brain-Inspired Computing and Intelligent Chips, School of Electronic and Information Engineering, Guangxi Normal University, Guilin, China","institution_ids":["https://openalex.org/I29739308"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101501738","display_name":"Shunsheng Zhang","orcid":"https://orcid.org/0000-0003-4149-9592"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shunsheng Zhang","raw_affiliation_strings":["Guangxi Key Laboratory of Brain-Inspired Computing and Intelligent Chips, School of Electronic and Information Engineering, Guangxi Normal University, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Brain-Inspired Computing and Intelligent Chips, School of Electronic and Information Engineering, Guangxi Normal University, Guilin, China","institution_ids":["https://openalex.org/I29739308"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123655398","display_name":"Junxiu Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junxiu Liu","raw_affiliation_strings":["Guangxi Key Laboratory of Brain-Inspired Computing and Intelligent Chips, School of Electronic and Information Engineering, Guangxi Normal University, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Brain-Inspired Computing and Intelligent Chips, School of Electronic and Information Engineering, Guangxi Normal University, Guilin, China","institution_ids":["https://openalex.org/I29739308"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002946893","display_name":"Sheng Qin","orcid":"https://orcid.org/0000-0001-7348-901X"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sheng Qin","raw_affiliation_strings":["Guangxi Key Laboratory of Brain-Inspired Computing and Intelligent Chips, School of Electronic and Information Engineering, Guangxi Normal University, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Brain-Inspired Computing and Intelligent Chips, School of Electronic and Information Engineering, Guangxi Normal University, Guilin, China","institution_ids":["https://openalex.org/I29739308"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101844258","display_name":"Qiang Fu","orcid":"https://orcid.org/0000-0003-2011-9909"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiang Fu","raw_affiliation_strings":["Guangxi Key Laboratory of Brain-Inspired Computing and Intelligent Chips, School of Electronic and Information Engineering, Guangxi Normal University, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Brain-Inspired Computing and Intelligent Chips, School of Electronic and Information Engineering, Guangxi Normal University, Guilin, China","institution_ids":["https://openalex.org/I29739308"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5116690672","display_name":"Zhen Min","orcid":null},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Min","raw_affiliation_strings":["Guangxi Key Laboratory of Brain-Inspired Computing and Intelligent Chips, School of Electronic and Information Engineering, Guangxi Normal University, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Brain-Inspired Computing and Intelligent Chips, School of Electronic and Information Engineering, Guangxi Normal University, Guilin, China","institution_ids":["https://openalex.org/I29739308"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5124144125"],"corresponding_institution_ids":["https://openalex.org/I29739308"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.24519223,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"14","issue":"1","first_page":"393","last_page":"405"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9520000219345093,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9520000219345093,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.018300000578165054,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.0071000000461936,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/principal-component-analysis","display_name":"Principal component analysis","score":0.7246000170707703},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7196999788284302},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.6848999857902527},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.5080999732017517},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.45719999074935913},{"id":"https://openalex.org/keywords/dimensionality-reduction","display_name":"Dimensionality reduction","score":0.445499986410141},{"id":"https://openalex.org/keywords/computational-complexity-theory","display_name":"Computational complexity theory","score":0.41110000014305115},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.37560001015663147},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.3610999882221222}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7472000122070312},{"id":"https://openalex.org/C27438332","wikidata":"https://www.wikidata.org/wiki/Q2873","display_name":"Principal component analysis","level":2,"score":0.7246000170707703},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7196999788284302},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.6848999857902527},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.5080999732017517},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4587000012397766},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.45719999074935913},{"id":"https://openalex.org/C70518039","wikidata":"https://www.wikidata.org/wiki/Q16000077","display_name":"Dimensionality reduction","level":2,"score":0.445499986410141},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.41110000014305115},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.37560001015663147},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.3610999882221222},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3605000078678131},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.3521000146865845},{"id":"https://openalex.org/C69738355","wikidata":"https://www.wikidata.org/wiki/Q1228929","display_name":"Linear discriminant analysis","level":2,"score":0.3465000092983246},{"id":"https://openalex.org/C17349429","wikidata":"https://www.wikidata.org/wiki/Q1049914","display_name":"Matrix multiplication","level":3,"score":0.34599998593330383},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.33970001339912415},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.33709999918937683},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.329800009727478},{"id":"https://openalex.org/C111030470","wikidata":"https://www.wikidata.org/wiki/Q1430460","display_name":"Curse of dimensionality","level":2,"score":0.3253999948501587},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2978000044822693},{"id":"https://openalex.org/C185142706","wikidata":"https://www.wikidata.org/wiki/Q1134404","display_name":"Covariance matrix","level":2,"score":0.29679998755455017},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.28619998693466187},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.27459999918937683},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.2728999853134155},{"id":"https://openalex.org/C144559511","wikidata":"https://www.wikidata.org/wiki/Q2986279","display_name":"Principal (computer security)","level":2,"score":0.26109999418258667},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.25440001487731934},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.250900000333786}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcc.2026.3658767","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2026.3658767","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10","score":0.512664794921875}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W33889421","https://openalex.org/W1499081748","https://openalex.org/W1562542037","https://openalex.org/W1630587103","https://openalex.org/W1766541702","https://openalex.org/W2126904896","https://openalex.org/W2308297356","https://openalex.org/W2481358287","https://openalex.org/W2594048902","https://openalex.org/W2607766774","https://openalex.org/W2741024377","https://openalex.org/W2788930986","https://openalex.org/W2798382585","https://openalex.org/W2914572864","https://openalex.org/W2981264804","https://openalex.org/W2996021976","https://openalex.org/W3119326853","https://openalex.org/W3132320626","https://openalex.org/W3208177954","https://openalex.org/W3208224324","https://openalex.org/W4285269838","https://openalex.org/W4296831820","https://openalex.org/W4320068061","https://openalex.org/W4372054758","https://openalex.org/W4381198806","https://openalex.org/W4386914101","https://openalex.org/W4393372127","https://openalex.org/W4408810827","https://openalex.org/W4411019267","https://openalex.org/W4413655125","https://openalex.org/W4414368182"],"related_works":[],"abstract_inverted_index":{"Side-Channel":[0],"Attacks":[1,144],"(SCAs)":[2],"now":[3],"require":[4],"more":[5,13],"side-channel":[6,72],"traces":[7,49],"for":[8,79],"successful":[9,129],"execution,":[10],"which":[11,27],"places":[12],"stringent":[14],"requirements":[15],"on":[16,26,38,46,70,106,148],"the":[17,24,33,39,71,80,89,125,136,192],"storage":[18,34],"capacity":[19],"and":[20,35,85,102,108,161,171,177,188,194],"computational":[21,36,137],"ability":[22],"of":[23,88,127,139,169,196],"devices":[25],"SCAs":[28,43],"are":[29,44,146,174],"based.":[30],"To":[31],"reduce":[32],"pressure":[37],"local":[40,140],"device":[41],"where":[42],"performed":[45,147],"collected":[47],"leakage":[48,149],"from":[50],"an":[51],"attacking":[52],"device,":[53],"this":[54,197],"paper":[55],"proposes":[56],"a":[57,128],"secure":[58],"cloud":[59,75],"outsourcing":[60,76],"protocol":[61,94],"to":[62,98],"perform":[63],"Principal":[64],"Component":[65,163],"Analysis":[66,117,159,164],"(PCA)":[67],"dimensionality":[68],"reduction":[69],"traces.":[73],"Secure":[74],"is":[77],"applied":[78],"computationally":[81],"intensive":[82],"matrix":[83],"multiplication":[84],"eigenvalue":[86],"decomposition":[87],"PCA":[90,120,133,173],"process.":[91],"The":[92,166],"proposed":[93],"has":[95],"been":[96],"proven":[97],"balance":[99],"privacy,":[100],"efficiency,":[101],"correctness.":[103],"Through":[104],"experiments":[105],"CW":[107],"Grizzly":[109],"datasets,":[110],"it":[111],"shows":[112],"that":[113],"1)":[114],"Correlation":[115],"Power":[116],"(CPA)":[118],"with":[119],"effectively":[121],"mitigates":[122],"noise,":[123],"improving":[124],"probability":[126],"CPA;":[130],"2)":[131],"Cloud-based":[132],"significantly":[134],"reduces":[135],"complexity":[138],"devices;":[141],"3)":[142],"Template":[143],"(TAs)":[145],"trace":[150],"data":[151],"using":[152],"cloud-based":[153,170],"PCA,":[154,156],"client-based":[155,172],"Linear":[157],"Discriminant":[158],"(LDA)":[160],"Independent":[162],"(ICA).":[165],"attack":[167],"results":[168,190],"basically":[175],"identical,":[176],"they":[178],"achieve":[179],"lower":[180],"Guessing-Entropy":[181],"(GE)":[182],"than":[183],"ICA.":[184],"Both":[185],"theoretical":[186],"analysis":[187],"experimental":[189],"demonstrate":[191],"feasibility":[193],"advantages":[195],"protocol.":[198]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2026-01-29T00:00:00"}
