Comparative analysis of the performance for cloud computing hypervisors with encrypted algorithms

العناوين الأخرى

تحليل مقارن لأداء مراقب الأجهزة الافتراضية في بيئة الحوسبة السحابية عند استخدام خوارزميات التشفير

مقدم أطروحة جامعية

Abd al-Rahim, Walid Khalid Amin

مشرف أطروحة جامعية

Kayid, Ahmad A.

أعضاء اللجنة

Ahmad, Mamun Khalid
Abu Shawar, Bayan

الجامعة

جامعة الشرق الأوسط

الكلية

كلية تكنولوجيا المعلومات

القسم الأكاديمي

قسم نظم المعلومات الحاسوبية

دولة الجامعة

الأردن

الدرجة العلمية

ماجستير

تاريخ الدرجة العلمية

2014

الملخص الإنجليزي

Cloud Computing (CC) is Internet-based computing, where end users are provided with on demand shared resources, software and information.

Security is being a major issue in the cloud, and it arise attention for Cloud Service Providers (CSP) and end users.

Cloud security problem raises suspicions and makes many organizations refuse the idea of using the cloud in storing certain data within the cloud; especially data with high confidentiality.

In addition, cloud users try to avoid being controlled by the CSPs.

Encryption Algorithm (EA) is one of many techniques that is used to make data on the cloud secured.

In this research, we applied EA on two different cloud hypervisors Xen and KVM.

The possibility to measure and compare the performance of the two hypervisors is being explored.

Performance in our research takes into consideration response time or duration at encrypt and decrypt and CPU utilization.

We set the cloud environment and create instances.

Eight encryption algorithms (EA) from different categories are deployed for each instance.

These EAs are RSA, AES, DES, TripleDES, ARC4, CAST-128, Blowfish, and TwoFish.

They are differ in properties such as Asymmetric, symmetric, block cipher, stream cipher, and key encryption algorithm.

Many parameters are taken to compare such as key, number of cores, and data size.

Results show that KVM is better than Xen at all CPU utilization results with 11% in average, while at time response KVM also is better at most results with 11.5% in average.

TripleDES shows better time response at Xen at all results.

RSA at big key and TwoFish at small data also show better response time at Xen.

التخصصات الرئيسية

تكنولوجيا المعلومات وعلم الحاسوب

عدد الصفحات

100

قائمة المحتويات

Table of contents.

Abstract.

Abstract in Arabic.

Chapter One : Introduction.

Chapter Two : Background and Literature Review.

Chapter Three : Experiment design.

Chapter Four : Results analysis.

Chapter Five : Conclusion and future work.

References.

نمط استشهاد جمعية علماء النفس الأمريكية (APA)

Abd al-Rahim, Walid Khalid Amin. (2014). Comparative analysis of the performance for cloud computing hypervisors with encrypted algorithms. (Master's theses Theses and Dissertations Master). Middle East University, Jordan
https://search.emarefa.net/detail/BIM-694442

نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)

Abd al-Rahim, Walid Khalid Amin. Comparative analysis of the performance for cloud computing hypervisors with encrypted algorithms. (Master's theses Theses and Dissertations Master). Middle East University. (2014).
https://search.emarefa.net/detail/BIM-694442

نمط استشهاد الجمعية الطبية الأمريكية (AMA)

Abd al-Rahim, Walid Khalid Amin. (2014). Comparative analysis of the performance for cloud computing hypervisors with encrypted algorithms. (Master's theses Theses and Dissertations Master). Middle East University, Jordan
https://search.emarefa.net/detail/BIM-694442

لغة النص

الإنجليزية

نوع البيانات

رسائل جامعية

رقم السجل

BIM-694442