Comparative analysis of the performance for cloud computing hypervisors with encrypted algorithms
Other Title(s)
تحليل مقارن لأداء مراقب الأجهزة الافتراضية في بيئة الحوسبة السحابية عند استخدام خوارزميات التشفير
Dissertant
Abd al-Rahim, Walid Khalid Amin
Thesis advisor
Comitee Members
Ahmad, Mamun Khalid
Abu Shawar, Bayan
University
Middle East University
Faculty
Faculty of Information Technology
Department
Department of Computer Information Systems
University Country
Jordan
Degree
Master
Degree Date
2014
English Abstract
Cloud Computing (CC) is Internet-based computing, where end users are provided with on demand shared resources, software and information.
Security is being a major issue in the cloud, and it arise attention for Cloud Service Providers (CSP) and end users.
Cloud security problem raises suspicions and makes many organizations refuse the idea of using the cloud in storing certain data within the cloud; especially data with high confidentiality.
In addition, cloud users try to avoid being controlled by the CSPs.
Encryption Algorithm (EA) is one of many techniques that is used to make data on the cloud secured.
In this research, we applied EA on two different cloud hypervisors Xen and KVM.
The possibility to measure and compare the performance of the two hypervisors is being explored.
Performance in our research takes into consideration response time or duration at encrypt and decrypt and CPU utilization.
We set the cloud environment and create instances.
Eight encryption algorithms (EA) from different categories are deployed for each instance.
These EAs are RSA, AES, DES, TripleDES, ARC4, CAST-128, Blowfish, and TwoFish.
They are differ in properties such as Asymmetric, symmetric, block cipher, stream cipher, and key encryption algorithm.
Many parameters are taken to compare such as key, number of cores, and data size.
Results show that KVM is better than Xen at all CPU utilization results with 11% in average, while at time response KVM also is better at most results with 11.5% in average.
TripleDES shows better time response at Xen at all results.
RSA at big key and TwoFish at small data also show better response time at Xen.
Main Subjects
Information Technology and Computer Science
No. of Pages
100
Table of Contents
Table of contents.
Abstract.
Abstract in Arabic.
Chapter One : Introduction.
Chapter Two : Background and Literature Review.
Chapter Three : Experiment design.
Chapter Four : Results analysis.
Chapter Five : Conclusion and future work.
References.
American Psychological Association (APA)
Abd al-Rahim, Walid Khalid Amin. (2014). Comparative analysis of the performance for cloud computing hypervisors with encrypted algorithms. (Master's theses Theses and Dissertations Master). Middle East University, Jordan
https://search.emarefa.net/detail/BIM-694442
Modern Language Association (MLA)
Abd al-Rahim, Walid Khalid Amin. Comparative analysis of the performance for cloud computing hypervisors with encrypted algorithms. (Master's theses Theses and Dissertations Master). Middle East University. (2014).
https://search.emarefa.net/detail/BIM-694442
American Medical Association (AMA)
Abd al-Rahim, Walid Khalid Amin. (2014). Comparative analysis of the performance for cloud computing hypervisors with encrypted algorithms. (Master's theses Theses and Dissertations Master). Middle East University, Jordan
https://search.emarefa.net/detail/BIM-694442
Language
English
Data Type
Arab Theses
Record ID
BIM-694442