{"id":"https://openalex.org/W2809037128","doi":"https://doi.org/10.1142/s1793962318500459","title":"Adaptive multilevel fuzzy-based authentication framework to mitigate Cache side channel attack in cloud computing","display_name":"Adaptive multilevel fuzzy-based authentication framework to mitigate Cache side channel attack in cloud computing","publication_year":2018,"publication_date":"2018-06-21","ids":{"openalex":"https://openalex.org/W2809037128","doi":"https://doi.org/10.1142/s1793962318500459","mag":"2809037128"},"language":"en","primary_location":{"id":"doi:10.1142/s1793962318500459","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s1793962318500459","pdf_url":null,"source":{"id":"https://openalex.org/S107361000","display_name":"Advances in Complex Systems","issn_l":"0219-5259","issn":["0219-5259","1793-6802","1793-9615","1793-9623"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Modeling, Simulation, and Scientific Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028623083","display_name":"Bharati Ainapure","orcid":"https://orcid.org/0000-0002-2354-5738"},"institutions":[{"id":"https://openalex.org/I52035452","display_name":"Jawaharlal Nehru Technological University Anantapur","ror":"https://ror.org/02rw39616","country_code":"IN","type":"education","lineage":["https://openalex.org/I52035452"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Bharati Ainapure","raw_affiliation_strings":["Department of Computer Science and Engineering, JNTUA, Anantapur, Andra Paradesh, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, JNTUA, Anantapur, Andra Paradesh, India","institution_ids":["https://openalex.org/I52035452"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003926964","display_name":"Deven Shah","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Deven Shah","raw_affiliation_strings":["Department of Information Technology, Thakur College of Engineering Kandivali, Mumbai, Maharashtra, India"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, Thakur College of Engineering Kandivali, Mumbai, Maharashtra, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037332192","display_name":"A. Ananda Rao","orcid":"https://orcid.org/0000-0001-6272-0327"},"institutions":[{"id":"https://openalex.org/I52035452","display_name":"Jawaharlal Nehru Technological University Anantapur","ror":"https://ror.org/02rw39616","country_code":"IN","type":"education","lineage":["https://openalex.org/I52035452"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"A. Ananda Rao","raw_affiliation_strings":["Department of Computer Science and Engineering, JNTUA, Anantapur, Andra Paradesh, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, JNTUA, Anantapur, Andra Paradesh, India","institution_ids":["https://openalex.org/I52035452"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5028623083"],"corresponding_institution_ids":["https://openalex.org/I52035452"],"apc_list":null,"apc_paid":null,"fwci":0.3258,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.66582606,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"09","issue":"05","first_page":"1850045","last_page":"1850045"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.864693284034729},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.7369221448898315},{"id":"https://openalex.org/keywords/hypervisor","display_name":"Hypervisor","score":0.734999418258667},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.6857669949531555},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6443005204200745},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5243635177612305},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.4538324177265167},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.4404309391975403},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4294527471065521},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.3588492274284363},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.22779878973960876}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.864693284034729},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.7369221448898315},{"id":"https://openalex.org/C112904061","wikidata":"https://www.wikidata.org/wiki/Q1077480","display_name":"Hypervisor","level":4,"score":0.734999418258667},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.6857669949531555},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6443005204200745},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5243635177612305},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.4538324177265167},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.4404309391975403},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4294527471065521},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.3588492274284363},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.22779878973960876}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s1793962318500459","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s1793962318500459","pdf_url":null,"source":{"id":"https://openalex.org/S107361000","display_name":"Advances in Complex Systems","issn_l":"0219-5259","issn":["0219-5259","1793-6802","1793-9615","1793-9623"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Modeling, Simulation, and Scientific Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1498573661","https://openalex.org/W1890449996","https://openalex.org/W2022869924","https://openalex.org/W2031708312","https://openalex.org/W2058410460","https://openalex.org/W2069109751","https://openalex.org/W2125083487","https://openalex.org/W2338887814","https://openalex.org/W2343300676"],"related_works":["https://openalex.org/W2148749405","https://openalex.org/W2104105430","https://openalex.org/W1515917392","https://openalex.org/W1973516247","https://openalex.org/W1991063492","https://openalex.org/W2613320081","https://openalex.org/W2179519055","https://openalex.org/W2743348030","https://openalex.org/W2145292010","https://openalex.org/W2747005099"],"abstract_inverted_index":{"Cloud":[0,20],"computing":[1],"supports":[2],"multitenancy":[3,23],"to":[4,39,141,184,191,210],"satisfy":[5],"the":[6,26,41,54,58,61,65,71,75,78,106,110,115,119,125,139,147,172,182,193,212,219,228,238,255,259,264],"users\u2019":[7],"demands":[8],"for":[9,17,77,138,150,254],"accessing":[10],"resources":[11],"and":[12,35,252,258],"simultaneously":[13],"it":[14],"increases":[15],"revenue":[16],"cloud":[18,93],"providers.":[19],"providers":[21],"adapt":[22],"by":[24,63,130,217,237],"virtualizing":[25],"resources,":[27],"like":[28,83],"CPU,":[29],"network":[30],"interfaces,":[31],"peripherals,":[32],"hard":[33],"drives":[34],"memory":[36],"using":[37],"hypervisor":[38,62],"fulfill":[40],"demand.":[42],"In":[43],"a":[44,121,136,161,168,203,233,267],"virtualized":[45],"environment,":[46],"many":[47],"virtual":[48],"machines":[49],"(VMs)":[50],"can":[51,123,152],"run":[52],"on":[53,70,109],"same":[55,72],"core":[56,73],"with":[57,263],"help":[59],"of":[60,105,128,167,266],"sharing":[64,134],"resources.":[66,112],"The":[67,224,242],"VMs":[68],"running":[69],"are":[74,177],"target":[76],"malicious":[79],"or":[80],"abnormal":[81],"attacks":[82,91],"side":[84,89,96,157,195,214],"channel":[85,90,97,158,196,215],"attacks.":[86],"Among":[87],"various":[88,178],"in":[92,181,232],"computing,":[94],"cache-based":[95,194],"attack":[98,159,197,229],"is":[99,118,160,198,208,230,261],"one":[100],"that":[101,146,170,226],"leaks":[102],"private":[103],"information":[104,144],"users":[107],"based":[108],"shared":[111,116],"Here,":[113],"as":[114],"resource":[117],"cache,":[120],"process":[122],"utilize":[124],"cache":[126,131,213,220],"usage":[127],"another":[129],"contention.":[132],"Cache":[133],"provides":[135],"way":[137],"attackers":[140,216],"gain":[142],"considerable":[143],"so":[145],"key":[148],"used":[149],"encryption":[151],"be":[153],"inferred.":[154],"Discovering":[155],"this":[156],"challenging":[162],"task.":[163],"This":[164],"requires":[165],"identification":[166],"feature":[169],"influences":[171],"attack.":[173],"Even":[174],"though":[175],"there":[176],"techniques":[179],"available":[180],"literature":[183],"mitigate":[185],"such":[186],"attacks,":[187],"an":[188,200],"effective":[189],"solution":[190],"reduce":[192],"still":[199],"issue.":[201],"Therefore,":[202],"novel":[204],"fuzzy":[205,268],"rule-based":[206],"mechanism":[207],"integrated":[209],"detect":[211],"monitoring":[218],"data":[221],"access":[222],"(CDA).":[223],"factor":[225],"determines":[227],"CDA":[231],"log":[234],"file":[235],"created":[236],"framework":[239,244],"during":[240],"authorization.":[241],"proposed":[243],"also":[245],"utilizes":[246],"certain":[247],"security":[248],"properties":[249],"including":[250],"ECC":[251],"hashing":[253],"privacy":[256],"preservation":[257],"decision":[260],"made":[262],"aid":[265],"logic":[269],"system.":[270]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
